id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-20115
|
In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036695; Issue ID: MSV-1713.
|
[
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-87m3-6qj3-p3xh
|
Liferay Portal denial of service (memory consumption)
|
The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images.
|
[] | 7.1 | 6.5 | null | null | null |
CVE-2018-11711
|
A remote attacker can bypass the System Manager Mode on the Canon MF210 and MF220 web interface without knowing the PIN for /login.html via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation
|
[
"cpe:2.3:o:canon:mf210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf220:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2021-39235
|
Access mode of block tokens are not enforced
|
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
|
[
"cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
CVE-2022-0714
|
Heap-based Buffer Overflow in vim/vim
|
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | null | 8.4 | null | null |
CVE-2023-39052
|
An information leak in Earthgarden_waiting 13.6.1 allows attackers to obtain the channel access token and send crafted messages.
|
[
"cpe:2.3:a:earthgarden_waiting_project:earthgarden_waiting:13.6.1:*:*:*:*:line:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2016-2180
|
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
|
[
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-87wq-w6qm-2mhm
|
Specter IDS version 4.5 and 5.0 allows a remote attacker to cause a denial of service (CPU exhaustion) via a port scan, which causes the server to consume CPU while preparing alerts.
|
[] | null | null | null | null | null |
|
GHSA-46rp-652m-9xgq
|
Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
|
[] | null | null | null | null | null |
|
CVE-2021-23239
|
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
|
[
"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 2.5 | null | 1.9 | null |
|
CVE-2003-0821
|
Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
|
[
"cpe:2.3:a:microsoft:word:97:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:97:*:*:ja:*:*:*:*",
"cpe:2.3:a:microsoft:word:97:*:*:ko:*:*:*:*",
"cpe:2.3:a:microsoft:word:97:*:*:zh:*:*:*:*",
"cpe:2.3:a:microsoft:word:97:sr1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:97:sr2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:98:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:98:*:*:ja:*:*:*:*",
"cpe:2.3:a:microsoft:word:98:*:*:ko:*:*:*:*",
"cpe:2.3:a:microsoft:word:98:*:*:zh:*:*:*:*",
"cpe:2.3:a:microsoft:word:98:sr1:*:ja:*:*:*:*",
"cpe:2.3:a:microsoft:word:98:sr2:*:ja:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:*:*:ja:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:*:*:ko:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:*:*:zh:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:sr1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2000:sr1a:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2002:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2002:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:2001:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:2004:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-45043
|
QTS, QuTS hero
|
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
|
[
"cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*"
] | null | 3.8 | null | null | null |
GHSA-mq7h-487v-4gp9
|
Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-4p7j-g7mm-h6h2
|
Unquoted service path vulnerability in McAfee Endpoint Product Removal (EPR) Tool prior to 21.2 allows local administrators to execute arbitrary code, with higher-level privileges, via execution from a compromised folder. The tool did not enforce and protect the execution path. Local admin privileges are required to place the files in the required location.
|
[] | null | 6.7 | null | null | null |
|
GHSA-h7vq-5qgw-jwwq
|
CSV Injection Vulnerability
|
ImpactIn some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel.If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update.PatchesThis has been patched in Craft 3.7.14.Referenceshttps://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28https://twitter.com/craftcmsupdates/status/1442928690145366018For more informationIf you have any questions or comments about this advisory, email us at support@craftcms.comCredits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli
|
[] | null | 8.8 | null | null | null |
CVE-2018-1023
|
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.
|
[
"cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
CVE-2024-3987
|
WP Mobile Menu – The Mobile-Friendly Responsive Menu <= 2.8.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Alt
|
The WP Mobile Menu – The Mobile-Friendly Responsive Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alt text in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:freshlightlab:wp_mobile_menu:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-hq75-xg7r-rx6c
|
Better Call routing bug can lead to Cache Deception
|
SummaryUsing a CDN that caches (`/**/*.png`, `/**/*.json`, `/**/*.css`, etc...) requests, a cache deception can emerge. This could lead to unauthorized access to user sessions and personal data when cached responses are served to other users.DetailsThe vulnerability occurs in the request processing logic where path sanitization is insufficient. The library splits the path using `config.basePath` but doesn't properly validate the remaining path components. This allows specially crafted requests that appear to be static assets (like `/api/auth/get-session/api/auth/image.png` assuming `config.basePath`=`/api/auth`) to bypass typical CDN cache exclusion rules while actually returning sensitive data.The problematic code [here](https://github.com/Bekacru/better-call/blob/8b6f13e24fad7f4666a582601517bb3232d4f4af/src/router.ts#L124):Since this library is largely coupled with `better-auth`, it becomes more clear why this can be dangerous with an example request:ImpactThis is a cache deception vulnerability affecting `better-call` users with CDN caching enabled. which can expose sensitive data.
|
[] | 4.9 | null | null | null | null |
CVE-2019-19258
|
GitLab Enterprise Edition (EE) 10.8 and later through 12.5 has Incorrect Access Control.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-j525-6j4r-q79q
|
Multiple cross-site request forgery (CSRF) vulnerabilities in TKS Banking Solutions ePortfolio 1.0 Java allow remote attackers to perform unspecified restricted actions in the context of certain accounts by bypassing the client-side protection scheme.
|
[] | null | null | null | null | null |
|
GHSA-853f-4jw7-wv7r
|
The School Management System for Wordpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 93.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 5.3 | null | null | null |
|
CVE-2018-5696
|
The iJoomla com_adagency plugin 6.0.9 for Joomla! allows SQL injection via the `advertiser_status` and `status_select` parameters to index.php.
|
[
"cpe:2.3:a:ijoomla:ad_agency:6.0.9:*:*:*:*:joomla\\!:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-6j8f-mqp2-w454
|
The WebVPN CIFS implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0(.4.1) and earlier allows remote CIFS servers to cause a denial of service (device reload) via a long share list, aka Bug ID CSCuj83344.
|
[] | null | null | null | null | null |
|
CVE-2019-16392
|
SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages.
|
[
"cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2014-5395
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users for requests that (1) modify configurations, (2) send SMS messages, or have other unspecified impact via unknown vectors.
|
[
"cpe:2.3:o:huawei:e5180s-22_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e3276_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e3236_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e586bs-2_firmware:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-8hwj-j49v-pfwp
|
libarchive before 3.2.0 does not limit the number of recursive decompressions, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted gzip file.
|
[] | null | null | 5.5 | null | null |
|
CVE-2018-10475
|
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D Light Node structures. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5394.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2021-42724
|
Adobe Bridge Memory Corruption could lead to Arbitrary code execution
|
Adobe Bridge version 11.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
|
[
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-qh6w-j8cx-jf53
|
Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace.
|
[] | null | 5.5 | null | null | null |
|
GHSA-jgv9-qp9j-c2cr
|
RioRey RIOS 4.6.6 and 4.7.0 uses an undocumented, hard-coded username (dbadmin) and password (sq!us3r) for an SSH tunnel, which allows remote attackers to gain privileges via port 8022.
|
[] | null | null | null | null | null |
|
GHSA-7f2f-qxhv-x7jp
|
Multiple PHP remote file inclusion vulnerabilities in Rezervi Generic 0.9 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) datumVonDatumBis.inc.php, (2) footer.inc.php, (3) header.inc.php, and (4) stylesheets.php in templates/; and (5) wochenuebersicht.inc.php, (6) monatsuebersicht.inc.php, (7) jahresuebersicht.inc.php, and (8) tagesuebersicht.inc.php in belegungsplan/.
|
[] | null | null | null | null | null |
|
GHSA-cjp9-8vv4-jm56
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PluginOps Landing Page Builder plugin <= 1.5.1.2 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-wgjr-h635-jgcv
|
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formWifiWpsStart.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-27160
|
Acrobat Reader | Use After Free (CWE-416)
|
Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
GHSA-2xxr-prx9-m533
|
A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
|
[] | null | null | null | null | null |
|
GHSA-43xh-q266-jr4x
|
ReadCode() in decompress.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (invalid write access) via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.
|
[] | null | null | 6.5 | null | null |
|
CVE-2007-3605
|
Stack-based buffer overflow in the kweditcontrol.kwedit.1 ActiveX control in FrontEnd\SapGui\kwedit.dll in the EnjoySAP SAP GUI allows remote attackers to execute arbitrary code via a long argument to the PrepareToPostHTML function.
|
[
"cpe:2.3:a:sap:enjoysap:*:*:*:*:*:*:*:*"
] | null | null | null | 7.6 | null |
|
GHSA-wjv4-g95p-rg69
|
A vulnerability has been identified in RUGGEDCOM ROS for RSL910 devices (All versions < ROS V5.0.1), RUGGEDCOM ROS for all other devices (All versions < ROS V4.3.4), SCALANCE XB-200/XC-200/XP-200/XR300-WG (All versions between V3.0 (including) and V3.0.2 (excluding)), SCALANCE XR-500/XM-400 (All versions between V6.1 (including) and V6.1.1 (excluding)). After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to writeto the device under certain conditions, potentially allowing users located in the adjacentnetwork of the targeted device to perform unauthorized administrative actions.
|
[] | null | null | 8.8 | null | null |
|
GHSA-675w-hmxx-cvf3
|
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
|
[] | null | null | null | null | null |
|
GHSA-x5c3-r34h-xf45
|
Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-f49c-fpvw-q6c9
|
A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. Affected is an unknown function of the component PROMPT Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
GHSA-26c6-8j4f-jwqh
|
A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.
|
[] | null | 6.3 | null | null | null |
|
GHSA-gxxg-46w4-8xx4
|
The web framework in Cisco Prime Collaboration Assurance before 10.5.1.53684-1 allows remote authenticated users to bypass intended login-session read restrictions, and impersonate administrators of arbitrary tenant domains, by discovering a session identifier and constructing a crafted URL, aka Bug IDs CSCus88343 and CSCus88334.
|
[] | null | null | null | null | null |
|
GHSA-3p5c-rjfv-r2rv
|
The Media Library Assistant plugin before 2.82 for Wordpress suffers from multiple XSS vulnerabilities in all Settings/Media Library Assistant tabs, which allow remote authenticated users to execute arbitrary JavaScript.
|
[] | null | 6.1 | null | null | null |
|
GHSA-cq7w-x535-g68q
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in DecaLog.This issue affects DecaLog: from n/a through 3.9.0.
|
[] | null | 7.6 | null | null | null |
|
CVE-2016-1794
|
The AppleGraphicsControlClient::checkArguments method in AppleGraphicsControl in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-68vw-f384-v6m6
|
It was discovered that cf-release v231 and lower, Pivotal Cloud Foundry Elastic Runtime 1.5.x versions prior to 1.5.17 and Pivotal Cloud Foundry Elastic Runtime 1.6.x versions prior to 1.6.18 do not properly enforce disk quotas in certain cases. An attacker could use an improper disk quota value to bypass enforcement and consume all the disk on DEAs/CELLs causing a potential denial of service for other applications.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-40742
|
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the circuit ID parameter at /circuits/circuits/add.
|
[
"cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netbox:netbox:4.0.3:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2015-7926
|
eWON devices with firmware before 10.1s0 omit RBAC for I/O server information and status requests, which allows remote attackers to obtain sensitive information via an unspecified URL.
|
[
"cpe:2.3:o:ewon:ewon_firmware:*:*:*:*:*:*:*:*"
] | null | null | 9.9 | 5 | null |
|
CVE-2022-36994
|
An issue was discovered in Veritas NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1 (and related NetBackup products). An attacker with authenticated access to a NetBackup Client could arbitrarily read files from a NetBackup Primary server.
|
[
"cpe:2.3:a:veritas:flex_appliance:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:flex_appliance:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:flex_appliance:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:flex_appliance:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:flex_appliance:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:flex_appliance:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:flex_scale:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:flex_scale:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:8.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:8.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:9.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_appliance:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_appliance:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_appliance:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_appliance:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_appliance:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release1:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release2:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:3.2:maintenance_release3:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release1:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:3.3.0.1:maintenance_release2:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release1:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:3.3.0.2:maintenance_release2:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
|
GHSA-jj5v-2f8v-5cg8
|
app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored XSS in the sharing groups view.
|
[] | null | null | null | null | null |
|
GHSA-6q42-8x5p-5c72
|
In the Linux kernel, the following vulnerability has been resolved:wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()In ath12k_dp_tx_get_encap_type(), the arvif parameter is only used to
retrieve the ab pointer. In vdev delete sequence the arvif->ar could
become NULL and that would trigger kernel panic.
Since the caller ath12k_dp_tx() already has a valid ab pointer, pass it
directly to avoid panic and unnecessary dereferencing.PC points to "ath12k_dp_tx+0x228/0x988 [ath12k]"
LR points to "ath12k_dp_tx+0xc8/0x988 [ath12k]".
The Backtrace obtained is as follows:
ath12k_dp_tx+0x228/0x988 [ath12k]
ath12k_mac_tx_check_max_limit+0x608/0x920 [ath12k]
ieee80211_process_measurement_req+0x320/0x348 [mac80211]
ieee80211_tx_dequeue+0x9ac/0x1518 [mac80211]
ieee80211_tx_dequeue+0xb14/0x1518 [mac80211]
ieee80211_tx_prepare_skb+0x224/0x254 [mac80211]
ieee80211_xmit+0xec/0x100 [mac80211]
__ieee80211_subif_start_xmit+0xc50/0xf40 [mac80211]
ieee80211_subif_start_xmit+0x2e8/0x308 [mac80211]
netdev_start_xmit+0x150/0x18c
dev_hard_start_xmit+0x74/0xc0Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
|
[] | null | null | null | null | null |
|
CVE-2006-1215
|
Cross-site scripting (XSS) vulnerability in misc.php in Woltlab Burning Board (wBB) 2.3.4 allows remote attackers to inject arbitrary web script or HTML via the percent parameter. NOTE: this issue has been disputed in a followup post, although the original disclosure might be related to reflected XSS.
|
[
"cpe:2.3:a:woltlab:burning_board:2.3.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-xw27-hxmj-gm8p
|
In the Linux kernel, the following vulnerability has been resolved:pstore/platform: Add check for kstrdupAdd check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
|
[] | null | 5.5 | null | null | null |
|
GHSA-jhq5-xcpf-vrwm
|
A vulnerability in the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass certificate validation on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by supplying a system image signed with a crafted certificate to an affected device, bypassing the certificate validation. An exploit could allow an attacker to deploy a crafted system image.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2024:5906
|
Red Hat Security Advisory: squid security update
|
squid: Out-of-bounds write error may lead to Denial of Service
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.3 | null | null | null |
GHSA-8279-2hh7-mpv3
|
SAP UI5, versions - 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1, allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
|
[] | null | null | null | null | null |
|
GHSA-wx53-7r2h-f7w6
|
Cross Site Scripting vulnerability in ACG-faka v1.1.7 allows a remote attacker to execute arbitrary code via the encode parameter in Index.php.
|
[] | null | 6.1 | null | null | null |
|
CVE-2023-20026
|
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320 and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
|
[
"cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-mr55-c2c7-jch7
|
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are not limited by cgroups during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
|
[] | null | 7.7 | null | null | null |
|
GHSA-47jc-2cqh-wc8g
|
Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext
|
[] | null | null | null | null | null |
|
RHSA-2024:4351
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
|
libvirt: stack use-after-free in virNetClientIOEventLoop()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | null | null | null |
GHSA-6gpq-3wvx-gvq3
|
Samsung Galaxy S3/S4 exposes an unprotected component allowing an unprivileged app to send arbitrary SMS texts to arbitrary destinations without permission.
|
[] | null | null | null | null | null |
|
CVE-2015-2427
|
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-g9wh-q9v4-pqc7
|
Certain HP DeskJet 3630 All-in-One Printers models F5S43A - F5S57A, K4T93A - K4T99C, K4U00B - K4U03B, and V3F21A - V3F22A (firmware version SWP1FN1912BR or higher) have a Cross-Site Request Forgery (CSRF) vulnerability that could lead to a denial of service (DOS) or device misconfiguration.
|
[] | null | null | null | null | null |
|
CVE-2014-3152
|
Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
|
[
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.25.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-xx4p-cqfx-r6v6
|
In initiateTdlsTeardownInternal of sta_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235951
|
[] | null | 4.4 | null | null | null |
|
GHSA-36jv-w59f-85w3
|
The WP Maps WordPress plugin before 4.7.2 does not sanitise and escape some of its Map settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 3.5 | null | null | null |
|
GHSA-289m-2pf5-x59p
|
An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
|
[] | null | null | 6.1 | null | null |
|
GHSA-pc32-x737-74cv
|
Cross-site Scripting in Pimcore
|
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
|
[] | null | 5.4 | null | null | null |
GHSA-qwgj-vm3m-pxqp
|
Raml-Module-Builder 26.4.0 allows SQL Injection in PostgresClient.update.
|
[] | null | null | null | null | null |
|
GHSA-7rcp-2v2f-26xw
|
Improper Limitation of a Pathname leads to a Path Traversal vulnerability in the module King-Avis for Prestashop, allowing a user knowing the download token to read arbitrary local files.This issue affects King-Avis: before 17.3.15.
|
[] | null | 4.9 | null | null | null |
|
GHSA-8564-m639-jh8r
|
The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125 and Firefox ESR < 115.10.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-24203
|
Cross Site Scripting vulnerability in SourceCodester Simple Customer Relationship Management System v1.0 allows attacker to execute arbitary code via the company or query parameter(s).
|
[] | null | 5.4 | null | null | null |
|
CVE-2022-44363
|
Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setSnmpInfo.
|
[
"cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2018-16391
|
Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
|
[
"cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.6 | null |
|
CVE-2025-38487
|
soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled
|
In the Linux kernel, the following vulnerability has been resolved:
soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled
Mitigate e.g. the following:
# echo 1e789080.lpc-snoop > /sys/bus/platform/drivers/aspeed-lpc-snoop/unbind
...
[ 120.363594] Unable to handle kernel NULL pointer dereference at virtual address 00000004 when write
[ 120.373866] [00000004] *pgd=00000000
[ 120.377910] Internal error: Oops: 805 [#1] SMP ARM
[ 120.383306] CPU: 1 UID: 0 PID: 315 Comm: sh Not tainted 6.15.0-rc1-00009-g926217bc7d7d-dirty #20 NONE
...
[ 120.679543] Call trace:
[ 120.679559] misc_deregister from aspeed_lpc_snoop_remove+0x84/0xac
[ 120.692462] aspeed_lpc_snoop_remove from platform_remove+0x28/0x38
[ 120.700996] platform_remove from device_release_driver_internal+0x188/0x200
...
|
[] | null | null | null | null | null |
CVE-2024-4150
|
Simple Basic Contact Form <= 20221201 - Reflected Cross-Site Scripting
|
The Simple Basic Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘scf_email’ parameter in versions up to, and including, 20221201 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
GHSA-g78q-fxv7-624v
|
Use after free in WebApp Installs in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.
|
[] | null | 8.8 | null | null | null |
|
CVE-2022-39977
|
Online Pet Shop We App v1.0 was discovered to contain an arbitrary file upload vulnerability via the Editing function in the User module. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file uploaded through the picture upload point.
|
[
"cpe:2.3:a:online_pet_shop_we_app_project:online_pet_shop_we_app:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
RHSA-2022:6066
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null | null |
GHSA-fh95-g988-p9j3
|
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_getretvalpos function in the msj.c file.
|
[] | null | 7.5 | null | null | null |
|
CVE-2010-3327
|
The implementation of HTML content creation in Microsoft Internet Explorer 6 through 8 does not remove the Anchor element during pasting and editing, which might allow remote attackers to obtain sensitive deleted information by visiting a web page, aka "Anchor Element Information Disclosure Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2019-8836
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 6.1.2, iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1. An application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-q4wv-hp9c-9wxv
|
Juniper Junos OS before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R11, 12.3X48 before 12.3X48-D25, 13.2 before 13.2R8, 13.3 before 13.3R7, 14.1 before 14.1R6, 14.2 before 14.2R4, 15.1 before 15.1R1 or 15.1F2, and 15.1X49 before 15.1X49-D15 allow local users to gain privileges via crafted combinations of CLI commands and arguments, a different vulnerability than CVE-2015-3003, CVE-2014-3816, and CVE-2014-0615.
|
[] | null | null | 7.8 | null | null |
|
CVE-2019-19091
|
ABB eSOMS: HTTP response information leakage
|
For ABB eSOMS versions 4.0 to 6.0.3, HTTPS responses contain comments with sensitive information about the application. An attacker might use this detail information to specifically craft the attack.
|
[
"cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-c99p-9562-x762
|
IBM Security Guardium Insights 2.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184747.
|
[] | null | null | null | null | null |
|
GHSA-gpf9-x4m4-m3gr
|
Stack-based buffer overflow in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-rpjr-7xhj-qm95
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zumbo Comment Approved Notifier Extended allows Stored XSS. This issue affects Comment Approved Notifier Extended: from n/a through 5.2.
|
[] | null | 5.9 | null | null | null |
|
CVE-2021-35247
|
Improper Input Validation Vulnerability in Serv-U
|
Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.
|
[
"cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-fhqx-x8f6-2w5w
|
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
|
[] | null | 5.5 | null | null | null |
|
CVE-2012-2711
|
Multiple cross-site scripting (XSS) vulnerabilities in the Taxonomy List module 6.x-1.x before 6.x-1.4 for Drupal allow remote authenticated users with create or edit taxonomy terms permissions to inject arbitrary web script or HTML via vectors related to taxonomy information.
|
[
"cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.0-beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.2:dev:*:*:*:*:*:*",
"cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nancy_wichmann:taxonomy_list:6.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-f7w4-79f7-fhp3
|
An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.
|
[] | null | null | 9.8 | null | null |
|
CVE-2022-26728
|
This issue was addressed with improved entitlements. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. A malicious application may be able to access restricted files.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
RHSA-2024:4118
|
Red Hat Security Advisory: Red Hat Ceph Storage 5.3 security, bug fix, and enhancement update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:ceph_storage:5.3::el8",
"cpe:/a:redhat:ceph_storage:5.3::el9"
] | null | 8.1 | null | null | null |
RHSA-2025:11802
|
Red Hat Security Advisory: nodejs:22 security update
|
sqlite: Integer Truncation in SQLite
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.7 | null | null | null |
CVE-2022-47547
|
GossipSub 1.1, as used for Ethereum 2.0, allows a peer to maintain a positive score (and thus not be pruned from the network) even though it continuously misbehaves by never forwarding topic messages.
|
[
"cpe:2.3:a:protocol:gossipsub:1.1:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2022-31257
|
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.31), Mendix Applications using Mendix 8 (All versions < V8.18.18), Mendix Applications using Mendix 9 (All versions < V9.14.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.2), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.12). In case of access to an active user session in an application that is built with an affected version, it’s possible to change that user’s password bypassing password validations within a Mendix application. This could allow to set weak passwords.
|
[
"cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-gf3j-4gcf-3g2x
|
In Libav 12.3, there is a heap-based buffer over-read in decode_frame in libavcodec/lcldec.c that allows an attacker to cause denial-of-service via a crafted avi file.
|
[] | null | null | 6.5 | null | null |
|
CVE-2016-1771
|
The Downloads feature in Apple Safari before 9.1 mishandles file expansion, which allows remote attackers to cause a denial of service via a crafted web site.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 7.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.