id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2007:0983
|
Red Hat Security Advisory: conga security, bug fix, and enhancement update
|
ricci is vulnerable to a connect DoS attack
|
[
"cpe:/a:redhat:rhel_cluster:4"
] | null | null | null | null | null |
RHSA-2020:5396
|
Red Hat Security Advisory: libexif security update
|
libexif: out of bounds write due to an integer overflow in exif-entry.c
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null | null |
CVE-2003-0196
|
Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
|
[
"cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba-tng:samba-tng:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba-tng:samba-tng:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.07:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.09.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:cifs-9000_server:a.01.09.02:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2013-4582
|
The (1) create_branch, (2) create_tag, (3) import_project, and (4) fork_project functions in lib/gitlab_projects.rb in GitLab 5.0 before 5.4.2, Community Edition before 6.2.4, Enterprise Edition before 6.2.1 and gitlab-shell before 1.7.8 allows remote authenticated users to include information from local files into the metadata of a Git repository via the web interface.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab-shell:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
cisco-sa-cimc-xss-UMYtYEtr
|
Cisco Integrated Management Controller Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.1 | null | null | null |
GHSA-wprr-mc54-c62q
|
Exposure of Sensitive Information in Plone
|
The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope.
|
[] | 6.9 | 5.3 | null | null | null |
CVE-2022-28155
|
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
[
"cpe:2.3:a:jenkins:pipeline\\:_phoenix_autotest:*:*:*:*:*:jenkins:*:*"
] | null | 8.1 | null | 5.5 | null |
|
CVE-2014-5579
|
The Anywhere Pad-Meet, Collaborate (aka com.azeus.anywherepad) application 4.0.1031 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:anywherepad:anywhere_pad-meet_collaborate:4.0.1031:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-fj3q-g9xp-gv5w
|
GUI display truncation vulnerability in ICQ Inc. (formerly Mirabilis) ICQ 2003a, 2003b, Lite 4.0, Lite 4.1, and possibly other Windows versions allows user-assisted remote attackers to hide malicious file extensions, bypass Windows security warnings via a filename that is all uppercase and of a specific length, which truncates the malicious extension from the display and could trick a user into executing arbitrary programs.
|
[] | null | null | null | null | null |
|
GHSA-4xwr-57p2-ghxq
|
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by sending a request. A successful exploit of this vulnerability might lead to information disclosure.
|
[] | null | 5.9 | null | null | null |
|
PYSEC-2023-66
| null |
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0
|
[] | null | null | null | null | null |
RHSA-2014:1859
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: Remote Preauth User Enumeration flaw mysql: unspecified vulnerability related to ENARC (CPU July 2014) mysql: unspecified vulnerability related to SROPTZR (CPU July 2014) mysql: unspecified vulnerability related to ENFED (CPU July 2014) mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014) mysql: unspecified vulnerability related to SRCHAR (CPU July 2014) mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2015-3083
|
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-3hj6-89vp-w89r
|
Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.
|
[] | null | 8.8 | null | null | null |
|
GHSA-28c3-wp2j-prjr
|
The Kibana fix for CVE-2017-8451 was found to be incomplete. With X-Pack installed, Kibana versions before 6.0.1 and 5.6.5 have an open redirect vulnerability on the login page that would enable an attacker to craft a link that redirects to an arbitrary website.
|
[] | null | null | 6.1 | null | null |
|
CVE-2025-27892
|
Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression.
|
[] | null | 6.8 | null | null | null |
|
CVE-2025-38260
|
btrfs: handle csum tree error with rescue=ibadroots correctly
|
In the Linux kernel, the following vulnerability has been resolved:
btrfs: handle csum tree error with rescue=ibadroots correctly
[BUG]
There is syzbot based reproducer that can crash the kernel, with the
following call trace: (With some debug output added)
DEBUG: rescue=ibadroots parsed
BTRFS: device fsid 14d642db-7b15-43e4-81e6-4b8fac6a25f8 devid 1 transid 8 /dev/loop0 (7:0) scanned by repro (1010)
BTRFS info (device loop0): first mount of filesystem 14d642db-7b15-43e4-81e6-4b8fac6a25f8
BTRFS info (device loop0): using blake2b (blake2b-256-generic) checksum algorithm
BTRFS info (device loop0): using free-space-tree
BTRFS warning (device loop0): checksum verify failed on logical 5312512 mirror 1 wanted 0xb043382657aede36608fd3386d6b001692ff406164733d94e2d9a180412c6003 found 0x810ceb2bacb7f0f9eb2bf3b2b15c02af867cb35ad450898169f3b1f0bd818651 level 0
DEBUG: read tree root path failed for tree csum, ret=-5
BTRFS warning (device loop0): checksum verify failed on logical 5328896 mirror 1 wanted 0x51be4e8b303da58e6340226815b70e3a93592dac3f30dd510c7517454de8567a found 0x51be4e8b303da58e634022a315b70e3a93592dac3f30dd510c7517454de8567a level 0
BTRFS warning (device loop0): checksum verify failed on logical 5292032 mirror 1 wanted 0x1924ccd683be9efc2fa98582ef58760e3848e9043db8649ee382681e220cdee4 found 0x0cb6184f6e8799d9f8cb335dccd1d1832da1071d12290dab3b85b587ecacca6e level 0
process 'repro' launched './file2' with NULL argv: empty string added
DEBUG: no csum root, idatacsums=0 ibadroots=134217728
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000041: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000208-0x000000000000020f]
CPU: 5 UID: 0 PID: 1010 Comm: repro Tainted: G OE 6.15.0-custom+ #249 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022
RIP: 0010:btrfs_lookup_csum+0x93/0x3d0 [btrfs]
Call Trace:
<TASK>
btrfs_lookup_bio_sums+0x47a/0xdf0 [btrfs]
btrfs_submit_bbio+0x43e/0x1a80 [btrfs]
submit_one_bio+0xde/0x160 [btrfs]
btrfs_readahead+0x498/0x6a0 [btrfs]
read_pages+0x1c3/0xb20
page_cache_ra_order+0x4b5/0xc20
filemap_get_pages+0x2d3/0x19e0
filemap_read+0x314/0xde0
__kernel_read+0x35b/0x900
bprm_execve+0x62e/0x1140
do_execveat_common.isra.0+0x3fc/0x520
__x64_sys_execveat+0xdc/0x130
do_syscall_64+0x54/0x1d0
entry_SYSCALL_64_after_hwframe+0x76/0x7e
---[ end trace 0000000000000000 ]---
[CAUSE]
Firstly the fs has a corrupted csum tree root, thus to mount the fs we
have to go "ro,rescue=ibadroots" mount option.
Normally with that mount option, a bad csum tree root should set
BTRFS_FS_STATE_NO_DATA_CSUMS flag, so that any future data read will
ignore csum search.
But in this particular case, we have the following call trace that
caused NULL csum root, but not setting BTRFS_FS_STATE_NO_DATA_CSUMS:
load_global_roots_objectid():
ret = btrfs_search_slot();
/* Succeeded */
btrfs_item_key_to_cpu()
found = true;
/* We found the root item for csum tree. */
root = read_tree_root_path();
if (IS_ERR(root)) {
if (!btrfs_test_opt(fs_info, IGNOREBADROOTS))
/*
* Since we have rescue=ibadroots mount option,
* @ret is still 0.
*/
break;
if (!found || ret) {
/* @found is true, @ret is 0, error handling for csum
* tree is skipped.
*/
}
This means we completely skipped to set BTRFS_FS_STATE_NO_DATA_CSUMS if
the csum tree is corrupted, which results unexpected later csum lookup.
[FIX]
If read_tree_root_path() failed, always populate @ret to the error
number.
As at the end of the function, we need @ret to determine if we need to
do the extra error handling for csum tree.
|
[] | null | null | null | null | null |
CVE-2002-0169
|
The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.
|
[
"cpe:2.3:a:redhat:docbook_stylesheets:1.54.13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:docbook_utils:0.6.9-2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:docbook_utils:0.6.13:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-3rvc-764q-q5rq
|
A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as problematic. This affects an unknown part of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-224997 was assigned to this vulnerability.
|
[] | null | 7.5 | null | null | null |
|
GHSA-jw9q-5j9v-7jpj
|
Cross-site scripting (XSS) vulnerability in Usagi Project MyNETS 1.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-w9w5-9fqq-8956
|
Microsoft Excel 2002 SP3 and Office 2004 for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Merge Cell Record Pointer Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-w4hp-pcp8-qhf3
|
Cross-site Scripting in livehelperchat
|
Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed.
|
[] | null | 5.4 | null | null | null |
GHSA-h4p8-jffm-9cch
|
IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
|
[] | null | 4.8 | null | null | null |
|
CVE-2023-40631
|
In Dialer, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
|
GHSA-w586-m4mc-5cg7
|
Overwolf before 0.149.2.30 mishandles Symbolic Links during updates, causing elevation of privileges.
|
[] | null | null | null | null | null |
|
CVE-2023-51594
|
BlueZ OBEX Library Out-Of-Bounds Read Information Disclosure Vulnerability
|
BlueZ OBEX Library Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.
The specific flaw exists within the handling of OBEX protocol parameters. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20937.
|
[
"cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*"
] | null | null | 2.6 | null | null |
GHSA-7ccm-7p68-rfcw
|
Sielco PolyEco1000 is vulnerable to an attacker escalating their privileges by modifying passwords in POST requests.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-8315
|
Eclipse XML parser for the Eclipse IDE versions 2017.2.5 and earlier was found vulnerable to an XML External Entity attack. An attacker can exploit the vulnerability by implementing malicious code on Androidmanifest.xml.
|
[
"cpe:2.3:a:eclipse:ide:2017.2.5:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2016-2335
|
The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file.
|
[
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:7-zip:7-zip:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:7-zip:7-zip:15.05:beta:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2010-1215
|
Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
|
[
"cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-vjw9-jcfv-rggv
|
Cross-Site Request Forgery (CSRF) vulnerability in Stark Digital Category Post List Widget allows Stored XSS.This issue affects Category Post List Widget: from n/a through 2.0.
|
[] | null | 7.1 | null | null | null |
|
CVE-2025-21513
|
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:prior_to_9.2.9.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-v5rr-h4vj-55pr
|
Secure Boot Security Feature Bypass Vulnerability
|
[] | null | 8.4 | null | null | null |
|
CVE-2014-6079
|
Cross-site scripting (XSS) vulnerability in the Local Management Interface in IBM Security Access Manager for Web 7.x before 7.0.0-ISS-WGA-IF0009 and 8.x before 8.0.0-ISS-WGA-FP0005, and Security Access Manager for Mobile 8.x before 8.0.0-ISS-ISAM-FP0005, allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_mobile_appliance:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_web_appliance:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_web_appliance:8.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2019-19823
|
A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.
|
[
"cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*",
"cpe:2.3:o:realtek:rtk_11n_ap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtk_11n_ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sapido:gr297n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sapido:gr297n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ciktel:mesh_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ciktel:mesh_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:kctvjeju:wireless_ap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:kctvjeju:wireless_ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fg-products:fgn-r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fg-products:fgn-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hiwifi:max-c300n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hiwifi:max-c300n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tbroad:gn-866ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tbroad:gn-866ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:coship:emta_ap_firmwre:*:*:*:*:*:*:*:*",
"cpe:2.3:h:coship:emta_ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:wn-ac1167r_firmwre:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:wn-ac1167r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hcn_max-c300n_project:hcn_max-c300n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hcn_max-c300n_project:hcn_max-c300n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-4131
|
A DLL hijack vulnerability was reported in Lenovo Emulator that could allow a local attacker to execute code with elevated privileges.
|
[
"cpe:2.3:a:lenovo:emulator:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2021-44512
|
World-writable permissions on the /tmp/tmate/sessions directory in tmate-ssh-server 2.3.0 allow a local attacker to compromise the integrity of session handling, or obtain the read-write session ID from a read-only session symlink in this directory.
|
[
"cpe:2.3:a:tmate:tmate-ssh-server:*:*:*:*:*:*:*:*"
] | null | 7 | null | 4.4 | null |
|
CVE-2018-11174
|
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 32 of 46).
|
[
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2011-0903
|
Multiple directory traversal vulnerabilities in AR Web Content Manager (AWCM) 2.2 allow remote attackers to read arbitrary files and possibly have other unspecified impact via a .. (dot dot) in the (1) awcm_theme or (2) awcm_lang cookie to (a) index.php or (b) header.php.
|
[
"cpe:2.3:a:awcm-cms:ar_web_content_manager:2.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-0104
|
NVIDIA Mellanox OS, ONYX, Skyway, MetroX-2 and MetroX-3 XC contain a vulnerability in the LDAP AAA component, where a user can cause improper access. A successful exploit of this vulnerability might lead to information disclosure, data tampering, and escalation of privileges.
|
[
"cpe:2.3:o:nvidia:onyx:*:*:*:*:lts:*:*:*",
"cpe:2.3:o:nvidia:mlnx-os:*:*:*:*:-:*:*:*",
"cpe:2.3:h:nvidia:tq8100-hs2f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tq8200-hs2f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:mlnx-gw:*:*:*:*:-:*:*:*",
"cpe:2.3:h:nvidia:mga100-hs2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:nvda-os_xc:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:mtq8400-hs2r:-:*:*:*:*:*:*:*"
] | null | 4.2 | null | null | null |
|
GHSA-wwgv-27pp-3wwc
|
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-045)
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-4794
|
Campcodes Online Laundry Management System manage_receiving.php sql injection
|
A vulnerability has been found in Campcodes Online Laundry Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /manage_receiving.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263893 was assigned to this vulnerability.
|
[
"cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-96wx-g729-q36v
|
Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote authenticated users to cause a denial of service (system hang) via a crafted request, aka "Local Security Authority Subsystem Service Denial of Service Vulnerability."
|
[] | null | null | 6.5 | null | null |
|
RHSA-2013:0566
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: incomplete fix for CVE-2011-4131 kernel: stack disclosure in binfmt_script load_script() kernel: call_console_drivers() function log prefix stripping DoS kernel: VFAT slab-based buffer overflow
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null | null |
CVE-1999-1527
|
Internal HTTP server in Sun Netbeans Java IDE in Netbeans Developer 3.0 Beta and Forte Community Edition 1.0 Beta does not properly restrict access to IP addresses as specified in its configuration, which allows arbitrary remote attackers to access the server.
|
[
"cpe:2.3:a:sun:forte:community_1.0_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:netbeans_developer:3.0_beta:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-27072
|
media: usbtv: Remove useless locks in usbtv_video_free()
|
In the Linux kernel, the following vulnerability has been resolved:
media: usbtv: Remove useless locks in usbtv_video_free()
Remove locks calls in usbtv_video_free() because
are useless and may led to a deadlock as reported here:
https://syzkaller.appspot.com/x/bisect.txt?x=166dc872180000
Also remove usbtv_stop() call since it will be called when
unregistering the device.
Before 'c838530d230b' this issue would only be noticed if you
disconnect while streaming and now it is noticeable even when
disconnecting while not streaming.
[hverkuil: fix minor spelling mistake in log message]
|
[] | null | 5.5 | null | null | null |
GHSA-grj6-95wm-6gmg
|
An unsafe pointer vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler. An attacker can use this unsafe pointer "current_ptr" to read or write or manipulate data into SMRAM. Exploitation of this vulnerability can lead to escalation of privileges reserved only for SMM using the SwSMI handler.
|
[] | null | null | null | null | null |
|
GHSA-ghpj-82w3-3hgh
|
A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been classified as critical. Affected is an unknown function of the file /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php. The manipulation of the argument oldipmask/oldgateway/olddevname leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263112. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 4.7 | null | null | null |
|
GHSA-q8mf-j7cw-h829
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pandora FMS on all allows CVE-2008-5817. This vulnerability allowed SQL changes to be made to several files in the Grafana module. This issue affects Pandora FMS: from 700 through <776.
|
[] | null | 6.8 | null | null | null |
|
CVE-2023-2975
|
AES-SIV implementation ignores empty associated data entries
|
Issue summary: The AES-SIV cipher implementation contains a bug that causes
it to ignore empty associated data entries which are unauthenticated as
a consequence.
Impact summary: Applications that use the AES-SIV algorithm and want to
authenticate empty data entries as associated data can be misled by removing,
adding or reordering such empty entries as these are ignored by the OpenSSL
implementation. We are currently unaware of any such applications.
The AES-SIV algorithm allows for authentication of multiple associated
data entries along with the encryption. To authenticate empty data the
application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with
NULL pointer as the output buffer and 0 as the input buffer length.
The AES-SIV implementation in OpenSSL just returns success for such a call
instead of performing the associated data authentication operation.
The empty data thus will not be authenticated.
As this issue does not affect non-empty associated data authentication and
we expect it to be rare for an application to use empty associated data
entries this is qualified as Low severity issue.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-xh92-7747-9m8g
|
Windows Storage Elevation of Privilege Vulnerability.
|
[] | null | 7 | null | null | null |
|
CVE-2005-4552
|
The (1) slsmgr and (2) slsadmin programs in Sun Solaris PC NetLink 2.0 create temporary files insecurely, which allows local users to gain privileges.
|
[
"cpe:2.3:a:sun:solaris_pc_netlink:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2020-26050
|
SaferVPN for Windows Ver 5.0.3.3 through 5.0.4.15 could allow local privilege escalation from low privileged users to SYSTEM via a crafted openssl configuration file. This issue is similar to CVE-2019-12572.
|
[
"cpe:2.3:a:safervpn:safervpn:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-67xf-xphq-9mcc
|
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
|
[] | null | 5.3 | null | null | null |
|
GHSA-3922-2r6r-r4fv
|
MCMS allows arbitrary file uploads in the ueditor component
|
An arbitrary file upload vulnerability in the ueditor component of MCMS v5.4.3 allows attackers to execute arbitrary code via uploading a crafted file.
|
[] | null | 9.8 | null | null | null |
CVE-2025-7171
|
code-projects Crime Reporting System policelogin.php sql injection
|
A vulnerability, which was classified as critical, has been found in code-projects Crime Reporting System 1.0. Affected by this issue is some unknown functionality of the file /policelogin.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-fr23-vqw7-59xh
|
The HTML5 Responsive FAQ WordPress plugin through 2.8.5 does not properly sanitise and escape some of its settings, which could allow a high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
|
[] | null | 4.8 | null | null | null |
|
GHSA-499g-cg6q-825c
|
Passwork On-Premise Edition before 4.6.13 has multiple XSS issues.
|
[] | null | 6.1 | null | null | null |
|
CVE-2025-2116
|
Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System File Protocol imageProxy.do server-side request forgery
|
A vulnerability has been found in Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System 3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /newsedit/newsedit/xy/imageProxy.do of the component File Protocol Handler. The manipulation of the argument xyImgUrl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 4.3 | 4.3 | 4 | null |
RHSA-2021:2931
|
Red Hat Security Advisory: rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon security update
|
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode nodejs-normalize-url: ReDoS for data URLs
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | 5.3 | null | null |
GHSA-x8jj-j32x-rqj9
|
An issue in hackathon-starter v.8.1.0 allows a remote attacker to escalate privileges via the user.js component.
|
[] | null | 5.9 | null | null | null |
|
RHSA-2024:6753
|
Red Hat Security Advisory: kernel security update
|
kernel: virtio-net: Add validation for used length kernel: mm, thp: bail out early in collapse_file for writeback page kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: bpf: Fix overrunning reservations in ringbuf
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null | null |
CVE-2020-6826
|
Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 75.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-m8gw-hjpr-rjv7
|
Prototype Pollution in dojo
|
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
|
[] | null | 7.5 | null | null | null |
GHSA-pp55-j7w3-7wx3
|
A captured MAC/device ID of an iTrack Easy can be registered under multiple user accounts allowing access to getgps GPS data, which can allow unauthenticated parties to track the device.
|
[] | null | null | 5.9 | null | null |
|
GHSA-5q35-728m-23rm
|
cPanel before 80.0.5 allows demo accounts to execute arbitrary code via ajax_maketext_syntax_util.pl (SEC-498).
|
[] | null | null | null | null | null |
|
GHSA-9j4p-xxx3-cv37
|
WebKit, as used in Apple iOS before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-01-28-1.
|
[] | null | null | null | null | null |
|
GHSA-2v34-4h6v-gwwh
|
PHP remote file inclusion vulnerability in class.mysql.php in Matt Humphrey paBugs 2.0 Beta 3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path_to_bt_dir parameter.
|
[] | null | null | null | null | null |
|
CVE-2018-1000407
|
A cross-site scripting vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/Api.java that allows attackers to specify URLs to Jenkins that result in rendering arbitrary attacker-controlled HTML by Jenkins.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2025-2700
|
michelson Dante Editor Insert Link cross site scripting
|
A vulnerability classified as problematic has been found in michelson Dante Editor up to 0.4.4. This affects an unknown part of the component Insert Link Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 3.5 | 3.5 | 4 | null |
ICSA-22-104-06
|
Siemens PROFINET Stack Integrated on Interniche Stack
|
The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.
This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.
|
[] | null | 5.3 | null | null | null |
CVE-2019-8564
|
A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2025-54912
|
Windows BitLocker Elevation of Privilege Vulnerability
|
Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
GHSA-9933-5g23-6jq2
|
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
[] | null | 7.8 | null | null | null |
|
CVE-2016-8219
|
An issue was discovered in Cloud Foundry Foundation cf-release versions prior to 250 and CAPI-release versions prior to 1.12.0. A user with the SpaceAuditor role is over-privileged with the ability to restage applications. This could cause application downtime if the restage fails.
|
[
"cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
RHSA-2004:412
|
Red Hat Security Advisory: kdelibs, kdebase security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
CVE-2022-0386
|
A post-auth SQL injection vulnerability in the Mail Manager potentially allows an authenticated attacker to execute code in Sophos UTM before version 9.710.
|
[
"cpe:2.3:a:sophos:unified_threat_management:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-v6wf-5rwf-gjw6
|
Fatek FvDesigner Version 1.5.76 and prior is vulnerable to an out-of-bounds read while processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
|
[] | null | null | null | null | null |
|
ICSA-21-028-01
|
Rockwell Automation FactoryTalk Linx and FactoryTalk Services Platform
|
An attacker can craft and send an OpenNamespace message to port 4241 with valid session-id that triggers an unhandled exception in CFTLDManager::HandleRequest function in RnaDaSvr.dll, resulting in process termination. Observed in FactoryTalk Linx 6.11. All versions of FactoryTalk Linx are affected. An attacker-controlled memory allocation size can be passed to the C++ new operator in RnaDaSvr.dll by sending a specially crafted ConfigureItems message to TCP port 4241. This will cause an unhandled exception, resulting in termination of RSLinxNG.exe. Observed in FactoryTalk 6.11. All versions of FactoryTalk Linx are affected. An attacker-controlled memory allocation size can be passed to the C++ new operator in the CServerManager::HandleBrowseLoadIconStreamRequest in messaging.dll. This can be done by sending a specially crafted message to 127.0.0.1:7153. Observed in FactoryTalk Linx 6.11. All versions of FactoryTalk Linx are affected. An unauthenticated remote attacker can send data to RsvcHost.exe listening on TCP port 5241 to add entries in the FactoryTalk Diagnostics event log. The attacker can specify long fields in the log entry, which can cause an unhandled exception in wcscpy_s() if a local user opens FactoryTalk Diagnostics Viewer (FTDiagViewer.exe) to view the log entry. Observed in FactoryTalk Diagnostics 6.11. All versions of FactoryTalk Diagnostics are affected.
|
[] | null | null | 7.5 | null | null |
GHSA-vhjj-wvp5-r932
|
Directory traversal vulnerability in sqlfopenc for web-tools in SAP DB before 7.4.03.30 allows remote attackers to read arbitrary files via .. (dot dot) sequences in a URL.
|
[] | null | null | null | null | null |
|
CVE-2022-49202
|
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
Syzbot hit general protection fault in __pm_runtime_resume(). The problem
was in missing NULL check.
hu->serdev can be NULL and we should not blindly pass &serdev->dev
somewhere, since it will cause GPF.
|
[] | null | null | null | null | null |
GHSA-jfwr-hq92-w8gg
|
A heap overflow vulnerability found in EdgeRouters and Aircubes allows a malicious actor to interrupt UPnP service to said devices.
|
[] | null | null | 5.9 | null | null |
|
GHSA-v5vq-g662-p4fr
|
A vulnerability in the web UI of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
|
[] | null | null | null | null | null |
|
GHSA-6mh7-865m-mmmr
|
Microsoft Edge for Android Spoofing Vulnerability
|
[] | null | 4.3 | null | null | null |
|
CVE-2024-35230
|
Welcome and About GeoServer pages communicate version and revision information
|
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. In affected versions the welcome and about page includes version and revision information about the software in use (including library and components used). This information is sensitive from a security point of view because it allows software used by the server to be easily identified. This issue has been patched in version 2.26.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] | null | 5.3 | null | null | null |
CVE-2020-12346
|
Improper permissions in the installer for the Intel(R) Battery Life Diagnostic Tool before version 1.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:battery_life_diagnostic_tool:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
PYSEC-2021-794
| null |
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the divisor tensor does not contain zero elements. We have patched the issue in GitHub commit 1e206baedf8bef0334cca3eb92bab134ef525a28. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2019-6291
|
An issue was discovered in the function expr6 in eval.c in Netwide Assembler (NASM) through 2.14.02. There is a stack exhaustion problem caused by the expr6 function making recursive calls to itself in certain scenarios involving lots of '!' or '+' or '-' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted asm file.
|
[
"cpe:2.3:a:nasm:netwide_assembler:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-8f37-rvxv-ph9h
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EMF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18543.
|
[] | null | 5.5 | null | null | null |
|
GHSA-p22v-rx27-49wx
|
Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
CVE-2006-4127
|
Multiple format string vulnerabilities in DConnect Daemon 0.7.0 and earlier allow remote administrators to execute arbitrary code via format string specifiers that are not properly handled when calling the (1) privmsg() or (2) pubmsg functions from (a) cmd.user.c, (b) penalties.c, or (c) cmd.dc.c.
|
[
"cpe:2.3:a:dconnect:dconnect_daemon:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dconnect:dconnect_daemon:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dconnect:dconnect_daemon:0.7.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-729f-wvj3-c4pj
|
Remote code execution in UReport
|
An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code.
|
[] | null | 9.8 | null | null | null |
GHSA-xfrj-fcpr-f4m8
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zach Silberstein RLM Elementor Widgets Pack allows DOM-Based XSS.This issue affects RLM Elementor Widgets Pack: from n/a through 1.3.1.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-23198
|
Stored-XSS-LibreNMS-Display-Name in librenms
|
librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] | null | 4.6 | null | null | null |
CVE-2024-2453
|
Advantech WebAccess/SCADA SQL Injection
|
There is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.
|
[] | null | 6.4 | null | null | null |
GHSA-p24j-8j47-64q3
|
SQL injection vulnerability in search.asp in Xigla Absolute Form Processor XE 4.0 allows remote authenticated administrators to execute arbitrary SQL commands via the orderby parameter.
|
[] | null | null | null | null | null |
|
GHSA-v8wr-25mj-7jf2
|
The AsrDrv101.sys and AsrDrv102.sys low-level drivers in ASRock RGBLED before v1.0.35.1, A-Tuning before v3.0.210, F-Stream before v3.0.210, and RestartToUEFI before v1.0.6.2 expose functionality to read and write CR register values. This could be leveraged in a number of ways to ultimately run code with elevated privileges.
|
[] | null | null | 7.8 | null | null |
|
GHSA-6x34-4pjh-4442
|
iSpyConnect.com Agent DVR before 2.7.1.0 allows directory traversal.
|
[] | null | null | null | null | null |
|
CVE-2008-4613
|
SQL injection vulnerability in forums.asp in PortalApp 4.0 allows remote attackers to execute arbitrary SQL commands via the sortby parameter.
|
[
"cpe:2.3:a:portalapp:portalapp:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-7pgp-wp79-7v7r
|
XSS exists in the wp-live-chat-support v8.0.15 plugin for WordPress via the modules/gdpr.php term parameter in a wp-admin/admin.php wplivechat-menu-gdpr-page request.
|
[] | null | null | 6.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.