id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-qhxh-9hhx-6p7v
|
Prototype Pollution in GraphHopper
|
This affects the package `com.graphhopper:graphhopper-web-bundle` before 3.2, from 4.0-pre1 and before 4.0. The URL parser could be tricked into adding or modifying properties of Object.prototype using a constructor or __proto__ payload.
|
[] | null | 5.4 | null | null | null |
CVE-2020-14120
|
Some Xiaomi models have a vulnerability in a certain application. The vulnerability is caused by the lack of checksum when using a three-party application to pass in parameters, and attackers can induce users to install a malicious app and use the vulnerability to achieve elevated privileges, making the normal services of the system affected.
|
[
"cpe:2.3:o:mi:miui:12.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-mpmg-jvjx-wfhv
|
Apifox through 2.1.6 is vulnerable to Cross Site Scripting (XSS) which can lead to remote code execution.
|
[] | null | 9 | null | null | null |
|
GHSA-82cg-4f6v-jhh7
|
Heap-based buffer overflow in the zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-mxw8-6vxp-25q2
|
Cybozu Garoon 4.0.0 to 4.10.2 allows an attacker with administrative rights to cause a denial of service condition via unspecified vectors.
|
[] | null | 4.9 | null | null | null |
|
CVE-2022-27140
|
An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
|
[
"cpe:2.3:a:express-fileupload_project:express-fileupload:1.3.1:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-6g5p-c2f9-9435
|
A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.
|
[] | null | 9.1 | null | null | null |
|
GHSA-2jxv-gcmg-c9p7
|
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory, aka 'Windows Registry Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1378.
|
[] | null | 7.8 | null | null | null |
|
GHSA-j3pp-77jw-4qv6
|
A vulnerability was found in Global Scape CuteFTP 9.3.0.3 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument Host/Username/Password leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252680. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 3.3 | null | null | null |
|
CVE-1999-1107
|
Buffer overflow in kppp in KDE allows local users to gain root access via a long PATH environmental variable.
|
[
"cpe:2.3:o:kde:kde:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-vj86-92j3-rr4c
|
The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference.
|
[] | null | null | null | null | null |
|
CVE-2008-5462
|
Unspecified vulnerability in the WebLogic Portal component in BEA Product Suite 10.3, 10.2, 10.0 MP1, 9.2 MP3, and 8.1 SP6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
[
"cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-22201
|
SRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, the PFE will crash upon receipt of a malformed ESP packet
|
An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). On SRX5000 Series with SPC3, SRX4000 Series, and vSRX, when PowerMode IPsec is configured and a malformed ESP packet matching an established IPsec tunnel is received the PFE crashes. This issue affects Juniper Networks Junos OS on SRX5000 Series with SPC3, SRX4000 Series, and vSRX: All versions prior to 19.4R2-S6, 19.4R3-S7; 20.1 versions prior to 20.1R3-S3; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2.
|
[
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2021-3432
|
BT: Invalid interval in CONNECT_IND leads to Division by Zero
|
Invalid interval in CONNECT_IND leads to Division by Zero. Zephyr versions >= v1.14.0 Divide By Zero (CWE-369). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4
|
[
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2017-2646
|
It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.
|
[
"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
GHSA-89p3-9j8c-fqh4
|
User account enumeration in eZ Publish Ibexa Kernel
|
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.
|
[] | null | 5.3 | null | null | null |
GHSA-5chx-62hx-4phc
|
The Shield Security WordPress plugin before 13.0.6 does not sanitise and escape admin notes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.
|
[] | null | null | null | null | null |
|
GHSA-gccq-j7c5-rcpp
|
A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37008096.
|
[] | null | null | 7.8 | null | null |
|
GHSA-jrvg-8fmv-4qgv
|
D-Link device DI-7200GV2.E1 v21.04.09E1 was discovered to contain a command injection vulnerability in the function proxy_client.asp. This vulnerability allows attackers to execute arbitrary commands via the proxy_srv, proxy_srvport, proxy_lanip, proxy_lanport parameters.
|
[] | null | 9.8 | null | null | null |
|
GHSA-hpqh-jxqm-vm9x
|
GDidees CMS 3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Title.
|
[] | null | 5.4 | null | null | null |
|
GHSA-7vph-mg46-qvjr
|
An integer overflow was discovered in the CoAP library in Arm Mbed OS 5.14.0. The function sn_coap_builder_calc_needed_packet_data_size_2() is used to calculate the required memory for the CoAP message from the sn_coap_hdr_s data structure. Both returned_byte_count and src_coap_msg_ptr->payload_len are of type uint16_t. When added together, the result returned_byte_count can wrap around the maximum uint16_t value. As a result, insufficient buffer space is allocated for the corresponding CoAP message.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-29217
|
A remote URL redirection vulnerability was discovered in HPE OneView Global Dashboard version(s): Prior to 2.5. HPE has provided a software update to resolve this vulnerability in HPE OneView Global Dashboard.
|
[
"cpe:2.3:a:hpe:oneview_global_dashboard:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 | null |
|
CVE-2019-15396
|
The Asus ZenFone 3 Android device with a build fingerprint of asus/WW_Phone/ASUS_Z012D:7.0/NRD90M/14.2020.1708.56-20170719:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000015, versionName=7.0.0.3_161222) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
|
[
"cpe:2.3:o:asus:zenfone_3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:zenfone_3:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2016-6831
|
The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).
|
[
"cpe:2.3:a:call-cc:chicken:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-h3cr-9vp8-wwcx
|
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function fromAddressNat. The manipulation of the argument entrys/mitInterface/page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252132. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 4.7 | null | null | null |
|
GHSA-q7wx-393w-f9mv
|
Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: People Management). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | null | null | null | null |
|
CVE-2022-47377
|
Password recovery vulnerability in SICK SIM2000ST Partnumber 2086502 with firmware version <1.13.4 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 1.13.4 as soon as possible (available in SICK Support Portal).
|
[
"cpe:2.3:o:sick:sim2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sick:sim2000st:-:*:*:*:*:*:lft:*",
"cpe:2.3:h:sick:sim2000st:-:*:*:*:*:*:ppc:*"
] | null | 9.8 | null | null | null |
|
CVE-2006-2276
|
bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
|
[
"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
RHSA-2023:1268
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update
|
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests haproxy: request smuggling attack in HTTP/1 header parsing
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 8.2 | null | null | null |
CVE-2019-10292
|
A cross-site request forgery vulnerability in Jenkins Kmap Plugin in KmapJenkinsBuilder.DescriptorImpl form validation methods allows attackers to initiate a connection to an attacker-specified server.
|
[
"cpe:2.3:a:jenkins:kmap:*:*:*:*:*:jenkins:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-g62f-837m-h27x
|
Unspecified vulnerability in the Wireless component in Oracle Fusion Middleware 10.1.2.3 allows remote attackers to affect integrity via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2009-3976
|
Buffer overflow in Labtam ProFTP 2.9 allows remote FTP servers to cause a denial of service (application crash) or execute arbitrary code via a long 220 reply (aka connection greeting or welcome message).
|
[
"cpe:2.3:a:labtam-inc:proftp:2.9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2022-23614
|
Code injection in Twig
|
Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade.
|
[
"cpe:2.3:a:symfony:twig:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
RHSA-2012:1508
|
Red Hat Security Advisory: rhev-3.1.0 vdsm security, bug fix, and enhancement update
|
rhev: vds_installer insecure /tmp use rhev: vds_installer is prone to MITM when downloading 2nd stage installer
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null | null |
GHSA-x2fg-f6p4-x5j3
|
A command injection vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow an authenticated user to execute operating system commands by sending a crafted packet to the device.
|
[] | null | 8 | null | null | null |
|
GHSA-j544-7q9p-6xp8
|
Pallets Werkzeug vulnerable to Path Traversal
|
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
|
[] | null | 7.5 | null | null | null |
GHSA-34h5-p5c9-pjw6
|
libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
|
[] | null | null | null | null | null |
|
GHSA-78hf-ww5j-29fg
|
Exposure of Sensitive Information to an Unauthorized Actor in Samsung Galaxy SmartTag2 prior to 0.20.04 allows attackes to potentially identify the tag's location by scanning the BLE adversting.
|
[] | 7 | null | null | null | null |
|
CVE-2024-1478
|
The Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.0 via the REST API. This makes it possible for unauthenticated attackers to obtain post and page content via API thus bypassing the content protection provided by the plugin.
|
[
"cpe:2.3:a:helderk:maintenance_mode:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-22fp-mf44-f2mq
|
youtube-dl vulnerable to file system modification and RCE through improper file-extension sanitization
|
DescriptionThis advisory follows the security advisory [GHSA-79w7-vh3h-8g4j published by the _yt-dlp/yt-dlp_ project](https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-79w7-vh3h-8g4j) to aid remediation of the issue in the _ytdl-org/youtube-dl_ project.Vulnerability_youtube-dl_ does not limit the extensions of downloaded files, which could lead to arbitrary filenames being created in the download folder (and path traversal on Windows).ImpactSince _youtube-dl_ also reads config from the working directory (and, on Windows, executables will be executed from the _youtube-dl_ directory by default) the vulnerability could allow the unwanted execution of local code, including downloads masquerading as, eg, subtitles.PatchesThe versions of _youtube-dl_ listed as _Patched_ remediate this vulnerability by disallowing path separators and whitelisting allowed extensions. As a result, some very uncommon extensions might not get downloaded.**Master code d42a222 or later and nightly builds tagged 2024-07-03 or later** contain the remediation.WorkaroundsAny/all of the below considerations may limit exposure in case it is necessary to use a vulnerable versionhave `.%(ext)s` at the end of the output templatedownload from websites that you trustdo not download to a directory within the executable search `PATH` or other sensitive locations, such as your user directory or system directoriesin Windows versions that support it, set [`NoDefaultCurrentDirectoryInExePath`](https://stackoverflow.com/a/50118548) to prevent the _cmd_ shell's executable search adding the default directory before `PATH`consider that the path traversal vulnerability as a result of resolving `non_existent_dir\..\..\target` does not exist in Linux or macOSensure the extension of the media to download is a common video/audio/... one (use `--get-filename`)omit any of the subtitle options (`--write-subs`/` --write-srt`, `--write-auto-subs`/`--write-automatic-subs`, `--all-subs`).References[GHSA-79w7-vh3h-8g4j](https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-79w7-vh3h-8g4j)https://github.com/ytdl-org/youtube-dl/pull/32830
|
[] | null | 7.8 | null | null | null |
GHSA-rjxr-qvqf-h58w
|
There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.
|
[] | null | 8.4 | null | null | null |
|
GHSA-w4h9-w7jf-x53v
|
The Mesmerize & Materialis themes for WordPress are vulnerable to authenticated options change in versions up to, and including,1.6.89 (Mesmerize) and 1.0.172 (Materialis). This is due to 'companion_disable_popup' function only checking the nonce while sending user input to the 'update_option' function. This makes it possible for authenticated attackers to change otherwise restricted options.
|
[] | null | 8.8 | null | null | null |
|
ICSA-12-088-01A
|
Rockwell Automation FactoryTalk RNADiagReceiver
|
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet.
|
[] | null | null | null | null | null |
CVE-2023-4832
|
SQLi in Aceka Holdings Company Management
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aceka Company Management allows SQL Injection.This issue affects Company Management: before 3072 .
|
[
"cpe:2.3:a:acekaholding:company_management:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-qqw8-fx85-65hc
|
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_BlogCat.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-35873
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of ZIP files. Crafted data in a ZIP file can cause the application to execute arbitrary Python scripts. The user interface fails to provide sufficient indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16949.
|
[
"cpe:2.3:a:inductiveautomation:ignition:8.1.15:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-gjq9-gv86-9pf8
|
Windows Client Server Run-Time Subsystem (CSRSS) Elevation of Privilege Vulnerability.
|
[] | null | 7 | null | null | null |
|
GHSA-8rvj-cg4x-57wh
|
Huawei P7 before P7-L00C17B851, P7-L05C00B851, and P7-L09C92B85, and P8 ALE-UL00 before ALE-UL00B211 allows local users to cause a denial of service (OS crash) by leveraging camera permissions and via crafted input to the camera driver.
|
[] | null | null | 5.5 | null | null |
|
GHSA-hw43-m36p-rf72
|
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
|
[] | null | null | null | null | null |
|
CVE-2020-13355
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.14. A path traversal is found in LFS Upload that allows attacker to overwrite certain specific paths on the server. Affected versions are: >=8.14, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-2282-f329-v64x
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | null | null | null |
|
GHSA-m489-r2q4-329w
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Visualcomposer Visual Composer Website Builder allows Stored XSS.This issue affects Visual Composer Website Builder: from n/a through 45.6.0.
|
[] | null | 5.9 | null | null | null |
|
GHSA-x6r4-v6w5-36cr
|
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1775, CVE-2014-1779, CVE-2014-1799, CVE-2014-1803, and CVE-2014-2757.
|
[] | null | null | null | null | null |
|
CVE-2024-12305
|
Object-Level Access Control Vulnerability Allows Unauthorized Access to Student Grades in Unifiedtransform
|
An object-level access control vulnerability in Unifiedtransform version 2.0 and potentially earlier versions allows unauthorized access to student grades. A malicious student user can view grades of other students by manipulating the student_id parameter in the marks viewing endpoint. The vulnerability exists due to insufficient access control checks in MarkController.php. At the time of publication of the CVE no patch is available.
|
[
"cpe:2.3:a:unifiedtransform:unifiedtransform:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-xphv-v337-3g8j
|
MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments.
|
[] | null | null | null | null | null |
|
CVE-2024-0333
|
Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.216 allowed an attacker in a privileged network position to install a malicious extension via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2022-36885
|
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.
|
[
"cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2023-42894
|
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.2, macOS Ventura 13.6.3, macOS Monterey 12.7.2. An app may be able to access information about a user's contacts.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2024-37658
|
An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via the bbs/member_confirm.php.
|
[] | null | 6.1 | null | null | null |
|
GHSA-c8px-2q5w-fhjm
|
In Single Sign-On for Pivotal Cloud Foundry (PCF) 1.3.x versions prior to 1.3.4 and 1.4.x versions prior to 1.4.3, a user can execute a XSS attack on certain Single Sign-On service UI pages by inputting code in the text field for an organization name.
|
[] | null | 6.1 | null | null | null |
|
GHSA-6crq-w79f-g8hv
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle WebLogic Server executes to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | 5.7 | null | null | null |
|
CVE-2002-1284
|
The wizard in KGPG 0.6 through 0.8.2 does not properly provide the passphrase to gpg when creating new keys, which causes secret keys to be created with an empty passphrase and allows local attackers to steal the keys if they can be read.
|
[
"cpe:2.3:a:kgpg:kgpg:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kgpg:kgpg:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kgpg:kgpg:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kgpg:kgpg:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kgpg:kgpg:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kgpg:kgpg:0.8.2:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2021-1552
|
Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to perform command injection attacks against an affected device. These vulnerabilities are due to improper validation of user-supplied input. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the device. To exploit these vulnerabilities, the attacker must have valid administrative credentials for the device.
|
[
"cpe:2.3:o:cisco:wap125_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap131_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap351_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap361_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap361:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap581:-:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
GHSA-264w-h7gv-xm4m
|
A vulnerability, which was classified as problematic, was found in WP-Ban. Affected is an unknown function of the file ban-options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 22b925449c84faa9b7496abe4f8f5661cb5eb3bf. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216480.
|
[] | null | 6.1 | null | null | null |
|
GHSA-87ph-pvqq-3qvh
|
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
|
[] | null | null | null | null | null |
|
CVE-2015-0059
|
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted TrueType font, aka "TrueType Font Parsing Remote Code Execution Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2019-15646
|
The rsvpmaker plugin before 6.2 for WordPress has SQL injection.
|
[
"cpe:2.3:a:carrcommunications:rsvpmaker:*:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-hhf6-hx47-q457
|
An authentication bypass vulnerability was found in Videx's CyberAudit-Web. Through the exploitation of a logic flaw, an attacker could create a valid session without any credentials. This vulnerability has been patched in versions later than 9.5 and a patch has been made available to all instances of CyberAudit-Web, including the versions that are End of Maintenance (EOM). Anyone that requires support with the resolution of this issue can contact [email protected] for assistance.
|
[] | 9.3 | null | null | null | null |
|
CVE-2016-2970
|
IBM Sametime 8.5 and 9.0 meetings server may provide detailed information in an error message that may provide details about the application to possible attackers. IBM X-Force ID: 113851.
|
[
"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.1:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
GHSA-r47x-v4ww-q7cr
|
Directory traversal vulnerability in the Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to upload files to arbitrary locations via a .. (dot dot) in a request.
|
[] | null | null | null | null | null |
|
GHSA-9v4j-g8j9-mmgr
|
Multiple cross-site scripting (XSS) vulnerabilities in Plume CMS 1.2.4 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the u_email parameter (aka Authors Email field) to manager/users.php, (2) the u_realname parameter (aka Authors Name field) to manager/users.php, or (3) the c_author parameter (aka Author field) in an ADD A COMMENT section.
|
[] | null | null | null | null | null |
|
CVE-2024-56595
|
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
|
In the Linux kernel, the following vulnerability has been resolved:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
When the value of lp is 0 at the beginning of the for loop, it will
become negative in the next assignment and we should bail out.
|
[] | null | 7.8 | null | null | null |
CVE-2021-30468
|
Apache CXF Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter
|
A vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service, which results in the thread getting stuck in an infinite loop, consuming CPU indefinitely. This issue affects Apache CXF versions prior to 3.4.4; Apache CXF versions prior to 3.3.11.
|
[
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomee:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
CVE-2025-23894
|
WordPress wp-flickr-press Plugin <= 2.6.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tatsuya Fukata, Alexander Ovsov wp-flickr-press allows Reflected XSS. This issue affects wp-flickr-press: from n/a through 2.6.4.
|
[] | null | 7.1 | null | null | null |
GHSA-2m74-x26c-g7xc
|
Missing permission checks in Mac Plugin
|
A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.
|
[] | null | 4.3 | null | null | null |
GHSA-5pvm-xfh9-cf8m
|
The ParamTraits<SkBitmap>::Read function in common/common_param_traits.cc in Google Chrome before 4.0.249.78 does not initialize the memory locations that will hold bitmap data, which might allow remote attackers to obtain potentially sensitive information from process memory by providing insufficient data, related to use of a (1) thumbnail database or (2) HTML canvas.
|
[] | null | null | null | null | null |
|
CVE-2013-7447
|
Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-hj67-mggc-gx7v
|
Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries.
|
[] | null | null | null | null | null |
|
CVE-2013-0742
|
Stack-based buffer overflow in Corel PDF Fusion 1.11 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long ZIP directory entry name in an XPS file.
|
[
"cpe:2.3:a:corel:pdf_fusion:1.11:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2024-8566
|
code-projects Online Shop Store settings.php cross site scripting
|
A vulnerability classified as problematic was found in code-projects Online Shop Store 1.0. This vulnerability affects unknown code of the file /settings.php. The manipulation of the argument error leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:online_shop_store_project:online_shop_store:1.0:*:*:*:*:*:*:*"
] | 6.9 | 4.3 | 4.3 | 5 | null |
GHSA-rgxv-h9h8-fc97
|
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
|
[] | null | null | null | null | null |
|
GHSA-9v9j-h73g-wgrg
|
Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to read arbitrary files via a crafted resource request, aka Bug ID CSCus95603.
|
[] | null | null | null | null | null |
|
CVE-2013-0674
|
Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter.
|
[
"cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-23945
|
Apache ShenYu missing authentication allows gateway registration
|
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
|
[
"cpe:2.3:a:apache:shenyu:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:shenyu:2.4.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
GHSA-95fh-3xq2-rfcx
|
The Rest API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server - Community Edition, TIBCO JasperReports Server - Developer Edition, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for ActiveMatrix BPM, and TIBCO JasperReports Server for Microsoft Azure contain a race condition that allows a low privileged authenticated attacker via the REST API to obtain read access to temporary objects created by other users on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions 7.2.1 and below, TIBCO JasperReports Server: versions 7.5.0 and 7.5.1, TIBCO JasperReports Server: version 7.8.0, TIBCO JasperReports Server: version 7.9.0, TIBCO JasperReports Server - Community Edition: versions 7.8.0 and below, TIBCO JasperReports Server - Developer Edition: versions 7.9.0 and below, TIBCO JasperReports Server for AWS Marketplace: versions 7.9.0 and below, TIBCO JasperReports Server for ActiveMatrix BPM: versions 7.9.0 and below, and TIBCO JasperReports Server for Microsoft Azure: version 7.8.0.
|
[] | null | null | null | null | null |
|
CVE-2018-2644
|
Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Worklist). Supported versions that are affected are 7.x, 8.0.x and 8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Argus Safety. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Argus Safety, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Argus Safety accessible data as well as unauthorized read access to a subset of Oracle Argus Safety accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:argus_safety:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:argus_safety:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:argus_safety:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:argus_safety:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:argus_safety:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:argus_safety:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:argus_safety:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:argus_safety:8.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 | null |
|
GHSA-x2p9-gm8g-4xvp
|
Media CP Media Control Panel latest version. CSRF possible through unspecified endpoint.
|
[] | null | 8.8 | null | null | null |
|
CVE-2024-42452
|
A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.
|
[
"cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-8hrh-hhv8-xf2w
|
A vulnerability has been identified in Polarion ALM (All versions). The affected product is vulnerable due to weak file and folder permissions in the installation path. An attacker with local access could exploit this vulnerability to escalate privileges to NT AUTHORITY\SYSTEM.
|
[] | null | 7.8 | null | null | null |
|
GHSA-28gq-4675-4x28
|
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-xwxc-4fjj-x6vq
|
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1240, CVE-2019-1241, CVE-2019-1242, CVE-2019-1243, CVE-2019-1246, CVE-2019-1248, CVE-2019-1249, CVE-2019-1250.
|
[] | null | null | null | null | null |
|
GHSA-mjj8-2wvx-jfh5
|
lockmail in maildrop before 1.5.3 does not drop privileges before executing commands, which allows local users to gain privileges via command line arguments.
|
[] | null | null | null | null | null |
|
CVE-2025-25061
|
Unintended proxy or intermediary ('Confused Deputy') issue exists in HMI ViewJet C-more series and HMI GC-A2 series, which may allow a remote unauthenticated attacker to use the product as an intermediary for FTP bounce attack.
|
[] | null | null | 5.8 | null | null |
|
GHSA-j3qf-mq3f-rgcf
|
A Local File Inclusion (LFI) vulnerability exists in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before, which allows an attacker to manipulate the "language" cookie to include arbitrary files from the server. This vulnerability can be exploited to disclose sensitive information.
|
[] | null | 5.9 | null | null | null |
|
CVE-2016-0145
|
The font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold and 1511; Office 2007 SP3 and 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, and 3.5.1; Skype for Business 2016; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
GHSA-c9c5-qfx2-vp6f
|
The Diabetic Diet Guide (aka com.wDiabeticDietGuide) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-hwcx-wqpq-hqjc
|
In lppTransposer of lpp_tran.cpp there is a possible out of bounds write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-112160868.
|
[] | null | 7.8 | null | null | null |
|
GHSA-58f3-9f67-m3m5
|
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'feedzy_wizard_step_process' and 'import_status' functions in all versions up to, and including, 4.4.2. This makes it possible for authenticated attackers, with Contributor access and above, who are normally restricted to only being able to create posts rather than pages, to draft and publish posts with arbitrary content.
|
[] | null | 6.5 | null | null | null |
|
GHSA-3p7r-f88q-xv28
|
The Easy Social Like Box – Popup – Sidebar Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cardoza_facebook_like_box' shortcode in all versions up to, and including, 4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-f7x9-gh37-cj3v
|
Cross-site scripting vulnerability exists in MF Teacher Performance Management System version 6. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product.
|
[] | null | 6.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.