id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2019:2004
|
Red Hat Security Advisory: icedtea-web security update
|
icedtea-web: unsigned code injection in a signed JAR file icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.2 | null | null |
CVE-2019-6784
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It allows XSS (issue 1 of 2). Markdown fields contain a lack of input validation and output encoding when processing KaTeX that results in a persistent XSS.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2022-31747
|
Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2024-39396
|
Adobe Indesign 2024 PCX File Parsing Out Of Bound Read
|
InDesign Desktop versions ID18.5.2, ID19.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-55vp-gmh3-7chh
|
A Blind SQL injection vulnerability exists in the /DataHandler/Handler_CFG.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter keyword before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.
|
[] | null | null | null | null | null |
|
GHSA-79v6-pg2f-3mmc
|
FrontRange GoldMine mail agent 5.70 and 6.00 before 30503 directly sends HTML to the default browser without setting its security zone or otherwise labeling it untrusted, which allows remote attackers to execute arbitrary code via a message that is rendered in IE using a less secure zone.
|
[] | null | null | null | null | null |
|
CVE-2025-23471
|
WordPress ECT Add to Cart Button plugin <= 1.4 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Andy Chapman ECT Add to Cart Button allows Stored XSS.This issue affects ECT Add to Cart Button: from n/a through 1.4.
|
[] | null | 7.1 | null | null | null |
GHSA-cqx5-p2pr-988q
|
A remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory, aka 'Microsoft Edge PDF Remote Code Execution Vulnerability'.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-9344
|
In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2023-37435
|
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
|
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
|
[
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2005-1835
|
NEXTWEB (i)Site stores databases under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to databases/Users.mdb.
|
[
"cpe:2.3:a:nextweb:nextweb_\\(i\\)site:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-gjc9-vw3q-w437
|
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks.
|
[] | null | null | null | null | null |
|
GHSA-cwr8-3mh6-89cx
|
foo.php3 in DotBr 0.1 allows remote attackers to obtain sensitive information via a direct request, which calls the phpinfo function.
|
[] | null | null | null | null | null |
|
CVE-2021-33672
|
Due to missing encoding in SAP Contact Center's Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands in the chat recipient's scope. This could lead to a complete compromise of their confidentiality, integrity, and could temporarily impact their availability.
|
[
"cpe:2.3:a:sap:contact_center:700:*:*:*:*:*:*:*"
] | null | null | 9.6 | null | null |
|
GHSA-x3p6-6j82-7c7q
|
A vulnerability in the CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to specific commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-25022
|
WordPress Watu Quiz Plugin <= 3.3.8 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Watu Quiz plugin <= 3.3.8 versions.
|
[
"cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-hhph-jxcg-589h
|
FreezeX 1.00.100.0666 allows local users with administrator privileges to cause a denial of service (FreezeX application) by overwriting the db.fzx file.
|
[] | null | null | null | null | null |
|
GHSA-q9mc-ghc5-mv47
|
Buffer overflow in the Windows Redirector function in Microsoft Windows XP allows local users to execute arbitrary code via a long parameter.
|
[] | null | null | null | null | null |
|
CVE-2006-3299
|
Cross-site scripting (XSS) vulnerability in index.php in Usenet Script 0.5 allows remote attackers to inject arbitrary web script or HTML via the group parameter.
|
[
"cpe:2.3:a:metalheadws:usenet:0.5:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-wfxf-3935-5jgv
|
A flaw was found in the Ansible Automation Platform's Event-Driven Ansible. In configurations where verbosity is set to "debug", inventory passwords are exposed in plain text when starting a rulebook activation. This issue exists for any "debug" action in a rulebook and also affects Event Streams.
|
[] | null | 6.5 | null | null | null |
|
GHSA-2rh2-8h38-pqp8
|
Directory traversal vulnerability in index.php in Firewolf Technologies Synergiser 1.2 RC1 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter. NOTE: this can be leveraged to obtain the path by including a local PHP script with a duplicate function declaration.
|
[] | null | null | null | null | null |
|
RHSA-2005:329
|
Red Hat Security Advisory: XFree86 security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
GHSA-w9hm-m2x5-5x42
|
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.
|
[] | null | null | 7.5 | null | null |
|
CVE-2019-12680
|
Cisco Firepower Management Center SQL Injection Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary SQL injections on an affected device. These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities by sending crafted SQL queries to an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, and execute commands within the underlying operating system that may affect the availability of the device.
|
[
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
GHSA-j395-pgw8-whr3
|
Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.
|
[] | null | null | null | null | null |
|
CVE-2005-1857
|
Format string vulnerability in simpleproxy before 3.4 allows remote malicious HTTP proxies to execute arbitrary code via format string specifiers in a reply.
|
[
"cpe:2.3:a:simpleproxy:simpleproxy:2.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:simpleproxy:simpleproxy:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:simpleproxy:simpleproxy:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:simpleproxy:simpleproxy:3.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2014:2023
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: command execution in wordexp() with WRDE_NOCMD specified
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
ICSA-18-331-02
|
Rockwell Automation FactoryTalk Services Platform
|
A remote unauthenticated attacker could send numerous crafted packets to service ports resulting in memory consumption that could lead to a partial or complete denial-of-service condition to the affected services. CVE-2018-18981 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
GHSA-p495-jrpq-p66g
|
MantisBT XSS when uploading an attachment
|
The proj_doc_edit_page.php Project Documentation feature in MantisBT before 2.21.3 has a stored cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code (if CSP settings permit it) after uploading an attachment with a crafted filename. The code is executed when editing the document's page.
|
[] | null | 6.1 | null | null | null |
GHSA-m25r-3fx6-w626
|
In Siren Investigate before 11.1.4, when enabling the cluster feature of the Siren Alert application, TLS verifications are disabled globally in the Siren Investigate main process.
|
[] | null | null | null | null | null |
|
CVE-2025-49283
|
WordPress Anti-spam, Spam protection, ReCaptcha for all forms and GDPR-compliant <= 4.1.1 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Matthias Nordwig Anti-spam, Spam protection, ReCaptcha for all forms and GDPR-compliant allows Cross Site Request Forgery. This issue affects Anti-spam, Spam protection, ReCaptcha for all forms and GDPR-compliant: from n/a through 4.1.1.
|
[] | null | 4.3 | null | null | null |
CVE-2021-4318
|
Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-41038
|
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
|
In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
Check that all fields of a V2 algorithm header fit into the available
firmware data buffer.
The wmfw V2 format introduced variable-length strings in the algorithm
block header. This means the overall header length is variable, and the
position of most fields varies depending on the length of the string
fields. Each field must be checked to ensure that it does not overflow
the firmware data buffer.
As this ia bugfix patch, the fixes avoid making any significant change to
the existing code. This makes it easier to review and less likely to
introduce new bugs.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-3vrx-9pq3-23gp
|
Compaq TruCluster 1.5 allows remote attackers to cause a denial of service via a port scan from a system that does not have a DNS PTR record, which causes the cluster to enter a "split-brain" state.
|
[] | null | null | null | null | null |
|
GHSA-6x87-qx9j-65qp
|
Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).
|
[] | null | 7.2 | null | null | null |
|
GHSA-hrcx-g752-fgp2
|
A command injection (missing input validation) issue in the remote phonebook configuration URI in the web interface of the Atcom A10W VoIP phone with firmware 2.6.1a2421 allows an authenticated remote attacker in the same network to trigger OS commands via shell metacharacters in a POST request.
|
[] | null | null | null | null | null |
|
CVE-2024-57998
|
OPP: add index check to assert to avoid buffer overflow in _read_freq()
|
In the Linux kernel, the following vulnerability has been resolved:
OPP: add index check to assert to avoid buffer overflow in _read_freq()
Pass the freq index to the assert function to make sure
we do not read a freq out of the opp->rates[] table when called
from the indexed variants:
dev_pm_opp_find_freq_exact_indexed() or
dev_pm_opp_find_freq_ceil/floor_indexed().
Add a secondary parameter to the assert function, unused
for assert_single_clk() then add assert_clk_index() which
will check for the clock index when called from the _indexed()
find functions.
|
[] | null | null | null | null | null |
PYSEC-2021-544
| null |
TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
GHSA-cvxv-g5fg-rfwf
|
** DISPUTED ** PHP remote file inclusion vulnerability in index.php in phpWebFileManager 0.5 allows remote attackers to execute arbitrary PHP code via a URL in the PN_PathPrefix parameter. NOTE: this issue is disputed by a reliable third party, who demonstrates that PN_PathPrefix is defined before use.
|
[] | null | null | null | null | null |
|
CVE-2022-1427
|
Out-of-bounds Read in mrb_obj_is_kind_of in in mruby/mruby
|
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
|
[
"cpe:2.3:a:mruby:mruby:*:*:*:*:*:ruby:*:*"
] | null | null | 7.7 | null | null |
CVE-2024-10707
|
Local File Inclusion in gaizhenbiao/chuanhuchatgpt
|
gaizhenbiao/chuanhuchatgpt version git d4ec6a3 is affected by a local file inclusion vulnerability due to the use of the gradio component gr.JSON, which has a known issue (CVE-2024-4941). This vulnerability allows unauthenticated users to access arbitrary files on the server by uploading a specially crafted JSON file and exploiting the improper input validation in the handle_dataset_selection function.
|
[] | null | null | 6.5 | null | null |
CVE-2024-40487
|
A Stored Cross Site Scripting (XSS) vulnerability was found in "/view_type.php" of Kashipara Live Membership System v1.0, which allows remote attackers to execute arbitrary code via membershipType parameter.
|
[
"cpe:2.3:a:kashipara:live_membership_system:1.0:*:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
|
CVE-2023-21982
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
CVE-2006-3647
|
Integer overflow in Microsoft Word 2000, 2002, 2003, 2004 for Mac, and v.X for Mac allows remote user-assisted attackers to execute arbitrary code via a crafted string in a Word document, which overflows a 16-bit integer length value, aka "Memmove Code Execution," a different vulnerability than CVE-2006-3651 and CVE-2006-4693.
|
[
"cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2001:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2001:*:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:microsoft:office:2001:sr1:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:microsoft:office:2003:*:*:*:student_teacher:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:microsoft:office:v.x:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2022-2948
|
GE CIMPLICITY Heap-based Buffer Overflow
|
GE CIMPICITY versions 2022 and prior is
vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code.
|
[
"cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
RHSA-2021:2258
|
Red Hat Security Advisory: rh-nginx118-nginx security update
|
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null | null |
CVE-2024-40721
|
CHANGING Information Technology TCBServiSign Windows Version - Improper Input Validation
|
The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause the TCBServiSign to load a DLL from an arbitrary path.
|
[
"cpe:2.3:a:changingtec:servisign:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*"
] | null | 8.8 | null | null | null |
GHSA-46pv-vq66-38gm
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the mandatory property of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6502.
|
[] | null | null | 8.8 | null | null |
|
GHSA-g6vh-gx55-qf59
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jakub Glos Sparkle Elementor Kit allows PHP Local File Inclusion. This issue affects Sparkle Elementor Kit: from n/a through 2.0.9.
|
[] | null | 7.5 | null | null | null |
|
GHSA-95mw-pcq6-5qg2
|
Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5499.
|
[] | null | null | 3.3 | null | null |
|
GHSA-9xg8-22rr-c6vh
|
Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
|
[] | null | null | 7.5 | null | null |
|
GHSA-ch8f-f5g7-vhhr
|
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
|
[] | null | 8.4 | null | null | null |
|
GHSA-3h94-p827-w44r
|
A /shell?cmd= XSS issue exists in the HTTPD component of NAT32 v2.2 Build 22284 devices that can be exploited for Remote Code Execution in conjunction with CSRF.
|
[] | null | null | 6.1 | null | null |
|
GHSA-3x82-hxvx-2rv2
|
In the Linux kernel, the following vulnerability has been resolved:net: bcmasp: fix potential memory leak in bcmasp_xmit()The bcmasp_xmit() returns NETDEV_TX_OK without freeing skb
in case of mapping fails, add dev_kfree_skb() to fix it.
|
[] | null | 5.5 | null | null | null |
|
CVE-2025-26558
|
WordPress Aparat Responsive plugin <= 1.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mkkmail Aparat Responsive allows DOM-Based XSS. This issue affects Aparat Responsive: from n/a through 1.3.
|
[] | null | 6.5 | null | null | null |
CVE-2025-50059
|
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | 8.6 | null | null | null |
|
GHSA-79m3-vm8c-387r
|
Denial of service in Windows NT IIS server using ..\..
|
[] | null | null | null | null | null |
|
GHSA-ggj7-gjcg-p52j
|
Multiple buffer overflows in php_iisfunc.dll in the iisfunc extension for PHP 5.2.0 and earlier allow context-dependent attackers to execute arbitrary code, probably during Unicode conversion, as demonstrated by a long string in the first argument to the iis_getservicestate function, related to the ServiceId argument to the (1) fnStartService, (2) fnGetServiceState, (3) fnStopService, and possibly other functions.
|
[] | null | null | null | null | null |
|
GHSA-962x-cm53-4293
|
Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22267.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-33904
|
In plugins/HookSystem.cpp in Hyprland through 0.39.1 (before 28c8561), through a race condition, a local attacker can cause execution of arbitrary assembly code by writing to a predictable temporary file.
|
[
"cpe:2.3:a:hyprland:hyprland:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
GHSA-93p6-9cxv-5rpq
|
juzawebCMS Incorrect Access Control vulnerability
|
juzaweb <= 3.4 is vulnerable to Incorrect Access Control, resulting in an application outage after a 500 HTTP status code. The payload in the timezone field was not correctly validated.
|
[] | null | 4.9 | null | null | null |
GHSA-jfcv-jv9g-2vx2
|
Bouncy Castle for Java has Uncontrolled Resource Consumption Vulnerability
|
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java.This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0.
|
[] | 5.9 | null | null | null | null |
GHSA-w35c-2369-qfrj
|
Heap-based buffer overflow in isakmpd on OpenBSD 3.4 through 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.
|
[] | null | null | null | null | null |
|
CVE-2021-3652
|
A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
|
[
"cpe:2.3:a:port389:389-ds-base:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 | null |
|
CVE-2025-29789
|
OpenEMR Has Directory Traversal in Load Code feature
|
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.3.0 are vulnerable to Directory Traversal in the Load Code feature. Version 7.3.0 contains a patch for the issue.
|
[] | 4.6 | null | null | null | null |
CVE-2016-10729
|
An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.
|
[
"cpe:2.3:a:zmanda:amanda:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
GHSA-9r4h-2cr5-xvhv
|
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.
|
[] | null | 9.8 | null | null | null |
|
CVE-2013-0679
|
Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname.
|
[
"cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-xwrr-h965-6hx9
|
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.
This could allow an attacker to execute code in the context of the current process.
|
[] | 7.3 | 7.8 | null | null | null |
|
GHSA-32fj-r8qw-r8w8
|
MindsDB Cross-site Scripting vulnerability
|
A cross-site scripting (XSS) vulnerability exists in all versions of the MindsDB platform, enabling the execution of a JavaScript payload whenever a user enumerates an ML Engine, database, project, or dataset containing arbitrary JavaScript code within the web UI.
|
[] | 6.4 | 9 | null | null | null |
CVE-2024-5895
|
SourceCodester Employee and Visitor Gate Pass Logging System delete_users sql injection
|
A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects the function delete_users of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268139.
|
[
"cpe:2.3:a:sourcecodester:employee_visitor_gatepass_logging_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-76wm-4p7c-3hw9
|
Use-after-free vulnerability in OptiPNG 0.6.4 allows remote attackers to execute arbitrary code via a crafted PNG file.
|
[] | null | null | 8.8 | null | null |
|
CVE-2021-47577
|
io-wq: check for wq exit after adding new worker task_work
|
In the Linux kernel, the following vulnerability has been resolved:
io-wq: check for wq exit after adding new worker task_work
We check IO_WQ_BIT_EXIT before attempting to create a new worker, and
wq exit cancels pending work if we have any. But it's possible to have
a race between the two, where creation checks exit finding it not set,
but we're in the process of exiting. The exit side will cancel pending
creation task_work, but there's a gap where we add task_work after we've
canceled existing creations at exit time.
Fix this by checking the EXIT bit post adding the creation task_work.
If it's set, run the same cancelation that exit does.
|
[] | null | null | null | null | null |
GHSA-r9jv-2mm6-4c79
|
Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-qf26-f55x-v3rc
|
Ericsson RAN Compute and Site Controller 6610 contains a vulnerability in the Control System where Improper Input Validation can lead to arbitrary code execution, for example to obtain a Linux Shell with the same privileges as the attacker. The attacker would require elevated privileges for example a valid OAM user having the system administrator role to exploit the vulnerability.
|
[] | null | 6.8 | null | null | null |
|
GHSA-r22c-45h9-6v6v
|
A heap-based buffer overflow vulnerability exists in GPAC v1.0.1 in the gf_isom_dovi_config_get function in MP4Box, which causes a denial of service or execute arbitrary code via a crafted file.
|
[] | null | 7.8 | null | null | null |
|
GHSA-5278-x3fc-5hx6
|
VMware vSphere Client 5.5 before U3e and 6.0 before U2a allows remote vCenter Server and ESXi instances to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
[] | null | null | 5.8 | null | null |
|
RHSA-2024:9451
|
Red Hat Security Advisory: python3.12 security update
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null | null |
CVE-2023-52154
|
File Upload vulnerability in pmb/camera_upload.php in PMB 7.4.7 and earlier allows attackers to run arbitrary code via upload of crafted PHTML files.
|
[
"cpe:2.3:a:pmb_project:pmb:7.4.7:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2023-25980
|
WordPress Optimize Database after Deleting Revisions Plugin <= 5.1 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in CAGE Web Design | Rolf van Gelder Optimize Database after Deleting Revisions plugin <= 5.1 versions.
|
[
"cpe:2.3:a:cagewebdev:optimize_database_after_deleting_revisions:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2023-43845
|
Aten PE6208 2.3.228 and 2.4.232 have default credentials for the privileged telnet account. The user is not asked to change the credentials after first login. If not changed, attackers can log in to the telnet console and gain administrator privileges.
|
[
"cpe:2.3:a:aten:pe6208:2.3.228:*:*:*:*:*:*:*",
"cpe:2.3:a:aten:pe6208:2.4.232:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2006-0552
|
Unspecified vulnerability in the Net Listener component of Oracle Database server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, and 9.2.0.7 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB11.
|
[
"cpe:2.3:a:oracle:10g_enterprise_manager_grid_control:10.1_.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:10g_enterprise_manager_grid_control:10.1_.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2:r1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.2:r2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:9.0.4.2:r2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:10.1.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:10.1.2:r1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:release_1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:8.0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:developer_suite:9.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:developer_suite:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:developer_suite:9.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:developer_suite:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterpriseone:8.95.f1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterpriseone:sp23_l1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle8i:standard_8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle8i:standard_8.0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle8i:standard_8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5_fips:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:workflow:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:workflow:11.5.9.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-g4mg-gr2v-j36g
|
kicq IRC client 1.0.0, and possibly later versions, allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
|
[] | null | null | null | null | null |
|
CVE-2025-30475
|
Dell PowerScale InsightIQ, versions 5.0 through 5.2, contains an improper privilege management vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to elevation of privileges.
|
[] | null | 8.1 | null | null | null |
|
CVE-2015-6146
|
Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6145.
|
[
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2018-7186
|
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
|
[
"cpe:2.3:a:leptonica:leptonica:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-hqc2-r8jq-7rg7
|
Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated attacker with Administrator-level read-only credentials to elevate their privileges to Administrator with read-write credentials on an affected system. Note: "Cisco Expressway Series" refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | null | 9.6 | null | null |
|
RHSA-2017:0698
|
Red Hat Security Advisory: subscription-manager security, bug fix, and enhancement update
|
subscription-manager: sensitive world readable files in /var/lib/rhsm/
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.3 | null | null |
CVE-2018-4833
|
A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request.
|
[
"cpe:2.3:o:siemens:rfid_181-eip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:rfid_181-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_wimax_firmware:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_wimax_firmware:4.5:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_wimax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x200irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x200irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204rna_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x408_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x408:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x414_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x414:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_rf182c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_rf182c:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 | null |
|
CVE-2017-18794
|
Certain NETGEAR devices are affected by command injection. This affects R6300v2 before 1.0.4.8_10.0.77, R6400 before 1.0.1.24, R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, R8500 before 1.0.2.100, and D6100 before 1.0.0.50_0.0.50.
|
[
"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*"
] | null | null | 8.4 | null | null |
|
GHSA-3hhc-gfj2-qgg7
|
Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
|
GHSA-x788-3f4q-pfrc
|
Totolink A3600R_Firmware V4.1.2cu.5182_B20201102 contains a hard code password for root in /etc/shadow.sample.
|
[] | null | 9.8 | null | null | null |
|
GHSA-6q3f-wf4j-86jw
|
Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
|
[] | null | null | null | null | null |
|
CVE-2025-2394
|
Ecovacs Home Android and iOS Mobile Applications up to version 3.3.0 contained embedded access keys and secrets for Alibaba Object Storage Service (OSS), leading to sensitive data disclosure.
|
[] | 4.7 | null | null | null | null |
|
GHSA-gh38-h668-j7v8
|
lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions.
|
[] | null | null | 9.1 | null | null |
|
CVE-2008-6904
|
Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE.
|
[
"cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows-nt:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows_9x:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.9.18:*:os_x:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.37.0:*:netware:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:6.4.5:*:linux:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.0.5:*:unix:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus7.6.3:*:windows:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2013:1815
|
Red Hat Security Advisory: php security update
|
php: memory corruption in openssl_x509_parse()
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null | null |
RHSA-2023:6154
|
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.0
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_secondary_scheduler:1.2::el8"
] | null | 7.5 | null | null | null |
GHSA-cxfx-p56g-q7q5
|
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c318 the value for the s_port key is copied using strcpy to the buffer at 0xa00017f4. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3".
|
[] | null | null | 9.9 | null | null |
|
CVE-2025-33020
|
IBM Engineering Systems Design Rhapsody information disclosure
|
IBM Engineering Systems Design Rhapsody 9.0.2, 10.0, and 10.0.1 transmits sensitive information without encryption that could allow an attacker to obtain highly sensitive information.
|
[
"cpe:2.3:a:ibm:rhapsody_design_manager:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:10.0.1:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.