id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2016-2941
|
IBM UrbanCode Deploy creates temporary files during step execution that could contain sensitive information including passwords that could be read by a local user.
|
[
"cpe:2.3:a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
GHSA-wrgj-j3g5-8865
|
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
|
[] | null | null | null | null | null |
|
GHSA-cq4f-m4r6-7827
|
There is a vulnerability in DHCPv6 packet parsing code that could be explored by remote attacker to craft a packet that could cause buffer overflow in a memcpy call, leading to out-of-bounds memory write that would cause dhcp6relay to crash. Dhcp6relay is a critical process and could cause dhcp relay docker to shutdown. Discovered by Eugene Lim of GovTech Singapore.
|
[] | null | 7.5 | null | null | null |
|
GHSA-jx9x-r3hq-w433
|
Dbgv.sys in Microsoft Sysinternals DebugView before 4.72 provides an unspecified mechanism for copying data into kernel memory, which allows local users to gain privileges via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-9890
|
IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to a "Read Access Violation starting at FPX+0x000000000000153a."
|
[
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:fpx:4.46:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-h5px-m9jr-jfxc
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R8000 before 1.0.4.74, RAX200 before 1.0.4.120, R8000P before 1.4.2.84, R7900P before 1.4.2.84, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and RBK852 before 3.2.17.12.
|
[] | null | null | null | null | null |
|
CVE-2024-7760
|
CSRF in aimhubio/aim
|
aimhubio/aim version 3.22.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the tracking server. The vulnerability is due to overly permissive CORS settings, allowing cross-origin requests from all origins. This enables CSRF attacks on all endpoints of the tracking server, which can be chained with other existing vulnerabilities such as remote code execution, denial of service, and arbitrary file read/write.
|
[] | null | null | 7.4 | null | null |
CVE-2016-1693
|
browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 2.6 | null |
|
GHSA-xv3m-vvvg-7mcg
|
An issue was discovered on TerraMaster FS-210 4.0.19 devices. An authenticated remote non-administrative user can read unauthorized shared files, as demonstrated by the filename=*public*%25252Fadmin_OnlyRead.txt substring.
|
[] | null | 6.5 | null | null | null |
|
GHSA-6g92-x4gv-9mq6
|
The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in the URL to port 2002.
|
[] | null | null | null | null | null |
|
RHSA-2023:3536
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.3 packages and security update
|
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 7.5 | null | null | null |
CVE-2023-5871
|
Libnbd: malicious nbd server may crash libnbd
|
A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service.
|
[
"cpe:2.3:a:redhat:libnbd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libnbd:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8"
] | null | 5.3 | null | null | null |
CVE-2025-22218
|
VMware Aria Operations for Logs information disclosure vulnerability
|
VMware Aria Operations for Logs contains an information disclosure vulnerability. A malicious actor with View Only Admin permissions may be able to read the credentials of a VMware product integrated with VMware Aria Operations for Logs
|
[] | null | 8.5 | null | null | null |
CVE-2013-4112
|
The DiagnosticsHandler in JGroup 3.0.x, 3.1.x, 3.2.x before 3.2.9, and 3.3.x before 3.3.3 allows remote attackers to obtain sensitive information (diagnostic information) and execute arbitrary code by reusing valid credentials.
|
[
"cpe:2.3:a:jgroups:jgroup:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jgroups:jgroup:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2020-14895
|
Vulnerability in the Oracle Utilities Framework product of Oracle Utilities Applications (component: System Wide). Supported versions that are affected are 2.2.0.0.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0 - 4.3.0.6.0, 4.4.0.0.0 and 4.4.0.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Utilities Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Utilities Framework accessible data as well as unauthorized read access to a subset of Oracle Utilities Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:2.2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-8j3h-xj5h-wfxg
|
A local privilege escalation vulnerability in Ivanti Secure Access Client for Linux before 22.7R1, allows a low privileged user to execute code as root.
|
[] | null | null | 7.3 | null | null |
|
GHSA-xfrg-qvm9-q5xc
|
The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS sequences, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
|
[] | null | null | null | null | null |
|
CVE-2017-2461
|
An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "CoreText" component. It allows remote attackers to cause a denial of service (resource consumption) via a crafted text message.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-25wc-vm27-vmmq
|
A vulnerability has been identified in TeleControl Server Basic < V3.1. An authenticated attacker with a low-privileged account to the TeleControl Server Basic's port 8000/tcp could escalate his privileges and perform administrative operations.
|
[] | null | null | 8.8 | null | null |
|
GHSA-3mp5-2gx7-4qm4
|
In Bluetooth, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06108596; Issue ID: ALPS06108596.
|
[] | null | null | null | null | null |
|
GHSA-9pqp-f42q-m2gc
|
A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-6517
|
Seeing the SMS Verification Code in Mia Technology's Mia-Med
|
Exposure of Sensitive Information Due to Incompatible Policies vulnerability in Mia Technology Inc. MİA-MED allows Collect Data as Provided by Users.This issue affects MİA-MED: before 1.0.7.
|
[
"cpe:2.3:a:miateknoloji:mia-med:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2022-38227
|
XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp.
|
[
"cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2023-20992
|
In on_iso_link_quality_read of btm_iso_impl.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568750
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 4.5 | null | null | null |
|
CVE-2025-9263
|
Xuxueli xxl-job JobLogController.java getJobsByGroup resource injection
|
A vulnerability has been found in Xuxueli xxl-job up to 3.1.1. Affected by this vulnerability is the function getJobsByGroup of the file /src/main/java/com/xxl/job/admin/controller/JobLogController.java. Such manipulation of the argument jobGroup leads to improper control of resource identifiers. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 4.3 | 4.3 | 4 | null |
GHSA-vcfw-5xfq-9pf2
|
A stored cross site scripting (XSS) vulnerability in /administration/settings_registration.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Registration" field.
|
[] | null | null | null | null | null |
|
GHSA-53m3-g968-mx8h
|
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
|
[] | null | null | null | null | null |
|
CVE-2017-16050
|
`sqlite.js` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
|
[
"cpe:2.3:a:sqlite.js_project:sqlite.js:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2022-32126
|
74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company.
|
[
"cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-48rx-hqvx-wfcw
|
In rw_i93_send_to_lower of rw_i93.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157650357
|
[] | null | null | null | null | null |
|
GHSA-jfgw-vvcr-pv6q
|
Multiple Cisco products are affected by a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because a certain system log file does not have a maximum size restriction. Therefore, the file is allowed to consume the majority of available disk space on the appliance. An attacker could exploit this vulnerability by sending crafted remote connection requests to the appliance. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the application functions could operate abnormally, making the appliance unstable. This vulnerability affects the following Cisco Voice Operating System (VOS)-based products: Emergency Responder, Finesse, Hosted Collaboration Mediation Fulfillment, MediaSense, Prime License Manager, SocialMiner, Unified Communications Manager (UCM), Unified Communications Manager IM and Presence Service (IM&P - earlier releases were known as Cisco Unified Presence), Unified Communication Manager Session Management Edition (SME), Unified Contact Center Express (UCCx), Unified Intelligence Center (UIC), Unity Connection, Virtualized Voice Browser. This vulnerability also affects Prime Collaboration Assurance and Prime Collaboration Provisioning. Cisco Bug IDs: CSCvd10872, CSCvf64322, CSCvf64332, CSCvi29538, CSCvi29543, CSCvi29544, CSCvi29546, CSCvi29556, CSCvi29571, CSCvi31738, CSCvi31741, CSCvi31762, CSCvi31807, CSCvi31818, CSCvi31823.
|
[] | null | null | 7.5 | null | null |
|
RHSA-2024:0589
|
Red Hat Security Advisory: sqlite security update
|
sqlite: heap-buffer-overflow at sessionfuzz
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.3 | null | null | null |
CVE-2017-7577
|
XiongMai uc-httpd has directory traversal allowing the reading of arbitrary files via a "GET ../" HTTP request.
|
[
"cpe:2.3:a:xiongmaitech:uc-httpd:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 | null |
|
GHSA-rq8g-5pc5-wrhr
|
Insufficient Entropy in cryptiles
|
Versions of `cryptiles` prior to 4.1.2 are vulnerable to Insufficient Entropy. The `randomDigits()` method does not provide sufficient entropy and its generates digits that are not evenly distributed.RecommendationUpgrade to version 4.1.2. The package is deprecated and has been moved to `@hapi/cryptiles` and it is strongly recommended to use the maintained package.
|
[] | null | null | 9.8 | null | null |
GHSA-cfgp-2977-2fmm
|
Connection confusion in gRPC
|
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration.
|
[] | null | 7.4 | null | null | null |
GHSA-h34f-jfj7-68j2
|
Battelle V2I Hub 3.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the tmx/TmxCtl/src/lib/PluginStatus.cpp and TmxControl::user_info() function, which could allow the attacker to view, add, modify or delete information in the back-end database.
|
[] | null | null | 9.8 | null | null |
|
RHSA-2023:0396
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: memory corruption in AX88179_178A based USB ethernet device.
|
[
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null | null |
GHSA-5fc8-452m-9frg
|
Blackboard Learning and Community Portal System in Academic Suite 6.3.1.424, 6.2.3.23, and other versions before 6 allows remote attackers to list all available categories via a blank category_id parameter to category.pl. NOTE: it is not clear whether this information is sensitive or not, so this might not be an exposure.
|
[] | null | null | null | null | null |
|
cisco-sa-20180620-nx-os-fabric-services-dos
|
Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability
|
A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packets when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the device, which could cause process crashes and result in a DoS condition on the device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-fabric-services-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-fabric-services-dos"]
This advisory is part of the June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection, which includes 24 Cisco Security Advisories that describe 24 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-67770"].
|
[] | null | null | 8.6 | null | null |
RHSA-2024:8166
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9.8 | null | null | null |
CVE-2007-3162
|
Buffer overflow in the NotSafe function in the idaiehlp ActiveX control in idaiehlp.dll 1.9.1.74 in Internet Download Accelerator (ida) 5.2 allows remote attackers to cause a denial of service (Internet Explorer crash) via a long argument.
|
[
"cpe:2.3:a:westbyte:internet_download_accelerator:5.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2013-5642
|
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request.
|
[
"cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:10.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk_digiumphones:10.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-rr83-cj5r-76xg
|
Missing Authorization vulnerability in codedrafty Mediabay allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mediabay: from n/a through 1.6.
|
[] | null | 4.3 | null | null | null |
|
CVE-2020-21991
|
AVE DOMINAplus <=1.10.x suffers from an authentication bypass vulnerability due to missing control check when directly calling the autologin GET parameter in changeparams.php script. Setting the autologin value to 1 allows an unauthenticated attacker to permanently disable the authentication security control and access the management interface with admin privileges without providing credentials.
|
[
"cpe:2.3:a:ave:dominaplus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ave:53ab-wbs_firmware:1.10.62:*:*:*:*:*:*:*",
"cpe:2.3:h:ave:53ab-wbs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ave:ts01_firmware:1.0.65:*:*:*:*:*:*:*",
"cpe:2.3:h:ave:ts01:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ave:ts03x-v_firmware:1.10.45a:*:*:*:*:*:*:*",
"cpe:2.3:h:ave:ts03x-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ave:ts04x-v_firmware:1.10.45a:*:*:*:*:*:*:*",
"cpe:2.3:h:ave:ts04x-v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ave:ts05_firmware:1.10.36:*:*:*:*:*:*:*",
"cpe:2.3:h:ave:ts05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ave:ts05n-v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ave:ts05n-v:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2025-10774
|
Ruijie 6000-E10 sub_commit.php os command injection
|
A weakness has been identified in Ruijie 6000-E10 up to 2.4.3.6-20171117. This affects an unknown part of the file /view/vpn/autovpn/sub_commit.php. This manipulation of the argument key causes os command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 4.7 | 4.7 | 5.8 | null |
CVE-2020-0338
|
In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-123700107
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 5 | null | 1.9 | null |
|
GHSA-gf5q-xggf-828h
|
A vulnerability classified as critical was found in TOTOLINK X15 1.0.0-B20230714.1105. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 7.4 | 8.8 | null | null | null |
|
GHSA-q4f5-fxmm-4mqw
|
A vulnerability, which was classified as critical, was found in SourceCodester Inventory Management System 1.0. This affects an unknown part of the file catagory_data.php. The manipulation of the argument columns[1][data] leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236289 was assigned to this vulnerability.
|
[] | null | null | 6.3 | null | null |
|
CVE-2017-10098
|
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 and 12.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:flexcube_universal_banking:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 5.5 | null |
|
CVE-2018-8132
|
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0854, CVE-2018-0958, CVE-2018-8129.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.6 | null |
|
CVE-2022-2129
|
Out-of-bounds Write in vim/vim
|
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-55qw-5fwm-j996
|
TOTOLINK outdoor CPE CP450 v4.1.0cu.747_B20191224 was discovered to contain a command injection vulnerability in the CloudACMunualUpdate function via the FileName parameter.
|
[] | null | 7.3 | null | null | null |
|
CVE-2013-5376
|
Cross-site scripting (XSS) vulnerability in IBM Storwize V7000 Unified 1.3.x and 1.4.x before 1.4.2.0 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, related to a "cross frame scripting" attack against an administrative user.
|
[
"cpe:2.3:a:ibm:storwize_v7000_unified_software:1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storwize_v7000_unified_software:1.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storwize_v7000_unified_software:1.3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storwize_v7000_unified_software:1.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storwize_v7000_unified_software:1.4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storwize_v7000_unified_software:1.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storwize_v7000_unified_software:1.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:storwize_v7000_unified:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gcmh-p8gg-xgch
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
|
[] | null | 5.5 | null | null | null |
|
GHSA-wp32-wq34-2rqh
|
dijit editor cross-site scripting vulnerability
|
dijit.Editor in Dojo Toolkit 1.13 allows XSS via the onload attribute of an SVG element.
|
[] | null | null | 6.1 | null | null |
GHSA-9wgj-6vhq-v8f5
|
An out-of-bounds write (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. A size used by memmove is read from the input file. This is fixed in 6.9d.
|
[] | null | 9.8 | null | null | null |
|
PYSEC-2021-661
| null |
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedMul` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/87cf4d3ea9949051e50ca3f071fc909538a51cd0/tensorflow/core/kernels/quantized_mul_op.cc#L287-L290) assumes that the 4 arguments are always valid scalars and tries to access the numeric value directly. However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2025-24117
|
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iPadOS 17.7.4, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3. An app may be able to fingerprint the user.
|
[] | null | 5.5 | null | null | null |
|
GHSA-8qm4-cq94-2553
|
An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. Availability is not affected.
|
[] | null | 9.1 | null | null | null |
|
CVE-2024-47538
|
GHSL-2024-115: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet
|
GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.
|
[
"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*"
] | 8.6 | null | null | null | null |
CVE-2014-10388
|
The wp-support-plus-responsive-ticket-system plugin before 4.2 for WordPress has full path disclosure.
|
[
"cpe:2.3:a:wpsupportplus:wp_support_plus_responsive_ticket_system:*:*:*:*:*:wordpress:*:*"
] | null | null | 5.3 | 5 | null |
|
GHSA-f9v3-crj2-qwx2
|
The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue.
|
[] | null | null | null | null | null |
|
GHSA-j47h-fp92-hhrq
|
WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not prevent web sites from loading third-party content into a subframe, which allows remote attackers to bypass the Same Origin Policy and conduct "clickjacking" attacks via a crafted HTML document.
|
[] | null | null | null | null | null |
|
CVE-2022-24767
|
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.
|
[
"cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.9 | null |
|
GHSA-j5rv-3m5p-q6rc
|
Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 8.8 | null | null | null |
|
CVE-2015-7450
|
Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.
|
[
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_integrator:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:2.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_common_reporting:3.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:watson_content_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:watson_explorer_analytical_components:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:watson_explorer_analytical_components:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:watson_explorer_annotation_administration_console:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:watson_explorer_annotation_administration_console:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:traditional:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:hypervisor:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.5:*:*:*:liberty:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2025-54008
|
WordPress JetSmartFilters <= 3.6.7 - Sensitive Data Exposure Vulnerability
|
Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetSmartFilters allows Retrieve Embedded Sensitive Data. This issue affects JetSmartFilters: from n/a through 3.6.7.
|
[] | null | 6.5 | null | null | null |
cisco-sa-asafdt-webvpn-dos-tzPSYern
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Denial of Service Vulnerability
|
A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74836"].
|
[] | null | 7.5 | null | null | null |
CVE-2024-11736
|
Org.keycloak:keycloak-quarkus-server: unrestricted admin use of system and environment variables
|
A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
|
[
"cpe:/a:redhat:build_keycloak:26.0::el9",
"cpe:/a:redhat:build_keycloak:26.0",
"cpe:/a:redhat:jboss_enterprise_application_platform:8",
"cpe:/a:redhat:jbosseapxp"
] | null | 4.9 | null | null | null |
GHSA-6983-97r4-xj5x
|
A vulnerability was found in deerwms deer-wms-2 up to 3.3. It has been rated as critical. Affected by this issue is some unknown functionality of the file /system/role/authUser/allocatedList. The manipulation of the argument params[dataScope] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 6.3 | null | null | null |
|
GHSA-m7vg-3vj5-h86f
|
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code in certificate configuration. QANP have already fixed these vulnerabilities in the following versions of QTS and QuTS hero. QuTS hero h4.5.1.1472 build 20201031 and later QTS 4.5.1.1456 build 20201015 and later QTS 4.4.3.1354 build 20200702 and later QTS 4.3.6.1333 build 20200608 and later QTS 4.3.4.1368 build 20200703 and later QTS 4.3.3.1315 build 20200611 and later QTS 4.2.6 build 20200611 and later
|
[] | null | 6.1 | null | null | null |
|
GHSA-6rxm-w469-4789
|
The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
|
[] | null | null | 8.8 | null | null |
|
GHSA-ch8f-f5g7-vhhr
|
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
|
[] | null | 8.4 | null | null | null |
|
RHSA-2023:4877
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 3.7 | null | null | null |
GHSA-c7gp-2pch-qh2v
|
Out-of-bounds Write in OpenCV
|
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillUniColor function in utils.cpp when reading an image file by using cv::imread.
|
[] | null | null | 8.8 | null | null |
CVE-2024-47708
|
netkit: Assign missing bpf_net_context
|
In the Linux kernel, the following vulnerability has been resolved:
netkit: Assign missing bpf_net_context
During the introduction of struct bpf_net_context handling for
XDP-redirect, the netkit driver has been missed, which also requires it
because NETKIT_REDIRECT invokes skb_do_redirect() which is accessing the
per-CPU variables. Otherwise we see the following crash:
BUG: kernel NULL pointer dereference, address: 0000000000000038
bpf_redirect()
netkit_xmit()
dev_hard_start_xmit()
Set the bpf_net_context before invoking netkit_xmit() program within the
netkit driver.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2006-2412
|
The raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to cause a denial of service (application crash) via a large ID, which causes an invalid memory access (buffer over-read).
|
[
"cpe:2.3:a:raydium:raydium:svn_revision_283:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_284:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_285:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_286:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_287:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_288:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_289:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_290:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_291:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_292:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_293:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_294:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_295:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_296:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_297:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_298:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_299:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_300:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_301:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_302:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_303:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_304:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_305:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_306:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_307:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_308:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_309:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_310:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_311:*:*:*:*:*:*:*",
"cpe:2.3:a:raydium:raydium:svn_revision_312:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-46663
|
Improper Access Control in Sielco PolyEco1000
|
Sielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.
|
[
"cpe:2.3:o:sielco:polyeco500_firmware:1.7.0:*:*:*:cpu:*:*:*",
"cpe:2.3:o:sielco:polyeco500_firmware:10.16:*:*:*:fpga:*:*:*",
"cpe:2.3:h:sielco:polyeco500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sielco:polyeco300_firmware:2.0.0:*:*:*:cpu:*:*:*",
"cpe:2.3:o:sielco:polyeco300_firmware:2.0.2:*:*:*:cpu:*:*:*",
"cpe:2.3:o:sielco:polyeco300_firmware:10.19:*:*:*:fpga:*:*:*",
"cpe:2.3:h:sielco:polyeco300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sielco:polyeco1000_firmware:1.9.3:*:*:*:cpu:*:*:*",
"cpe:2.3:o:sielco:polyeco1000_firmware:1.9.4:*:*:*:cpu:*:*:*",
"cpe:2.3:o:sielco:polyeco1000_firmware:2.0.6:*:*:*:cpu:*:*:*",
"cpe:2.3:o:sielco:polyeco1000_firmware:10.19:*:*:*:fpga:*:*:*",
"cpe:2.3:h:sielco:polyeco1000:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2018-3880
|
An exploitable stack-based buffer overflow vulnerability exists in the database 'find-by-cameraId' functionality of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly handles existing records inside its SQLite database, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*"
] | null | null | 8.2 | null | null |
|
GHSA-f75j-v6mr-8p6r
|
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.
|
[] | null | 8.8 | null | null | null |
|
GHSA-rc5c-4735-fg86
|
This affects the package jinja2 from 0.0.0. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+
|
[] | null | null | null | null | null |
|
CVE-2016-4192
|
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-gm89-fmwj-6x96
|
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.18, 4.0.20, 4.1.28, and 4.2.18 allows local users to affect availability via unknown vectors related to Core.
|
[] | null | null | null | null | null |
|
CVE-2025-39352
|
WordPress Grand Restaurant WordPress theme <= 7.0 - Arbitrary Options Deletion vulnerability
|
Missing Authorization vulnerability in ThemeGoods Grand Restaurant WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Grand Restaurant WordPress: from n/a through 7.0.
|
[] | null | 8.2 | null | null | null |
GHSA-wf2v-q544-4g93
|
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Information Disclosure Vulnerability".
|
[] | null | null | 4.3 | null | null |
|
CVE-2022-38201
|
An unvalidated redirect vulnerability exists in Esri ArcGIS Quick Capture Web Designer versions 10.8.1 to 10.9.1.
|
An unvalidated redirect vulnerability exists in Esri Portal for ArcGIS Quick Capture Web Designer versions 10.8.1 to 10.9.1. A remote, unauthenticated attacker can potentially induce an unsuspecting authenticated user to access an an attacker controlled domain.
|
[
"cpe:2.3:a:esri:arcgis_quickcapture:*:*:*:*:*:*:x64:*"
] | null | 6.1 | null | null | null |
GHSA-fv6v-3mxr-qrg2
|
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
|
[] | null | null | 9.8 | null | null |
|
CVE-2000-0031
|
The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.
|
[
"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null |
|
GHSA-vrcq-rcq5-v39m
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pflonk Sidebar-Content from Shortcode allows DOM-Based XSS.This issue affects Sidebar-Content from Shortcode: from n/a through 2.0.
|
[] | null | 6.5 | null | null | null |
|
GHSA-mm42-46m4-7pp9
|
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The FwBlockSericceSmm driver does not properly validate input parameters for a software SMI routine, leading to memory corruption of arbitrary addresses including SMRAM, and possible arbitrary code execution.
|
[] | null | 8.2 | null | null | null |
|
CVE-2019-20797
|
An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by I_SendPacket or I_SendPacketTo in i_network.c.
|
[
"cpe:2.3:a:prboom-plus_project:prboom-plus:2.5.1.5:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-vr4w-w9w7-47f2
|
An SQL Injection vulnerability exists in Sourcecodester Employee and Visitor Gate Pass Logging System 1.0 via the username parameter.
|
[] | null | 9.8 | null | null | null |
|
CVE-2015-2311
|
Integer underflow in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 might allow remote peers to cause a denial of service or possibly obtain sensitive information from memory or execute arbitrary code via a crafted message.
|
[
"cpe:2.3:a:capnproto:capnproto:*:*:*:*:*:*:*:*",
"cpe:2.3:a:capnproto:capnproto:0.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:capnproto:capnproto:0.5.1.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-gwqg-23x2-cww4
|
Cross Application Scripting vulnerability in Vercom S.A. Redlink SDK in specific situations allows local code injection and to manipulate the view of a vulnerable application.This issue affects Redlink SDK versions through 1.13.
|
[] | 4.3 | null | null | null | null |
|
GHSA-6rf3-vvj3-mjpf
|
Neon Responder 5.4 for LANsurveyor allows remote attackers to cause a denial of service (application outage) via a crafted Clock Synchronisation packet that triggers an access violation.
|
[] | null | null | null | null | null |
|
GHSA-wpvg-rwm7-w52r
|
Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the Tunnel 6rd function via the relay6rd parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
|
[] | null | 9.8 | null | null | null |
|
CVE-2008-1663
|
Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) 2.1.10 and 2.1.11 on Linux and Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-wx4h-7h65-9q2c
|
A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router.
|
[] | null | 7.5 | null | null | null |
|
GHSA-qq38-mxpq-rrpj
|
Improper authorization of users and groups with the same base name in Jenkins GitLab Authentication Plugin
|
GitLab Authentication Plugin 1.5 and earlier does not differentiate between user names and hierarchical group names when performing authorization. This allows an attacker with permissions to create groups in GitLab to gain the privileges granted to another user or group.GitLab Authentication Plugin 1.6 performs user name and group name authorization checks using the appropriate GitLab APIs.
|
[] | null | 8.1 | null | null | null |
RHSA-2020:1764
|
Red Hat Security Advisory: python3 security and bug fix update
|
python: Cookie domain check returns incorrect results python: email.utils.parseaddr wrongly parses email addresses
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.