id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2025-48370
|
auth-js Vulnerable to Insecure Path Routing from Malformed User Input
|
auth-js is an isomorphic Javascript library for Supabase Auth. Prior to version 2.69.1, the library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead to a URL path traversal, resulting in the wrong API function being called. Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this. This issue has been patched in version 2.69.1.
|
[] | 2.7 | null | null | null | null |
GHSA-83hr-3993-2xh9
|
viewcart in Midicart accepts negative numbers in the Qty (quantity) field, which allows remote attackers to obtain a smaller total price for a shopping cart.
|
[] | null | null | null | null | null |
|
GHSA-x4cw-r9m3-pj4c
|
A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
|
[] | null | null | 8.6 | null | null |
|
GHSA-vp53-cwf4-9466
|
An issue was discovered in GitLab Community and Enterprise Edition 8.4 through 11.11. The protected branches feature contained a access control issue which resulted in a bypass of the protected branches restriction rules. It has Incorrect Access Control.
|
[] | null | null | null | null | null |
|
GHSA-2mf8-5wch-fm7w
|
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional is vulnerable to a privilege escalation vulnerability when using token-based authentication in an admin request over the SOAP connector. X-Force ID: 175984.
|
[] | null | null | null | null | null |
|
CVE-2019-19502
|
Code injection in pluginconfig.php in Image Uploader and Browser for CKEditor before 4.1.9 allows remote authenticated users to execute arbitrary PHP code.
|
[
"cpe:2.3:a:maleck:image_uploader_and_browser_for_ckeditor:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-vjmq-27j9-636j
|
In the Linux kernel, the following vulnerability has been resolved:of: module: add buffer overflow check in of_modalias()In of_modalias(), if the buffer happens to be too small even for the 1st
snprintf() call, the len parameter will become negative and str parameter
(if not NULL initially) will point beyond the buffer's end. Add the buffer
overflow check after the 1st snprintf() call and fix such check after the
strlen() call (accounting for the terminating NUL char).
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-8775
|
Qiyuesuo Eelectronic Signature Platform Scheduled Task upload execute unrestricted upload
|
A vulnerability was found in Qiyuesuo Eelectronic Signature Platform up to 4.34 and classified as critical. Affected by this issue is the function execute of the file /api/code/upload of the component Scheduled Task Handler. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-gxjr-v6fw-49mr
|
In Progress® Telerik® Report Server versions prior to 2024 Q1 (10.0.24.130), a remote code execution attack is possible through an insecure deserialization vulnerability.
|
[] | null | 9.9 | null | null | null |
|
CVE-2007-1548
|
SQL injection vulnerability in functions/functions_filters.asp in Web Wiz Forums before 8.05a (MySQL version) does not properly filter certain characters in SQL commands, which allows remote attackers to execute arbitrary SQL commands via \"' (backslash double-quote quote) sequences, which are collapsed into \'', as demonstrated via the name parameter to forum/pop_up_member_search.asp.
|
[
"cpe:2.3:a:webwizguide:web_wiz_forums:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_3:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_4:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_5:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_6:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.28:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.29:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.30:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.32:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.33:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:6.34:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7:beta_4:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.5:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.51a:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.92:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.95:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:7.96:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8:rc1.1:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8.03:*:*:*:*:*:*:*",
"cpe:2.3:a:webwizguide:web_wiz_forums:8.04:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-fxvm-j8ff-9hhr
|
Multiple cross-site scripting (XSS) vulnerabilities in Baby Katie Media (a) very Simple Car Lister (vSCAL) 1.0 and (b) very simple Realty Lister (vsREAL) 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) lid parameter in index.php and the (2) title parameter in myslideshow.php.
|
[] | null | null | null | null | null |
|
GHSA-whpx-q3rq-w8jc
|
Hardening of TypedArrays with non-canonical numeric property names in SES
|
Impact_What kind of vulnerability is it? Who is impacted?_In Hardened JavaScript, programs can `harden` objects to safely share objects with co-tenant programs without risk of these other programs tampering with their API surface. Hardening does not guarantee that objects are pure or immutable, so a hardened `Map`, for example is superficially tamper-proof, but any party holding a reference to the object can both read and write its contents. Based on this precedent, and because `TypedArray` instances cannot be frozen with `Object.isFrozen`, `harden` does not `freeze` `TypedArrays` and instead makes them non-extensible and makes all non-indexed properties non-writable and non-configurable. This is consistent with the treatment of `Map` because the indexed properties represent mutable content and non-indexed properties represent the API.Due to a defect in `harden`, properties that have names that parse as numbers but are not the same as the canonical representation of those numbers, as in `"+0"` and `""` which are both equivalent to their canonical number `"0"`, remain writable after hardening.Any program treating one of these properties as part of its API and relying on `harden` to prevent modifications would be vulnerable to an API pollution attack, affecting only instances shared by mutually suspicious parties.Unlike a `Map`, a hardened `TypedArray` can only have numbers for content. Any program that is sharing hardened `TypedArrays` between co-tentant programs and relying on harden to only allow these programs to communicate exclusively by changing numbers within the bounds of the TypedArray, may inadvertently have arranged for a mechanism for a pair of third-parties to communicate arbitrary objects on these other properties.Patches_Has the problem been patched? What versions should users upgrade to?_SES version 0.16.0 patches this issue, causing `harden` to recognize properties with non-canonical numeric representations and ensuring that these properties are non-configurable.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_Users should avoid sharing `TypedArrays` between co-tenant programs and instead create wrapper objects that produce a read-only view of the underlying data. We allow `harden` to succeed for `TypedArrays` because the treatment is in fact consistent with the behavior of collections like `Map`, but all collections shared between co-tentant programs should probably be attenuated to either read- or write-only facets and probably close over only part of the content of the collection. However, the motivation for allowing `TypedArrays` to be hardened in practice is to allow certain legacy modules to function under Hardened JavaScript with LavaMoat, since they export `TypedArrays`, even though they would ideally export read-only facets of these.References_Are there any links users can visit to find out more?_Not at this time.For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
|
[] | null | null | null | null | null |
CVE-2017-20187
|
Magnesium-PHP Base.php formatEmailString injection
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file src/Magnesium/Message/Base.php. The manipulation of the argument email/name leads to injection. Upgrading to version 0.3.1 is able to address this issue. The patch is identified as 500d340e1f6421007413cc08a8383475221c2604. It is recommended to upgrade the affected component. VDB-244482 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[
"cpe:2.3:a:floriangaerber:magnesium-php:*:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 2.7 |
https://github.com/floriangaerber/Magnesium-PHP/commit/500d340e1f6421007413cc08a8383475221c2604
|
CVE-2017-17088
|
The Enterprise version of SyncBreeze 10.2.12 and earlier is affected by a Remote Denial of Service vulnerability. The web server does not check bounds when reading server requests in the Host header on making a connection, resulting in a classic Buffer Overflow that causes a Denial of Service.
|
[
"cpe:2.3:a:flexense:syncbreeze:*:*:*:*:enterprise:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-xqj5-x7c8-6f4h
|
Uncontrolled search path in software installer for Intel(R) PROSet/Wireless WiFi in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
CVE-2023-38744
|
Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.
|
[
"cpe:2.3:h:omron:cj2m_cpu_unit:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h_cpu_unit:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cs_cj_series_ethernet_ip_unit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu35_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu34_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu34:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu33_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu33:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2m-cpu31_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2m-cpu31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu68-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu68-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu67-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu67-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu66-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu66-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu65-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu65-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj2h-cpu64-eip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj2h-cpu64-eip:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cs1w-eip21_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cs1w-eip21:-:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:cj1w-eip21_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:omron:cj1w-eip21:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2020-14383
|
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
|
[
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-7749-gxmh-frwx
|
Multiple cross-site scripting (XSS) vulnerabilities in Utopia News Pro (UNP) 1.1.3 and 1.1.4 allow remote attackers to inject arbitrary web script or HTML via (1) the sitetitle parameter in header.php and (2) the version and (3) query_count parameters in footer.php.
|
[] | null | null | null | null | null |
|
GHSA-w4vh-2xrr-v7qg
|
Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email.
|
[] | null | null | null | null | null |
|
CVE-2003-0266
|
Multiple buffer overflows in SLWebMail 3 on Windows systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long Language parameter to showlogin.dll, (2) a long CompanyID parameter to recman.dll, (3) a long CompanyID parameter to admin.dll, or (4) a long CompanyID parameter to globallogin.dll.
|
[
"cpe:2.3:a:bvrp_software:slwebmail:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-54296
|
Extension - mooj.org - Stored XSS vulnerability in ProFiles component 1.0-1.5.0 for Joomla
|
A stored XSS vulnerability in ProFiles component 1.0-1.5.0 for Joomla was discovered.
|
[] | 7 | null | null | null | null |
GHSA-jv99-wf4f-255j
|
Missing Authorization vulnerability in BeRocket Brands for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Brands for WooCommerce: from n/a through 3.8.2.2.
|
[] | null | 5.3 | null | null | null |
|
GHSA-7vfp-8536-jvm3
|
IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. IBM X-Force ID: 240903.
|
[] | null | 4.3 | null | null | null |
|
GHSA-w9cm-j7x2-f2c4
|
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
|
[] | null | null | 7.5 | null | null |
|
GHSA-5pwx-9pq2-mxqx
|
A vulnerability has been found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This vulnerability affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument host_time leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249862 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 7.3 | null | null | null |
|
CVE-2021-1210
|
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
|
[
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
GHSA-fj38-vjwx-24wv
|
Unspecified vulnerability in the TimesTen Client/Server component in Oracle Times Ten In-Memory Database 7.0.3.0.0 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2597 and CVE-2008-2599.
|
[] | null | null | null | null | null |
|
CVE-2023-21113
|
In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2013-3089
|
Cross-site request forgery (CSRF) vulnerability in apply.cgi in Belkin N300 (F7D7301v1) router allows remote attackers to hijack the authentication of administrators for requests that modify configuration.
|
[
"cpe:2.3:o:belkin:n300_firmware:1.00.06:*:*:*:*:*:*:*",
"cpe:2.3:h:belkin:n300:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-829c-jqf8-5r5c
|
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | null | null | null |
|
GHSA-jf53-8v78-xf68
|
The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.
|
[] | null | null | null | null | null |
|
CVE-2021-22227
|
A reflected cross-site script vulnerability in GitLab before versions 13.11.6, 13.12.6 and 14.0.2 allowed an attacker to send a malicious link to a victim and trigger actions on their behalf if they clicked it
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:-:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-v82c-prq9-mg8q
|
Unrestricted file upload vulnerability in IBM Rational AppScan Enterprise 5.x and 8.x before 8.5.0.1 allows remote authenticated users to execute arbitrary ASP.NET code by uploading a .aspx file, and then accessing it via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-fh52-7j8h-w7j3
|
In the Linux kernel, the following vulnerability has been resolved:phy: realtek: usb: fix NULL deref in rtk_usb3phy_probeIn rtk_usb3phy_probe() devm_kzalloc() may return NULL
but this returned value is not checked.
|
[] | null | 5.5 | null | null | null |
|
GHSA-crq8-2jwq-9c2c
|
Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
|
[] | null | null | null | null | null |
|
GHSA-36fg-m6m3-3q45
|
Missing Authorization vulnerability in Undsgn Uncode Core.This issue affects Uncode Core: from n/a through 2.8.8.
|
[] | null | 7.7 | null | null | null |
|
CVE-2008-1022
|
Stack-based buffer overflow in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted VR movie with an obji atom of zero size.
|
[
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2022:1417
|
Red Hat Security Advisory: kernel security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: cgroups v1 release_agent feature may allow privilege escalation
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 7 | null | null | null |
CVE-2023-39224
|
Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided.
|
[
"cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_c7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:archer_c7:2.0:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
CVE-2024-42482
|
fish-shop/syntax-check Improper Neutralization of Delimiters
|
fish-shop/syntax-check is a GitHub action for syntax checking fish shell files. Improper neutralization of delimiters in the `pattern` input (specifically the command separator `;` and command substitution characters `(` and `)`) mean that arbitrary command injection is possible by modification of the input value used in a workflow. This has the potential for exposure or exfiltration of sensitive information from the workflow runner, such as might be achieved by sending environment variables to an external entity. It is recommended that users update to the patched version `v1.6.12` or the latest release version `v2.0.0`, however remediation may be possible through careful control of workflows and the `pattern` input value used by this action.
|
[
"cpe:2.3:a:fish-shop:syntax-check:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
GHSA-v9jw-7cc5-cw3r
|
admin/core/admin_func.php in razorCMS before 1.2.1 does not properly restrict access to certain administrator directories and files, which allows remote authenticated users to read, edit, rename, move, copy and delete files via the (1) dir parameter in a fileman or (2) filemanview action. NOTE: this issue has been referred to as a "path traversal."
|
[] | null | null | null | null | null |
|
RHSA-2016:1001
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu: incorrect banked access bounds checking in vga module
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 7.6 | null | null |
GHSA-6fc9-hr4q-q8mm
|
Directory traversal vulnerability in src/torrent_info.cpp in Rasterbar libtorrent before 0.14.4, as used in firetorrent, qBittorrent, deluge Torrent, and other applications, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) and partial relative pathname in a Multiple File Mode list element in a .torrent file.
|
[] | null | null | null | null | null |
|
CVE-2017-16997
|
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
|
[
"cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2001-0545
|
IIS 4.0 with URL redirection enabled allows remote attackers to cause a denial of service (crash) via a malformed request that specifies a length that is different than the actual length.
|
[
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-32x6-qvw6-mxj4
|
Forwarding of confidentials headers to third parties in fluture-node
|
ImpactUsing `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing.PatchesThe redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin.WorkaroundsUse a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in [email protected] vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
|
[] | 2.1 | 2.6 | null | null | null |
CVE-2022-28913
|
TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the filename parameter in /setting/setUploadSetting.
|
[
"cpe:2.3:o:totolink:n600r_firmware:5.3c.7159_b20190425:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
RHSA-2019:2998
|
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Thorntail 2.5.0 security & bug fix update
|
keycloak: session hijack using the user access token undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: default typing mishandling leading to remote code execution
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 9.8 | null | null |
GHSA-3rfx-p4vj-g7v6
|
The Adobe Premiere Clip app before 1.2.1 for iOS mishandles unspecified input, which has unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-46971
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
GHSA-45g7-4cgq-4vp4
|
Jsish 2.4.84 2.0484 is affected by: Reachable Assertion. The impact is: denial of service. The component is: function Jsi_ValueArrayIndex (jsiValue.c:366). The attack vector is: executing crafted javascript code. The fixed version is: after commit 738ead193aff380a7e3d7ffb8e11e446f76867f3.
|
[] | null | null | null | null | null |
|
GHSA-664w-gxq6-68m4
|
VCM5010 with software versions earlier before V100R002C50SPC100 has an authentication bypass vulnerability. This is due to improper implementation of authentication for accessing web pages. An unauthenticated attacker could bypass the authentication by sending a crafted HTTP request. 5010 with software versions earlier before V100R002C50SPC100 has an arbitrary file upload vulnerability. The software does not validate the files that uploaded. An authenticated attacker could upload arbitrary files to the system.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-36163
|
Cross Site Scripting vulnerability in IP-DOT BuildaGate v.BuildaGate5 allows a remote attacker to execute arbitrary code via a crafted script to the mc parameter of the URL.
|
[
"cpe:2.3:a:buildagate_project:buildagate:5:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2017-8633
|
Windows Error Reporting (WER) in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability, aka "Windows Error Reporting Elevation of Privilege Vulnerability".
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 8.5 | null |
|
CVE-2025-30660
|
Junos OS: MX Series: Decapsulation of specific GRE packets leads to PFE reset
|
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When processing a high rate of specific GRE traffic destined to the device, the respective PFE will hang causing traffic forwarding to stop.
When this issue occurs the following logs can be observed:
<fpc #> MQSS(0): LI-3: Received a parcel with more than 512B accompanying data
CHASSISD_FPC_ASIC_ERROR: ASIC Error detected <...>
This issue affects Junos OS:
* all versions before 21.2R3-S9,
* 21.4 versions before 21.4R3-S8,
* 22.2 versions before 22.2R3-S4,
* 22.4 versions before 22.4R3-S5,
* 23.2 versions before 23.2R2-S2,
* 23.4 versions before 23.4R2.
|
[] | 8.7 | 7.5 | null | null | null |
cisco-sa-iosxe-buffover-CqdRWLc
|
Cisco IOS XE SD-WAN Software vDaemon Buffer Overflow Vulnerability
|
A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device.
This vulnerability is due to insufficient bounds checking when the device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. The attacker must have a man-in-the-middle position between Cisco vManage and an associated device that is running an affected version of Cisco IOS XE SD-WAN Software. An exploit could allow the attacker to conduct a controllable buffer overflow attack (and possibly execute arbitrary commands as the root user) or cause a device reload, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"].
|
[] | null | 8.1 | null | null | null |
GHSA-9388-m6c7-2394
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: do not BUG_ON() when freeing tree block after errorWhen freeing a tree block, at btrfs_free_tree_block(), if we fail to
create a delayed reference we don't deal with the error and just do a
BUG_ON(). The error most likely to happen is -ENOMEM, and we have a
comment mentioning that only -ENOMEM can happen, but that is not true,
because in case qgroups are enabled any error returned from
btrfs_qgroup_trace_extent_post() (can be -EUCLEAN or anything returned
from btrfs_search_slot() for example) can be propagated back to
btrfs_free_tree_block().So stop doing a BUG_ON() and return the error to the callers and make
them abort the transaction to prevent leaking space. Syzbot was
triggering this, likely due to memory allocation failure injection.
|
[] | null | 5.5 | null | null | null |
|
GHSA-4pjf-jwfp-vg6f
|
Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter.
|
[] | null | null | 7.2 | null | null |
|
RHSA-2023:5202
|
Red Hat Security Advisory: thunderbird security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 0 | null | null | null |
CVE-2006-2114
|
Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request.
|
[
"cpe:2.3:a:sws:sws_simple_web_server:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sws:sws_simple_web_server:0.1.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wxmf-fmxq-57qq
|
Symantec Norton SystemWorks and SystemWorks Premier 2005 and 2006 stores temporary copies of files in the Norton Protected Recycle Bin NProtect directory, which is hidden from the FindFirst and FindNext Windows APIs and allows remote attackers to hide arbitrary files from virus scanners and other products.
|
[] | null | null | null | null | null |
|
GHSA-wwvc-xq5p-g468
|
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.
|
[] | null | null | null | null | null |
|
GHSA-m227-w3jm-cmgq
|
Cross-site scripting (XSS) vulnerability in ActionScript in arbitrary Shockwave Flash (SWF) files created by Adobe Dreamweaver, when the Insert Flash Video feature is used, allows remote attackers to inject arbitrary web script or HTML via an asfunction: URI in the skinName parameter. NOTE: this may overlap CVE-2007-6242, CVE-2007-6244, or CVE-2007-6637.
|
[] | null | null | null | null | null |
|
GHSA-852r-9m3w-pq97
|
Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
|
[] | null | null | null | null | null |
|
CVE-2022-3572
|
A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions from 13.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the Jira Connect integration which could lead to a reflected XSS that allowed attackers to perform arbitrary actions on behalf of victims.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:enterprise:*:*:*"
] | null | 9.3 | null | null | null |
|
GHSA-3v83-x3vq-3mmv
|
When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-49436
|
WordPress Custom Menu plugin <= 1.8 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in thiudis Custom Menu allows Stored XSS. This issue affects Custom Menu: from n/a through 1.8.
|
[] | null | 6.5 | null | null | null |
CVE-2023-26332
|
ZDI-CAN-20144: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-cj6m-q665-hjp4
|
The Just Custom Fields plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on several AJAX function. This makes it possible for unauthenticated attackers to invoke this functionality intended for admin users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This enables subscribers to manage field groups, change visibility of items among other things.
|
[] | null | 4.3 | null | null | null |
|
GHSA-6572-69wh-jpjp
|
Free PHP VX Guestbook 1.06 allows remote attackers to bypass authentication and download a backup of the database via a direct request to admin/backupdb.php.
|
[] | null | null | null | null | null |
|
GHSA-rwv8-j25h-rxjw
|
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2200HP all versions allows a attacker to deletespecific files in the product.
|
[] | null | 5.4 | null | null | null |
|
GHSA-5wv5-fjr2-cm75
|
Cross-site scripting (XSS) vulnerability in Calendar in Apple iOS before 5 allows remote attackers to inject arbitrary web script or HTML via an invitation note.
|
[] | null | null | null | null | null |
|
CVE-2021-41083
|
CSRF Vulnerability in dada-mail 11.15.1 and below
|
Dada Mail is a web-based e-mail list management system. In affected versions a bad actor could give someone a carefully crafted web page via email, SMS, etc, that - when visited, allows them control of the list control panel as if the bad actor was logged in themselves. This includes changing any mailing list password, as well as the Dada Mail Root Password - which could effectively shut out actual list owners of the mailing list and allow the bad actor complete and unfettered control of your mailing list. This vulnerability also affects profile logins. For this vulnerability to work, the target of the bad actor would need to be logged into the list control panel themselves. This CSRF vulnerability in Dada Mail affects all versions of Dada Mail v11.15.1 and below. Although we know of no known CSRF exploits that have happened in the wild, this vulnerability has been confirmed by our testing, and by a third party. Users are advised to update to version 11.16.0.
|
[
"cpe:2.3:a:dadamailproject:dada_mail:*:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
CVE-2007-1896
|
Directory traversal vulnerability in chat.php in Sky GUNNING MySpeach 3.0.7 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) and trailing %00 (NULL) in a my_ms[root] cookie.
|
[
"cpe:2.3:a:sky_gunning:myspeach:2.1_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:sky_gunning:myspeach:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sky_gunning:myspeach:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sky_gunning:myspeach:3.0.7:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
RHSA-2024:0793
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.3 release security update
|
parsson: Denial of Service due to large number parsing logback: serialization vulnerability in logback receiver logback: A serialization vulnerability in logback receiver
|
[
"cpe:/a:redhat:camel_spring_boot:4.0.3"
] | null | 7.5 | null | null | null |
GHSA-3f2p-fcxq-w4cm
|
In the Linux kernel, the following vulnerability has been resolved:media: gspca: cpia1: shift-out-of-bounds in set_flickerSyzkaller reported the following issue:
UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27
shift exponent 245 is too large for 32-bit type 'int'When the value of the variable "sd->params.exposure.gain" exceeds the
number of bits in an integer, a shift-out-of-bounds error is reported. It
is triggered because the variable "currentexp" cannot be left-shifted by
more than the number of bits in an integer. In order to avoid invalid
range during left-shift, the conditional expression is added.
|
[] | null | null | null | null | null |
|
ICSA-23-073-04
|
AVEVA Plant SCADA and AVEVA Telemetry Server
|
The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit, which could allow an unauthenticated user to remotely read data, cause a denial-of-service condition, and tamper with alarm states. CVE-2023-1256 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
GHSA-2r4p-gw5x-3p8w
|
General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-5017
|
Interactions with the OS in Google Chrome prior to 56.0.2924.76 for Mac insufficiently cleared video memory, which allowed a remote attacker to possibly extract image fragments on systems with GeForce 8600M graphics chips via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 | null |
|
GHSA-gp3m-x389-m39x
|
The Paid Memberships Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.2. This is due to missing or incorrect nonce validation on the pmpro_page_save() function. This makes it possible for unauthenticated attackers to save pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
CVE-2012-4537
|
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
|
[
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-9m3f-27xq-x4j5
|
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.
|
[] | null | 8.8 | null | null | null |
|
GHSA-f7hm-xqp4-h2q8
|
In the Linux kernel, the following vulnerability has been resolved:HID: logitech-hidpp: Fix kernel crash on receiver USB disconnecthidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.This opens the following races (note the below code is simplified):Retrieving + printing the protocol (harmless race):if (!hidpp->protocol_major) {
hidpp_root_get_protocol_version()
hidpp->protocol_major = response.rap.params[0];
}We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:Updating the name to the HIDPP name (harmless race):if (hidpp->name == hdev->name) {
...
hidpp->name = new_name;
}Initializing the power_supply class for the battery (problematic!):hidpp_initialize_battery()
{
if (hidpp->battery.ps)
return 0;}Creating delayed input_device (potentially problematic):if (hidpp->delayed_input)
return;hidpp->delayed_input = hidpp_allocate_input(hdev);The really big problem here is 3. Hitting the race leads to the following
sequence:So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.Notice how:This is all devm-maganagedThe hidpp->battery.desc struct is shared between the 2 power supplieshidpp->battery.desc.properties points to the result from the second
devm_kmemdup()This causes a use after free scenario on USB disconnect of the receiver:The last registered power supply class device gets unregisteredThe memory from the last devm_kmemdup() call gets freed,
hidpp->battery.desc.properties now points to freed memoryThe first registered power supply class device gets unregistered,
this involves sending a remove uevent to userspace which invokes
power_supply_uevent() to fill the uevent datapower_supply_uevent() uses hidpp->battery.desc.properties which
now points to freed memory leading to backtraces like this one:Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:
---truncated---
|
[] | null | 4.7 | null | null | null |
|
GHSA-cccc-7v4m-r37j
|
An issue was discovered in certain Apple products. iOS before 11 is affected. macOS before 10.13 is affected. tvOS before 11 is affected. watchOS before 4 is affected. The issue involves the "CFNetwork Proxies" component. It allows remote attackers to cause a denial of service.
|
[] | null | null | 4.9 | null | null |
|
GHSA-mrv2-38v6-5385
|
The setName function in filesystem/File.php in SilverStripe 2.3.x before 2.3.8 and 2.4.x before 2.4.1 allows remote authenticated users with CMS author privileges to execute arbitrary PHP code by changing the extension of an uploaded file.
|
[] | null | null | null | null | null |
|
GHSA-9crq-chhp-cxh5
|
Launch Services in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to cause a denial of service (persistent Finder crash) via a crafted Mach-O executable that triggers an out-of-bounds memory read.
|
[] | null | null | null | null | null |
|
GHSA-2m36-m26c-9mc8
|
An elevation of privilege vulnerability in the Huawei bootloader. Product: Android. Versions: Android kernel. Android ID: A-34622855.
|
[] | null | null | 9.8 | null | null |
|
GHSA-pfx6-89gh-7jqf
|
Libarchive v3.6.0 was discovered to contain a read memory access vulnerability via the function lzma_decode.
|
[] | null | 5.5 | null | null | null |
|
GHSA-qhf9-rxqc-q34r
|
In MMSProvider, there is a possible read of protected data due to improper input validationSQL injection. This could lead to local information disclosure of sms/mms data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-204117261
|
[] | null | 3.3 | null | null | null |
|
CVE-2023-43357
|
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the Manage Shortcuts component.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2021-44731
|
snapd could be made to escalate privileges and run programs as administrator
|
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
|
[
"cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2024-11023
|
Session Hijacking in Firebase JavaScript SDK
|
Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.
|
[] | 5.2 | null | null | null | null |
GHSA-xj48-mr94-q545
|
An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, 8.1, and 9.0 software. A system service allows local retrieval of the user's password. The LG ID is LVE-SMP-190009 (August 2019).
|
[] | null | null | null | null | null |
|
CVE-2019-19513
|
The BASSMIDI plugin 2.4.12.1 for Un4seen BASS Audio Library on Windows is prone to an out of bounds write vulnerability. An attacker may exploit this to execute code on the target machine. A failure in exploitation leads to a denial of service.
|
[
"cpe:2.3:a:un4seen:bassmidi:*:*:*:*:*:bass:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-13534
|
Small Package Quotes – Worldwide Express Edition <= 5.2.18 - Unauthenticated SQL Injection
|
The Small Package Quotes – Worldwide Express Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 5.2.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 7.5 | null | null | null |
GHSA-f23h-hwfp-6r8p
|
blog/index.php in SansCMS 0.7 has XSS via the q parameter.
|
[] | null | null | 6.1 | null | null |
|
GHSA-pfq2-75vc-mj87
|
Improper Neutralization of Input During CMS Backend (adminstrative section) Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Progress Sitefinity.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421.
|
[] | null | 8.4 | null | null | null |
|
GHSA-vcx8-x3m9-gr6g
|
A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). A factory account with hardcoded password might allow attackers access to the device over port 5900/tcp. Successful exploitation requires no user interaction or privileges and impacts the confidentiality, integrity, and availability of the affected device. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.
|
[] | null | null | 9.8 | null | null |
|
CVE-2018-5289
|
The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-information page.
|
[
"cpe:2.3:a:gd_rating_system_project:gd_rating_system:2.3:*:*:*:*:wordpress:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2014-3545
|
Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to execute arbitrary code via a calculated question in a quiz.
|
[
"cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.