id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2017-17779
|
Paid To Read Script 2.0.5 has SQL injection via the referrals.php id parameter.
|
[
"cpe:2.3:a:paid_to_read_script_project:paid_to_read_script:2.0.5:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-6ggq-69xw-3g87
|
The Platform component of Mitel OpenScape 4000 and OpenScape 4000 Manager through V10 R1.54.1 and V11 through R0.22.1 could allow an authenticated attacker to conduct a privilege escalation attack due to the execution of a resource with unnecessary privileges. A successful exploit could allow an attacker to execute arbitrary commands with elevated privileges.
|
[] | null | 7.3 | null | null | null |
|
GHSA-cx98-m4w9-fjjw
|
Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page.
|
[] | null | 5.4 | null | null | null |
|
cisco-sa-webex-brutef-hostkey-FWRMxVF
|
Cisco Webex Meetings and Cisco Webex Meetings Server Host Key Brute Forcing Vulnerability
|
A vulnerability in the reclaim host role feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to take over the host role during a meeting.
This vulnerability is due to a lack of protection against brute forcing of the host key. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Webex Meetings Server site. A successful exploit would require the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. A successful exploit could allow the attacker to acquire or take over the host role for a meeting.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 5.4 | null | null | null |
CVE-2008-0716
|
The agent in Symantec Altiris Notification Server before 6.0 SP3 R7 allows local users to gain privileges via a "Shatter" style attack.
|
[
"cpe:2.3:a:symantec:altiris_notification_server:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-9524
|
Privilege Escalation Vulnerability in Avira Prime Version 1.1.96.2
|
Link Following Local Privilege Escalation Vulnerability in System Speedup Service in Avira Operations GmbH Avira Prime Version 1.1.96.2 on Windows 10 x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.
|
[] | null | 7.8 | null | null | null |
cisco-sa-adeos-MLAyEcvk
|
Cisco Evolved Programmable Network Manager, Cisco Identity Services Engine, and Cisco Prime Infrastructure Command Injection Vulnerabilities
|
Multiple vulnerabilities in the restricted shell of Cisco Evolved Programmable Network Manager (EPNM), Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to escape the restricted shell and gain root privileges on the underlying operating system.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
|
[] | null | 7.8 | null | null | null |
CVE-2022-39350
|
@dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via Vulnerability Details
|
@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library Showdown. Showdown does not have any XSS countermeasures built in, and versions before 4.6.1 of the Dependency-Track frontend did not encode or sanitize Showdown's output. This made it possible for arbitrary JavaScript included in vulnerability details via HTML attributes to be executed in context of the frontend. Actors with the `VULNERABILITY_MANAGEMENT` permission can exploit this weakness by creating or editing a custom vulnerability and providing XSS payloads in any of the following fields: Description, Details, Recommendation, or References. The payload will be executed for users with the `VIEW_PORTFOLIO` permission when browsing to the modified vulnerability's page. Alternatively, malicious JavaScript could be introduced via any of the vulnerability databases mirrored by Dependency-Track. However, this attack vector is highly unlikely, and the maintainers of Dependency-Track are not aware of any occurrence of this happening. Note that the `Vulnerability Details` element of the `Audit Vulnerabilities` tab in the project view is not affected. The issue has been fixed in frontend version 4.6.1.
|
[
"cpe:2.3:a:owasp:dependency-track_frontend:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-4j5h-m38g-3w87
|
School Management Software PHP/mySQL through 2019-03-14 allows office_admin/?action=addadmin CSRF to add an administrative user.
|
[] | null | null | null | null | null |
|
GHSA-x847-vxvj-g6rj
|
An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unauthenticated user to issue a filter that allows searching for database items they do not have access to, including but not limited to potentially userPassword hashes and other sensitive data.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2025:4654
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Information Disclosure of /tmp directory listing thunderbird: Leak of hashed Window credentials via crafted attachment URL thunderbird: User Interface (UI) Misrepresentation of attachment URL
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.4 | null | null | null |
GHSA-j2w3-9x2h-3h37
|
The keystore file in Unicore Client before 5.6 build 5, when running on Unix systems, has insecure default permissions, which allows local users to obtain sensitive information.
|
[] | null | null | null | null | null |
|
CVE-2023-0854
|
Buffer overflow in NetBIOS QNAME registering and communication process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
|
[
"cpe:2.3:o:canon:mf642cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf642cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf644cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf644cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf741cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf741cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf743cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf743cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf745cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf745cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp621c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp621c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp661c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp661c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp662c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp662c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf262dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf262dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf264dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf264dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf267dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf267dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_vp_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_vp_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf272dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf272dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf273dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf273dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf275dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf275dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf746cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf746cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp122dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp122dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g3270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g3270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g4270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g4270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx3020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx3020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx4020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp621cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp621cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp633cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp633cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp664cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp664cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf643cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf643cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf645cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf645cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf742cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf742cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf744cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf744cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf746cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf746cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127if_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127if:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127p:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-8prv-26x4-96jv
|
An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted.
|
[] | null | 9.8 | null | null | null |
|
GHSA-xq9h-8fc9-wr6w
|
TUTOS 1.3 does not restrict access to php/admin/cmd.php, which allows remote attackers to execute arbitrary shell commands via the cmd parameter in a direct request.
|
[] | null | null | null | null | null |
|
cisco-sa-mso-authbyp-bb5GmBQv
|
Cisco ACI Multi-Site Orchestrator Application Services Engine Deployment Authentication Bypass Vulnerability
|
A vulnerability in an API endpoint of Cisco ACI Multi-Site Orchestrator (MSO) installed on the Application Services Engine could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
The vulnerability is due to improper token validation on a specific API endpoint. An attacker could exploit this vulnerability by sending a crafted request to the affected API. A successful exploit could allow the attacker to receive a token with administrator-level privileges that could be used to authenticate to the API on affected MSO and managed Cisco Application Policy Infrastructure Controller (APIC) devices.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-authbyp-bb5GmBQv ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-authbyp-bb5GmBQv"]
|
[] | null | 10 | null | null | null |
GHSA-p25p-77fc-q58p
|
The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Post(v2) block title tag in all versions up to, and including, 3.12.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2018-9386
|
In reboot_block_command of htc reboot_block driver, there is a possible
stack buffer overflow due to a missing bounds check. This could lead to
local escalation of privilege with System execution privileges needed. User
interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-g5w2-92px-9hwf
|
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.
|
[] | null | 7.8 | null | null | null |
|
GHSA-4g85-9mh4-6cw4
|
An Incorrect Default Permissions vulnerability in saphanabootstrap-formula of SUSE Linux Enterprise Module for SAP Applications 15-SP1, SUSE Linux Enterprise Server for SAP 12-SP5; openSUSE Leap 15.4 allows local attackers to escalate to root by manipulating the sudo configuration that is created. This issue affects: SUSE Linux Enterprise Module for SAP Applications 15-SP1 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e. SUSE Linux Enterprise Server for SAP 12-SP5 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e. openSUSE Leap 15.4 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-31101
|
WordPress AI Twitter Feeds (Twitter widget & shortcode) plugin <= 2.4 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in August Infotech AI Twitter Feeds (Twitter widget & shortcode) allows Stored XSS.This issue affects AI Twitter Feeds (Twitter widget & shortcode): from n/a through 2.4.
|
[] | null | 6.5 | null | null | null |
GHSA-jp7v-qrg5-7cg7
|
ColdFusion versions ColdFusion 2016, and ColdFusion 2018 have an insufficient input validation vulnerability. Successful exploitation could lead to application-level denial-of-service (dos).
|
[] | null | null | null | null | null |
|
CVE-2019-15518
|
Swoole before 4.2.13 allows directory traversal in swPort_http_static_handler.
|
[
"cpe:2.3:a:swoole:swoole:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
GHSA-gc49-49f8-g9x5
|
Unspecified vulnerability in Sun Solaris 9 and 10 for the x86 platform allows local users to gain privileges or cause a denial of service (panic) via unspecified vectors, possibly involving functions from the mm driver.
|
[] | null | null | null | null | null |
|
CVE-2012-3229
|
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Siebel Documentation.
|
[
"cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2013-4457
|
The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation.
|
[
"cpe:2.3:a:thoughtbot:cocaine:0.4.0:-:*:*:*:ruby:*:*",
"cpe:2.3:a:thoughtbot:cocaine:0.4.1:-:*:*:*:ruby:*:*",
"cpe:2.3:a:thoughtbot:cocaine:0.4.2:-:*:*:*:ruby:*:*",
"cpe:2.3:a:thoughtbot:cocaine:0.5.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:thoughtbot:cocaine:0.5.1:-:*:*:*:ruby:*:*",
"cpe:2.3:a:thoughtbot:cocaine:0.5.2:-:*:*:*:ruby:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-43w3-fxw8-8m47
|
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.
|
[] | null | 4.3 | null | null | null |
|
CVE-2016-7103
|
Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
|
[
"cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:hospitality_cruise_fleet_management:9.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oss_support_tools:2.12.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-gjv3-89hh-9xq2
|
RISC Zero Ethereum invalid commitment with digest value of zero accepted by Steel.validateCommitment
|
ImpactPrior to 2.1.1 and 2.2.0, the `Steel.validateCommitment` Solidity library function will return `true` for a crafted commitment with a digest value of zero.This violates the semantics of `validateCommitment`, as this does not commitment to a block that is in the current chain. Because the digest is zero, it does not correspond to any block and there exist no known openings. As a result, this commitment will never be produced by a correct zkVM guest using Steel. Leveraging this bug to compromise the soundness of an application using Steel would require a separate bug or misuse of the Steel library, which is expected to be used to validate the root of state opening proofs (e.g. having the guest commit to a digest of zero, or failing to check the zkVM proof).Because this bug does not risk application integrity, correctly written applications are not at risk.FixPlease see [#605] for a full description of the bug, and the fix. This fix has been released as part of `risc0-ethereum` [2.1.1] and [2.2.0].Recommended actionsUsers for the `Steel` Solidity library versions 2.1.0 or earlier should ensure they are using `Steel.validateCommitment` in tandem with zkVM proof verification of a Steel program, as shown in the [ERC-20 counter example][example], and [documentation]. This is the correct usage of Steel, and users following this pattern are not at risk, and do not need to take action.Users not verifying a zkVM proof of a Steel program should update their application to do so, as this is incorrect usage of Steel.CreditA thank you to Daniel526 on HackenProof for reporting this issue
|
[] | 1.7 | null | null | null | null |
GHSA-m9hc-wxjx-cx33
|
Schweitzer Engineering Laboratories (SEL) SEL-2241, SEL-3505, and SEL-3530 RTAC master devices allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line.
|
[] | null | null | null | null | null |
|
CVE-2024-5602
|
Stack-based Buffer Overflow Vulnerability in NI I/O Trace Tool
|
A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.
The NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products. Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.
|
[
"cpe:2.3:a:ni:system_configuration:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
cisco-sa-ndb-path-traversal-wVDyXZPy
|
Cisco Nexus Data Broker Software Path Traversal Vulnerability
|
A vulnerability in the configuration restore feature of Cisco Nexus Data Broker software could allow an unauthenticated, remote attacker to perform a directory traversal attack on an affected device.
The vulnerability is due to insufficient validation of configuration backup files. An attacker could exploit this vulnerability by persuading an administrator to restore a crafted configuration backup file. A successful exploit could allow the attacker to overwrite arbitrary files that are accessible through the affected software on an affected device.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-path-traversal-wVDyXZPy ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-path-traversal-wVDyXZPy"]
|
[] | null | 5.4 | null | null | null |
RHSA-2018:2785
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact
|
[
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.5 | null | null |
CVE-2024-3858
|
It was possible to mutate a JavaScript object so that the JIT could crash while tracing it. This vulnerability affects Firefox < 125.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-wgr4-cghw-q97x
|
Microsoft SharePoint Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
GHSA-592v-7frm-h44q
|
Cross-site scripting in LavaLite-CMS
|
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature.
|
[] | null | 4.8 | null | null | null |
CVE-2021-23008
|
On version 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and all versions of 16.0.x and 11.6.x., BIG-IP APM AD (Active Directory) authentication can be bypassed via a spoofed AS-REP (Kerberos Authentication Service Response) response sent over a hijacked KDC (Kerberos Key Distribution Center) connection or from an AD server compromised by an attacker. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2008-4468
|
SQL injection vulnerability in view_news.php in Vastal I-Tech Share Zone allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:vastal_i-tech:share_zone:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-6mrg-72v5-5vgp
|
axis-cgi/buffer/command.cgi on the AXIS 207W camera allows remote authenticated users to cause a denial of service (reboot) via many requests with unique buffer names in the buffername parameter in a start action.
|
[] | null | null | null | null | null |
|
CVE-2025-25799
|
SeaCMS 13.3 was discovered to contain an arbitrary file read vulnerability in the file_get_contents function at admin_safe.php.
|
[] | null | 6 | null | null | null |
|
CVE-2023-49807
|
Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
|
[
"cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
RHSA-2023:5534
|
Red Hat Security Advisory: libvpx security update
|
libvpx: Heap buffer overflow in vp8 encoding in libvpx libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null | null |
GHSA-w89r-qch4-8jv5
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
|
[] | null | null | 7.5 | null | null |
GHSA-8296-pfrx-5qgf
|
The Send PDF for Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of form submissions due to a missing capability check on the hooks function in all versions up to, and including, 1.0.2.3. This makes it possible for unauthenticated attackers to download information about contact form entries with PDFs.
|
[] | null | 5.3 | null | null | null |
|
RHSA-2023:5801
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null | null |
GHSA-382v-gxj9-ffhc
|
Moodle uses predictable password-recovery tokens
|
lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 relies on the PHP mt_rand function to implement the random_string and complex_random_string functions, which makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.
|
[] | null | null | 7.5 | null | null |
CVE-2023-21188
|
In btm_ble_update_inq_result of btm_ble_gap.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-264624283
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
|
GHSA-jj4v-f22v-8gx6
|
Format string vulnerability in panoFileOutputNamesCreate() in libpano13 2.9.20~rc2+dfsg-3 and earlier can lead to read and write arbitrary memory values.
|
[] | null | 9.8 | null | null | null |
|
CVE-2002-1355
|
Multiple integer signedness errors in the BGP dissector in Ethereal 0.9.7 and earlier allow remote attackers to cause a denial of service (infinite loop) via malformed messages.
|
[
"cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-gfv5-27qx-cv4m
|
The Script.aculo.us framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
|
[] | null | null | null | null | null |
|
CVE-2025-25789
|
FoxCMS v1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the index() method at \controller\Sitemap.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-pv7v-vc94-gf6c
|
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
|
[] | null | null | 7.8 | null | null |
|
CVE-2022-28809
|
An issue was discovered in Open Design Alliance Drawings SDK before 2023.3. An Out-of-Bounds Read vulnerability exists when reading a DWG file with an invalid vertex number in a recovery mode. An attacker can leverage this vulnerability to execute code in the context of the current process.
|
[
"cpe:2.3:a:opendesign:drawings_sdk:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-5wmw-jp84-f33g
|
A DOM based XSS vulnerability has been identified in the Netstorage component of Open Enterprise Server (OES) allowing a remote attacker to execute javascript in the victims browser by tricking the victim into clicking on a specially crafted link. This affects OES versions OES2015SP1, OES2018, and OES2018SP1. Older versions may be affected but were not tested as they are out of support.
|
[] | null | null | 6.1 | null | null |
|
CVE-2007-5326
|
Multiple buffer overflows in (1) RPC and (2) rpcx.dll in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allow remote attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*",
"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_premium:*:*:*:*:*",
"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_standard:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2012-1143
|
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
|
[
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:10.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-mgxx-v5wq-f4gr
|
The Save as PDF Plugin by Pdfcrowd plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'save_as_pdf_pdfcrowd' shortcode in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2011-10006
|
GamerZ WP-PostRatings wp-postratings.php cross site scripting
|
A vulnerability was found in GamerZ WP-PostRatings up to 1.64. It has been classified as problematic. This affects an unknown part of the file wp-postratings.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.65 is able to address this issue. The identifier of the patch is 6182a5682b12369ced0becd3b505439ce2eb8132. It is recommended to upgrade the affected component. The identifier VDB-259629 was assigned to this vulnerability.
|
[] | null | 3.5 | 3.5 | 4 |
https://github.com/wp-plugins/wp-postratings/commit/dcc68d03693152eba14d6fb33ba42528ff60e06a
|
GHSA-cg99-4rfx-5jw8
|
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check on integer overflow while calculating memory can lead to Buffer overflow in WLAN ext scan handler.
|
[] | null | null | 7.8 | null | null |
|
CVE-2009-2229
|
Directory traversal vulnerability in engine.php in Kasseler CMS 1.3.5 lite allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter during a download action, a different vector than CVE-2008-3087. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:kasseler-cms:kasseler_cms:1.3.5:*:lite:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-5564
|
android-tools 4.1.1 in Android Debug Bridge (ADB) allows local users to overwrite arbitrary files via a symlink attack on /tmp/adb.log.
|
[
"cpe:2.3:a:google:android_debug_bridge:-:*:*:*:*:*:*:*"
] | null | null | null | 3.3 | null |
|
CVE-2022-31735
|
OpenAM Consortium Edition version 14.0.0 provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601). When accessing an affected server through some specially crafted URL, the user may be redirected to an arbitrary website.
|
[
"cpe:2.3:a:osstech:openam:*:*:*:*:consortium:*:*:*"
] | null | 6.1 | null | null | null |
|
PYSEC-2013-45
| null |
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
|
[] | null | null | null | null | null |
CVE-2019-9857
|
In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 | null |
|
RHSA-2012:1604
|
Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update
|
jetty: hash table collisions CPU usage DoS (oCERT-2011-003) jruby: Murmur hash function collisions (oCERT-2012-001)
|
[
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
] | null | null | null | null | null |
GHSA-r3gw-8h4f-4g9j
|
Aigital Wireless-N Repeater Mini_Router v0.131229 was discovered to contain a remote code execution (RCE) vulnerability via the sysCmd parameter in the formSysCmd function. This vulnerability is exploited via a crafted HTTP request.
|
[] | null | 9.8 | null | null | null |
|
GHSA-g3r7-vvpq-v8qq
|
Unexpected injection event vulnerability in the multimodalinput module.
Impact: Successful exploitation of this vulnerability may affect availability.
|
[] | null | 5.7 | null | null | null |
|
CVE-2017-16367
|
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a type confusion overflow vulnerability. The vulnerability leads to an out of bounds memory access. Attackers can exploit the vulnerability by using the out of bounds access for unintended reads or writes -- potentially leading to code corruption, control-flow hijack, or an information leak attack.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
GHSA-8qx3-r7r6-wmf9
|
Cross-Site Request Forgery (CSRF) vulnerability in KaizenCoders Enable Latex allows Stored XSS. This issue affects Enable Latex: from n/a through 1.2.16.
|
[] | null | 7.1 | null | null | null |
|
GHSA-gvcm-7pcm-j9rm
|
Unknown vulnerability in HP Process Resource Manager (PRM) C.02.01[.01] and earlier, as used by HP-UX Workload Manager (WLM), allows local users to corrupt data files.
|
[] | null | null | null | null | null |
|
CVE-2016-1436
|
The General Packet Radio Switching Tunneling Protocol 1 (aka GTPv1) implementation on Cisco ASR 5000 Packet Data Network Gateway devices before 19.4 allows remote attackers to cause a denial of service (Session Manager process restart) via a crafted GTPv1 packet, aka Bug ID CSCuz46198.
|
[
"cpe:2.3:a:cisco:asr_5000_software:17.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:17.2.0.59184:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:17.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:17.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.0.0.57828:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.0.0.59167:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.0.0.59211:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.0.l0.59219:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.1.0.59776:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.1.0.59780:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.1_base:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:18.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.0.m0.60737:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.0.m0.60828:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.0.m0.61045:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.1.0.61559:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_software:19.3.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-r9fv-qpm9-rj4g
|
Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch
|
Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This could allow an authenticated Elasticsearch user to improperly view these details.
|
[] | null | 8.8 | null | null | null |
GHSA-qqwm-cf3v-v53f
|
Portal Search allows remote attackers to redirect a URL to an arbitrary web site by placing the URL in the query string to the top-level URI.
|
[] | null | null | null | null | null |
|
CVE-2018-20899
|
cPanel before 71.9980.37 allows stored XSS in the WHM cPAddons installation interface (SEC-398).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-vxg7-m3mm-xp7q
|
The dirac_unpack_idwt_params function in libavcodec/diracdec.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted Dirac data.
|
[] | null | null | null | null | null |
|
GHSA-7fmj-22mc-jr8j
|
The D-Bus security policy files in /etc/dbus-1/system.d/*.conf in fso-gsmd 0.12.0-3, fso-frameworkd 0.9.5.9+git20110512-4, and fso-usaged 0.12.0-2 as packaged in Debian, the upstream cornucopia.git (fsoaudiod, fsodatad, fsodeviced, fsogsmd, fsonetworkd, fsotdld, fsousaged) git master on 2015-01-19, the upstream framework.git 0.10.1 and git master on 2015-01-19, phonefsod 0.1+git20121018-1 as packaged in Debian, Ubuntu and potentially other packages, and potentially other fso modules do not properly filter D-Bus message paths, which might allow local users to cause a denial of service (dbus-daemon memory consumption), or execute arbitrary code as root by sending a crafted D-Bus message to any D-Bus system service.
|
[] | null | null | 7.8 | null | null |
|
CVE-2017-11139
|
GraphicsMagick 1.3.26 has double free vulnerabilities in the ReadOneJNGImage() function in coders/png.c.
|
[
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-gvh9-829f-59hr
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes WC Builder allows Stored XSS.This issue affects WC Builder: from n/a through 1.0.18.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-21021
|
Out-of-bounds write in drawing pinpad in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory.
|
[] | null | 5.7 | null | null | null |
|
GHSA-rxg3-r5j8-3qv5
|
A vulnerability has been found in Modbus Tools Modbus Slave up to 7.5.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file mbslave.exe of the component mbs File Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217021 was assigned to this vulnerability.
|
[] | null | 7.8 | null | null | null |
|
GHSA-fxf5-95g5-f94p
|
A vulnerability in Cisco Nexus Dashboard could allow an authenticated, remote attacker to write arbitrary files on an affected device. This vulnerability is due to insufficient input validation in the web-based management interface of Cisco Nexus Dashboard. An attacker with Administrator credentials could exploit this vulnerability by uploading a crafted file. A successful exploit could allow the attacker to overwrite arbitrary files on an affected device.
|
[] | null | 6.5 | null | null | null |
|
GHSA-8rxr-vx8g-7w4h
|
Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400.
|
[] | null | null | null | null | null |
|
CVE-2014-3219
|
fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.
|
[
"cpe:2.3:a:fishshell:fish:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.3 | null |
|
CVE-2019-16866
|
Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.
|
[
"cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2008-6401
|
SQL injection vulnerability in sayfa.php in JETIK-WEB allows remote attackers to execute arbitrary SQL commands via the kat parameter.
|
[
"cpe:2.3:a:jetik:jetik-web:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-20698
|
Windows Kernel Elevation of Privilege Vulnerability
|
Windows Kernel Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-f56x-x9fh-2r45
|
A Server-side request forgery (SSRF) vulnerability in the ProductConfig servlet in Zoho ManageEngine ADSelfService Plus through 6013 allows a remote unauthenticated attacker to perform blind HTTP requests or perform a Cross-site scripting (XSS) attack against the administrative interface via an HTTP request, a different vulnerability than CVE-2019-3905.
|
[] | null | 6.1 | null | null | null |
|
GHSA-p434-7834-2w5x
|
: Relative Path Traversal vulnerability in B&R Industrial Automation Automation Studio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Automation Studio: from 4.0 through 4.12.
|
[] | null | 6.3 | null | null | null |
|
CVE-2006-0772
|
SQL injection vulnerability in Hitachi Business Logic - Container 02-03 through 03-00-/B on Windows, and 03-00 through 03-00-/B on Linux, allows remote attackers to execute arbitrary SQL commands via unspecified vectors in the extended receiving box function.
|
[
"cpe:2.3:a:hitachi:business_logic:*:*:linux:*:*:*:*:*",
"cpe:2.3:a:hitachi:business_logic:*:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:business_logic:02_03:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:business_logic:03_00:*:linux:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-37882
|
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities.
|
[
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2008-0639
|
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854. NOTE: this issue exists because of an incomplete fix for CVE-2007-6701.
|
[
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:client:4.91:sp2:*:*:*:*:*:*",
"cpe:2.3:a:novell:client:4.91:sp3:*:*:*:*:*:*",
"cpe:2.3:a:novell:client:4.91:sp4:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-cc99-x3h3-44pj
|
ImageMagick 7.0.7-1 and older version are vulnerable to null pointer dereference in the MagickCore component and might lead to denial of service
|
[] | null | 6.5 | null | null | null |
|
GHSA-7x6j-p2wp-qwwf
|
Dell PowerFlex Manager VM, versions prior to 4.6.2.1, contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the system with privileges of the compromised account.
|
[] | null | 4.3 | null | null | null |
|
GHSA-8h2f-qm6x-vhvp
|
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).
|
[] | null | 8.4 | null | null | null |
|
CVE-2008-6891
|
Multiple cross-site scripting (XSS) vulnerabilities in ASP Forum Script allow remote attackers to inject arbitrary web script or HTML via the (1) forum_id parameter to (a) new_message.asp and (b) messages.asp, and the (2) query string to default.asp.
|
[
"cpe:2.3:a:codetoad:asp_forum_script:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-22501
|
An authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances_._ With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into. Access to these tokens can be obtained in two cases:
* If the attacker is included on Jira issues or requests with these users, or
* If the attacker is forwarded or otherwise gains access to emails containing a “View Request” link from these users.
Bot accounts are particularly susceptible to this scenario. On instances with single sign-on, external customer accounts can be affected in projects where anyone can create their own account.
|
[
"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",
"cpe:2.3:a:atlassian:jira_service_management:5.5.0:*:*:*:data_center:*:*:*",
"cpe:2.3:a:atlassian:jira_service_management:5.5.0:*:*:*:server:*:*:*"
] | null | null | 9.4 | null | null |
|
CVE-2021-41495
|
Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place
|
[
"cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 3.5 | null |
|
PYSEC-2022-43016
| null |
A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 is able to address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability.
|
[] | null | null | null | null | null |
CVE-2022-35206
|
Null pointer dereference vulnerability in Binutils readelf 2.38.50 via function read_and_display_attr_value in file dwarf.c.
|
[
"cpe:2.3:a:gnu:binutils:2.38.50:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2001-1263
|
telnet95.exe in Pragma InterAccess 4.0 build 5 allows remote attackers to cause a denial of service (crash) via a large number of characters to port 23, possibly due to a buffer overflow.
|
[
"cpe:2.3:a:pragma_systems:interaccess:4.0_build_5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.