id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-gqrj-3xrj-f6f6
|
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.
|
[] | null | null | null | null | null |
|
CVE-2014-7317
|
The Aloha Bail Bonds (aka com.onesolutionapps.alohabailbondsandroid) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:onesolutionapps:aloha_bail_bonds:1.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-94q4-v5g6-qp7x
|
LavaLite CMS vulnerable to host header injection attack
|
LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack.
|
[] | null | 6.1 | null | null | null |
GHSA-3ccx-2hm9-3h7m
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
GHSA-pc8v-x8wr-7grq
|
Improper access control in some Intel(R) Arc(TM) & Iris(R) Xe Graphics software before version 31.0.101.4824 may allow an authenticated user to potentially enable denial of service via local access.
|
[] | 5.1 | 5 | null | null | null |
|
GHSA-cf9f-rjx7-4x25
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Amin A.Rezapour Product Specifications for Woocommerce plugin <= 0.6.0 versions.
|
[] | null | 7.1 | null | null | null |
|
RHSA-2022:0708
|
Red Hat Security Advisory: rh-ruby26-ruby security, bug fix, and enhancement update
|
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null | null |
GHSA-wfcc-qm3q-frp3
|
In the Linux kernel, the following vulnerability has been resolved:ptp: ocp: Fix NULL dereference in Adva board SMA sysfs operationsOn Adva boards, SMA sysfs store/get operations can call
__handle_signal_outputs() or __handle_signal_inputs() while the `irig`
and `dcf` pointers are uninitialized, leading to a NULL pointer
dereference in __handle_signal() and causing a kernel crash. Adva boards
don't use `irig` or `dcf` functionality, so add Adva-specific callbacks
`ptp_ocp_sma_adva_set_outputs()` and `ptp_ocp_sma_adva_set_inputs()` that
avoid invoking `irig` or `dcf` input/output routines.
|
[] | null | null | null | null | null |
|
CVE-2019-13951
|
The set_ipv4() function in zscan_rfc1035.rl in gdnsd 3.x before 3.2.1 has a stack-based buffer overflow via a long and malformed IPv4 address in zone data.
|
[
"cpe:2.3:a:gdnsd:gdnsd:3.2.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2022-27046
|
libsixel 1.8.6 suffers from a Heap Use After Free vulnerability in in libsixel/src/dither.c:388.
|
[
"cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2019-10694
|
The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password. If they do not use that URL, there is an overlooked default password for the admin user. This was resolved in Puppet Enterprise 2019.0.3 and 2018.1.9.
|
[
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2002-1500
|
Buffer overflow in (1) mrinfo, (2) mtrace, and (3) pppd in NetBSD 1.4.x through 1.6 allows local users to gain privileges by executing the programs after filling the file descriptor tables, which produces file descriptors larger than FD_SETSIZE, which are not checked by FD_SET().
|
[
"cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:alpha:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:arm32:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:sparc:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:sh3:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-h3ch-5pp2-vh6w
|
Improper socket reuse in Apache Tomcat
|
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
|
[] | null | 8.6 | null | null | null |
CVE-2024-3479
|
An improper export vulnerability was reported in the Motorola Enterprise MotoDpms Provider (com.motorola.server.enterprise.MotoDpmsProvider) that could allow a local attacker to read local data.
|
[] | null | 2.8 | null | null | null |
|
GHSA-mprg-vch7-563j
|
Cross Site Request Forgery (CSRF) vulnerability in Tribulant Newsletters.This issue affects Newsletters: from n/a through 4.9.7.
|
[] | null | 4.3 | null | null | null |
|
GHSA-78wm-gxqj-pr35
|
The ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors, related to "throwing of exceptions."
|
[] | null | null | 9.8 | null | null |
|
CVE-2005-4290
|
Cross-site scripting (XSS) vulnerability in index.cgi in ECW-Cart 2.03 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) kword, (2) max, (3) min, (4) comp, and (5) f parameters.
|
[
"cpe:2.3:a:soft4e:ecw-cart:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-vgvh-f7c3-rv4v
|
Microsoft Internet Information Services (IIS), when used in conjunction with unspecified third-party upload applications, allows remote attackers to create empty files with arbitrary extensions via a filename containing an initial extension followed by a : (colon) and a safe extension, as demonstrated by an upload of a .asp:.jpg file that results in creation of an empty .asp file, related to support for the NTFS Alternate Data Streams (ADS) filename syntax. NOTE: it could be argued that this is a vulnerability in the third-party product, not IIS, because the third-party product should be applying its extension restrictions to the portion of the filename before the colon.
|
[] | null | null | null | null | null |
|
CVE-2014-2096
|
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory.
|
[
"cpe:2.3:a:catfish_project:catfish:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:catfish_project:catfish:1.0.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2021-31975
|
Server for NFS Information Disclosure Vulnerability
|
Server for NFS Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1621:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1052:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20045:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20045:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20044:*:*:*:*:*:x64:*"
] | null | 7.5 | null | null | null |
RHSA-2020:1062
|
Red Hat Security Advisory: dovecot security and bug fix update
|
dovecot: Improper certificate validation dovecot: Buffer overflow in indexer-worker process results in privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null | null |
CVE-2019-0891
|
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0889, CVE-2019-0890, CVE-2019-0893, CVE-2019-0894, CVE-2019-0895, CVE-2019-0896, CVE-2019-0897, CVE-2019-0898, CVE-2019-0899, CVE-2019-0900, CVE-2019-0901, CVE-2019-0902.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2024-11098
|
SVG Block <= 1.1.24 - Authenticated (Administrator+) Stored Cross-Site Scripting via SVG File Upload
|
The SVG Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.1.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] | null | 5.5 | null | null | null |
CVE-2020-12278
|
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352.
|
[
"cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2020-15537
|
An issue was discovered in the Vanguard plugin 2.1 for WordPress. XSS can occur via the mails/new title field, a product field to the p/ URI, or the Products Search box.
|
[
"cpe:2.3:a:vanguard_project:vanguard:2.1:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-3pc8-q9qj-vmvc
|
Classic buffer overflow in certain Zoom Clients for Windows may allow an authorized user to conduct a denial of service via network access.
|
[] | null | 6.5 | null | null | null |
|
GHSA-g7qr-7xf7-f4ph
|
Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1.
|
[] | null | null | null | null | null |
|
GHSA-f9r4-6vx9-4gjx
|
A vulnerability, which was classified as problematic, was found in mirweiye Seven Bears Library CMS 2023. This affects an unknown part of the component Background Management Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 4.8 | 2.4 | null | null | null |
|
GHSA-g8gq-v2gw-vjqx
|
The image-upgrade implementation on Cisco Desktop Collaboration Experience (aka Collaboration Desk Experience or DX) DX650 endpoints allows local users to execute arbitrary OS commands via an unspecified parameter, aka Bug ID CSCus38947.
|
[] | null | null | null | null | null |
|
CVE-2024-45481
|
Improper authentication in SSH of B&R APROL
|
An Incomplete Filtering of Special Elements vulnerability in scripts using the SSH server on B&R APROL <4.4-00P5 may allow an authenticated local attacker to authenticate as another legitimate user.
|
[] | 8.5 | null | null | null | null |
GHSA-rvpg-jj9h-7jcw
|
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.
|
[] | null | 3.3 | null | null | null |
|
CVE-2022-47598
|
WordPress WP Super Popup Plugin <= 1.1.2 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Plugins Pro WP Super Popup plugin <= 1.1.2 versions.
|
[
"cpe:2.3:a:wp_super_popup_project:wp_super_popup:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-8pg6-fjw3-j7j7
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
|
[] | null | null | null | null | null |
|
GHSA-4r8x-26vf-3hx6
|
The HTML Forms WordPress plugin before 1.3.33 does not sanitize and escape the form message inputs, allowing high-privilege users, such as administrators, to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disabled.
|
[] | null | 4.8 | null | null | null |
|
GHSA-vj43-f339-gcxq
|
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. The vulnerability is caused by a computation that writes data past the end of the intended buffer; the computation is a part of the functionality that handles font encodings. The vulnerability is a result of out of range pointer offset that is used to access sub-elements of an internal data structure. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
|
[] | null | null | 8.8 | null | null |
|
RHSA-2023:7703
|
Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.10.6 release and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_pipelines:1.10::el8"
] | null | 7.5 | null | null | null |
GHSA-j777-rfjc-qr5x
|
Directory traversal vulnerability in meb_download.php in the myEASYbackup plugin 1.0.8.1 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dwn_file parameter.
|
[] | null | null | null | null | null |
|
GHSA-g884-34r9-cwxq
|
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., '$DB$' or '2DB$'), the function performs arbitrary writes to System Management RAM (SMRAM), leading to potential privilege escalation to System Management Mode (SMM) and persistent firmware compromise.
|
[] | null | 8.2 | null | null | null |
|
GHSA-42f3-49rm-m2q7
|
The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 before 3.4.2.0 iFix 8 and 3.4.3 before 3.4.3.0 iFix 1 allows remote attackers to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified URL.
|
[] | null | null | 5.9 | null | null |
|
CVE-2017-1532
|
IBM DOORS 9.5 and 9.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130411.
|
[
"cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-m97x-rfxh-9ppm
|
Cisco Prime Service Catalog 10.0, 10.0(R2), 10.1, and 11.0 does not properly restrict access to web pages, which allows remote attackers to modify the configuration via a direct request, aka Bug ID CSCuw48188.
|
[] | null | null | null | null | null |
|
RHSA-2024:3999
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: OPVP device arbitrary code execution via custom Driver library
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null | null |
CVE-2022-47181
|
WordPress Email Templates Plugin <= 1.4.2 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in wpexpertsio Email Templates Customizer and Designer for WordPress and WooCommerce email-templates allows Cross Site Request Forgery.This issue affects Email Templates Customizer and Designer for WordPress and WooCommerce: from n/a through 1.4.2.
|
[
"cpe:2.3:a:wpexperts:email_templates_customizer_and_designer:*:*:*:*:*:woocommerce:*:*",
"cpe:2.3:a:wpexperts:email_templates_customizer_and_designer:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
RHSA-2025:2222
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 Openshift Jenkins security update
|
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream json-lib: Mishandling of an unbalanced comment string in json-lib jenkins-plugin/script-security: Jenkins Script Security Plugin File Disclosure Vulnerability jenkins-plugin/workflow-cps: Lack of Approval Check for Rebuilt Jenkins Pipelines jenkins-plugin/pipeline-model-definition: Jenkins Pipeline Declarative Plugin Allows Restart of Builds with Unapproved Jenkinsfile
|
[
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 8 | null | null | null |
CVE-2007-3014
|
Multiple cross-site scripting (XSS) vulnerabilities in activeWeb contentserver before 5.6.2964 allow remote attackers to inject arbitrary web script or HTML via the msg parameter to (1) errors/rights.asp or (2) errors/transaction.asp, or (3) the name of a MIME type (mimetype).
|
[
"cpe:2.3:a:activeweb:contentserver:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-59jh-6p6q-f5jr
|
A vulnerability, which was classified as critical, has been found in Campcodes Online Examination System 1.0. This issue affects some unknown processing of the file ranking-exam.php. The manipulation of the argument exam_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264449 was assigned to this vulnerability.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2018-3845
|
In Hyland Perceptive Document Filters 11.4.0.2647 - x86/x64 Windows/Linux, a crafted OpenDocument document can lead to a SkCanvas object double free resulting in direct code execution.
|
[
"cpe:2.3:a:hyland:perceptive_document_filters:11.4.0.2647:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-9fv9-67fw-mfp3
|
The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.7.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.
|
[] | null | null | null | null | null |
|
GHSA-j2mw-jhcw-5g7q
|
Multiple unspecified vulnerabilities in LimeSurvey (formerly PHPSurveyor) before 1.71 have unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-jw7j-hqfh-5qqm
|
Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors related to DHTML. NOTE: due to the lack of sufficient public details from the vendor as of 20060413, it is unclear how CVE-2006-1529, CVE-2006-1530, CVE-2006-1531, and CVE-2006-1723 are different.
|
[] | null | null | null | null | null |
|
GHSA-3r4m-vx24-mm6m
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btmtksdio: fix use-after-free at btmtksdio_recv_eventWe should not access skb buffer data anymore after hci_recv_frame was
called.[ 39.634809] BUG: KASAN: use-after-free in btmtksdio_recv_event+0x1b0
[ 39.634855] Read of size 1 at addr ffffff80cf28a60d by task kworker
[ 39.634962] Call trace:
[ 39.634974] dump_backtrace+0x0/0x3b8
[ 39.634999] show_stack+0x20/0x2c
[ 39.635016] dump_stack_lvl+0x60/0x78
[ 39.635040] print_address_description+0x70/0x2f0
[ 39.635062] kasan_report+0x154/0x194
[ 39.635079] __asan_report_load1_noabort+0x44/0x50
[ 39.635099] btmtksdio_recv_event+0x1b0/0x1c4
[ 39.635129] btmtksdio_txrx_work+0x6cc/0xac4
[ 39.635157] process_one_work+0x560/0xc5c
[ 39.635177] worker_thread+0x7ec/0xcc0
[ 39.635195] kthread+0x2d0/0x3d0
[ 39.635215] ret_from_fork+0x10/0x20
[ 39.635247] Allocated by task 0:
[ 39.635260] (stack is not available)
[ 39.635281] Freed by task 2392:
[ 39.635295] kasan_save_stack+0x38/0x68
[ 39.635319] kasan_set_track+0x28/0x3c
[ 39.635338] kasan_set_free_info+0x28/0x4c
[ 39.635357] ____kasan_slab_free+0x104/0x150
[ 39.635374] __kasan_slab_free+0x18/0x28
[ 39.635391] slab_free_freelist_hook+0x114/0x248
[ 39.635410] kfree+0xf8/0x2b4
[ 39.635427] skb_free_head+0x58/0x98
[ 39.635447] skb_release_data+0x2f4/0x410
[ 39.635464] skb_release_all+0x50/0x60
[ 39.635481] kfree_skb+0xc8/0x25c
[ 39.635498] hci_event_packet+0x894/0xca4 [bluetooth]
[ 39.635721] hci_rx_work+0x1c8/0x68c [bluetooth]
[ 39.635925] process_one_work+0x560/0xc5c
[ 39.635951] worker_thread+0x7ec/0xcc0
[ 39.635970] kthread+0x2d0/0x3d0
[ 39.635990] ret_from_fork+0x10/0x20
[ 39.636021] The buggy address belongs to the object at ffffff80cf28a600
which belongs to the cache kmalloc-512 of size 512
[ 39.636039] The buggy address is located 13 bytes inside of
512-byte region [ffffff80cf28a600, ffffff80cf28a800)
|
[] | null | 7.8 | null | null | null |
|
CVE-2007-0392
|
IBM AIX 5.3 does not properly verify the status of file descriptors before setuid execution, which allows local users to gain privileges by closing file descriptor 0, 1, or 2 and then invoking a setuid program, a variant of CVE-2002-0572.
|
[
"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-cmmc-r884-f54q
|
Microsoft Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to cause a denial of service (application crash) by calling the stringToBinary function of the CEnroll.CEnroll.2 ActiveX object with a long second argument, which triggers an invalid memory access inside the SysAllocStringLen function.
|
[] | null | null | null | null | null |
|
GHSA-c9qr-f6c8-rgxf
|
Hertz contains path traversal via normalizePath function
|
Hertz is a a high-performance and strong-extensibility Go HTTP framework that helps developers build microservices. Versions of Hertz prior to 0.3.1 contain a path traversal vulnerability via the normalizePath function. This issue has been patched in 0.3.1.
|
[] | null | 7.5 | null | null | null |
GHSA-f55x-g4vm-mj7x
|
In the module mib < 1.6.1 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The methods `mib::getManufacturersByCategory()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
|
[] | null | 9.8 | null | null | null |
|
GHSA-g52p-299q-46j5
|
IBM Maximo Anywhere 7.5 and 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 132851.
|
[] | null | null | 5.4 | null | null |
|
CVE-2021-45290
|
A Denial of Service vulnerability exits in Binaryen 103 due to an assertion abort in wasm::handle_unreachable.
|
[
"cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2010-1426
|
SQL injection vulnerability in MODx Evolution before 1.0.3 allows remote attackers to execute arbitrary SQL commands via unknown vectors related to WebLogin.
|
[
"cpe:2.3:a:modxcms:modxcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.6.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:modxcms:0.9.6.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-1620
|
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in vim/vim
|
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | null | 6.6 | null | null |
CVE-2005-2307
|
netman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function, aka "Network Connection Manager Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-g4w5-hhgx-9rgp
|
Under certain conditions SAP NetWeaver WSRM - version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.
|
[] | null | 5.3 | null | null | null |
|
CVE-2016-10009
|
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
|
[
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | 7.5 | null |
|
GHSA-3hq9-j8x9-925r
|
GForge 4.5.14, 4.7 rc2, and 4.8.2 allows local users to overwrite arbitrary files via a symlink attack on authorized_keys files in users' home directories, related to deb-specific/ssh_dump_update.pl and cronjobs/cvs-cron/ssh_create.php.
|
[] | null | null | null | null | null |
|
GHSA-9rvj-c683-rgmf
|
Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file, which allows local users to execute arbitrary commands.
|
[] | null | null | null | null | null |
|
CVE-2013-2060
|
The download_from_url function in OpenShift Origin allows remote attackers to execute arbitrary commands via shell metacharacters in the URL of a request to download a cart.
|
[
"cpe:2.3:a:redhat:openshift:1.0:*:*:*:enterprise:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-3vhg-2gj6-mm5q
|
A vulnerability, which was classified as problematic, has been found in Shoplazza 1.1. This issue affects some unknown processing of the file /admin/api/admin/articles/ of the component Add Blog Post Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216191.
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-33985
|
Cross-Site Scripting (XSS) vulnerability in Janobe products
|
Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/course/index.php'.
|
[
"cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
RHSA-2004:405
|
Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold
|
security flaw mod_ssl ssl_util_uuencode_binary CA issue security flaw security flaw mod_proxy hook format string
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null | null |
RHSA-2017:0365
|
Red Hat Security Advisory: kernel security update
|
kernel: use after free in dccp protocol
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | 7.8 | null | null |
CVE-2018-8017
|
In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.
|
[
"cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2024-21864
|
Improper neutralization in some Intel(R) Arc(TM) & Iris(R) Xe Graphics software before version 31.0.101.5081 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent network access.
|
[
"cpe:2.3:a:intel:iris_xe_graphics:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:arc_a_graphics:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
PYSEC-2021-153
| null |
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference. The implementation of `RaggedTensorToVariant` operations(https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6c70380d5313d282d248a776baa1/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L39-L40) does not validate that the ragged tensor argument is non-empty. Since `batched_ragged` contains no elements, `batched_ragged.splits` is a null vector, thus `batched_ragged.splits(0)` will result in dereferencing `nullptr`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2020-0404
|
In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 | null |
|
CVE-2010-2498
|
The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
|
[
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2025-28072
|
PHPGurukul Pre-School Enrollment System is vulnerable to Directory Traversal in manage-teachers.php.
|
[] | null | 7.5 | null | null | null |
|
CVE-2007-5619
|
Unspecified vulnerability in VMware Server before 1.0.4 causes user passwords to be recorded in cleartext in server logs, which might allow local users to gain privileges.
|
[
"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-hx5m-cxr8-37mp
|
Possible use after free when process shell memory is freed using IOCTL munmap call and process initialization is in progress in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
|
[] | null | 7.8 | null | null | null |
|
GHSA-2x8p-q777-q3mr
|
SQL injection vulnerability in login.php in Gryphon gllcTS2 4.2.4 allows remote attackers to execute arbitrary SQL commands via the detail parameter.
|
[] | null | null | null | null | null |
|
CVE-2003-1482
|
The backup configuration file for Microsoft MN-500 wireless base station stores administrative passwords in plaintext, which allows local users to gain access.
|
[
"cpe:2.3:h:microsoft:mn-500_wireless_base_station:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2020-4722
|
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187870.
|
[
"cpe:2.3:a:ibm:i2_analysts_notebook:9.2.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:i2_analysts_notebook:9.2.1:*:*:*:-:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-m32m-2q87-9hp4
|
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting and injecting code into a user request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches, Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvg24637.
|
[] | null | 6.1 | null | null | null |
|
GHSA-55p9-927h-wfvq
|
Studio in Open edX Ironwood 2.5 allows CSV injection because an added cohort in Course>Instructor>Cohorts may contain a formula that is exported via the "Course>Data Downloads>Reports>Download profile info" feature.
|
[] | null | null | null | null | null |
|
CVE-2023-27559
|
IBM Db2 denial of service
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted subquery. IBM X-Force ID: 249196.
|
[
"cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp10:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp3a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
CVE-2022-45936
|
A vulnerability has been identified in Mendix Email Connector (All versions < V2.0.0). Affected versions of the module improperly handle access control for some module entities. This could allow authenticated remote attackers to read and manipulate sensitive information.
|
[
"cpe:2.3:a:siemens:mendix_email_connector:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
CVE-2024-20961
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2010-3109
|
Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code via a long operation parameter.
|
[
"cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-8j98-7484-4vg5
|
Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().
|
[] | null | null | 9.8 | null | null |
|
GHSA-whcj-4wwh-8h2g
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Check dce_hwseq before dereferencing it[WHAT]hws was checked for null earlier in dce110_blank_stream, indicating hws
can be null, and should be checked whenever it is used.(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)
|
[] | null | null | null | null | null |
|
GHSA-3m46-hchf-588q
|
KonaKart 8.9.0.0 is vulnerable to Remote Code Execution by uploading a web shell as a product category image.
|
[] | null | null | 9.8 | null | null |
|
CVE-2007-2758
|
Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure, which triggers (1) a stack-based buffer overflow during extraction, or (2) a heap-based buffer overflow during traversal.
|
[
"cpe:2.3:a:winimage:winimage:8.0.8000:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2023-30204
|
Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the judge_id parameter at /php-jms/edit_judge.php.
|
[
"cpe:2.3:a:judging_management_system_project:judging_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-p494-hjq2-h374
|
drivers/media/platform/msm/camera_v2/sensor/cci/msm_cci.c in the Qualcomm components in Android before 2016-07-05 on Nexus 7 (2013) devices does not validate certain values, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28441831 and Qualcomm internal bug CR511382.
|
[] | null | null | 7.8 | null | null |
|
GHSA-g37v-jxpm-83fp
|
Windows Kernel Information Disclosure Vulnerability.
|
[] | null | 4.7 | null | null | null |
|
GHSA-hrqx-2h9x-w494
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.8 | null | null |
|
GHSA-26x5-365c-m568
|
D-Link DIR-823G A1V1.0.2B05 was discovered to contain Null-pointer dereferences in sub_4484A8(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[] | null | 6.5 | null | null | null |
|
GHSA-4cf8-g4pg-xxgx
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zoho Subscriptions Zoho Billing – Embed Payment Form allows Stored XSS. This issue affects Zoho Billing – Embed Payment Form: from n/a through 4.0.
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-15518
|
QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.
|
[
"cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2025-9009
|
itsourcecode Online Tour and Travel Management System email_setup.php sql injection
|
A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1.0. Affected is an unknown function of the file /admin/email_setup.php. The manipulation of the argument Name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2005-1902
|
Directory traversal vulnerability in the IMAP service for SPA-PRO Mail @Solomon 4.00 allows remote authenticated users to read other users' mail and perform operations on arbitrary directories via .. sequences in the (1) SELECT, (2) CREATE, (3) DELETE, and (4) RENAME commands.
|
[
"cpe:2.3:a:e-post_corporation:spa-pro_mail_atsolomon:4.00:*:*:*:*:*:*:*"
] | null | null | null | 3.6 | null |
|
GHSA-jwhw-x4j5-wcx9
|
Missing Authorization vulnerability in onOffice GmbH onOffice for WP-Websites allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects onOffice for WP-Websites: from n/a through 5.7.
|
[] | null | 5.4 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.