id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2025-48370
auth-js Vulnerable to Insecure Path Routing from Malformed User Input
auth-js is an isomorphic Javascript library for Supabase Auth. Prior to version 2.69.1, the library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead to a URL path traversal, resulting in the wrong API function being called. Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this. This issue has been patched in version 2.69.1.
[]
2.7
null
null
null
null
GHSA-83hr-3993-2xh9
viewcart in Midicart accepts negative numbers in the Qty (quantity) field, which allows remote attackers to obtain a smaller total price for a shopping cart.
[]
null
null
null
null
null
GHSA-x4cw-r9m3-pj4c
A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
[]
null
null
8.6
null
null
GHSA-vp53-cwf4-9466
An issue was discovered in GitLab Community and Enterprise Edition 8.4 through 11.11. The protected branches feature contained a access control issue which resulted in a bypass of the protected branches restriction rules. It has Incorrect Access Control.
[]
null
null
null
null
null
GHSA-2mf8-5wch-fm7w
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional is vulnerable to a privilege escalation vulnerability when using token-based authentication in an admin request over the SOAP connector. X-Force ID: 175984.
[]
null
null
null
null
null
CVE-2019-19502
Code injection in pluginconfig.php in Image Uploader and Browser for CKEditor before 4.1.9 allows remote authenticated users to execute arbitrary PHP code.
[ "cpe:2.3:a:maleck:image_uploader_and_browser_for_ckeditor:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-vjmq-27j9-636j
In the Linux kernel, the following vulnerability has been resolved:of: module: add buffer overflow check in of_modalias()In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).
[]
null
9.8
null
null
null
CVE-2025-8775
Qiyuesuo Eelectronic Signature Platform Scheduled Task upload execute unrestricted upload
A vulnerability was found in Qiyuesuo Eelectronic Signature Platform up to 4.34 and classified as critical. Affected by this issue is the function execute of the file /api/code/upload of the component Scheduled Task Handler. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
null
GHSA-gxjr-v6fw-49mr
In Progress® Telerik® Report Server versions prior to 2024 Q1 (10.0.24.130), a remote code execution attack is possible through an insecure deserialization vulnerability.
[]
null
9.9
null
null
null
CVE-2007-1548
SQL injection vulnerability in functions/functions_filters.asp in Web Wiz Forums before 8.05a (MySQL version) does not properly filter certain characters in SQL commands, which allows remote attackers to execute arbitrary SQL commands via \"' (backslash double-quote quote) sequences, which are collapsed into \'', as demonstrated via the name parameter to forum/pop_up_member_search.asp.
[ "cpe:2.3:a:webwizguide:web_wiz_forums:*:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:5.21:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:5.22:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_1:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_2:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_3:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_4:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_5:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6:beta_6:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.20:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.21:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.22:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.23:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.24:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.25:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.26:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.27:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.28:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.29:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.30:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.32:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.33:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:6.34:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7:beta_4:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7:rc1:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.5:beta_1:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.7a:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.8:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.9:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.51a:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.92:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.95:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:7.96:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8:beta_1:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8:beta_2:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8:rc1:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8:rc1.1:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8.03:*:*:*:*:*:*:*", "cpe:2.3:a:webwizguide:web_wiz_forums:8.04:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-fxvm-j8ff-9hhr
Multiple cross-site scripting (XSS) vulnerabilities in Baby Katie Media (a) very Simple Car Lister (vSCAL) 1.0 and (b) very simple Realty Lister (vsREAL) 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) lid parameter in index.php and the (2) title parameter in myslideshow.php.
[]
null
null
null
null
null
GHSA-whpx-q3rq-w8jc
Hardening of TypedArrays with non-canonical numeric property names in SES
Impact_What kind of vulnerability is it? Who is impacted?_In Hardened JavaScript, programs can `harden` objects to safely share objects with co-tenant programs without risk of these other programs tampering with their API surface. Hardening does not guarantee that objects are pure or immutable, so a hardened `Map`, for example is superficially tamper-proof, but any party holding a reference to the object can both read and write its contents. Based on this precedent, and because `TypedArray` instances cannot be frozen with `Object.isFrozen`, `harden` does not `freeze` `TypedArrays` and instead makes them non-extensible and makes all non-indexed properties non-writable and non-configurable. This is consistent with the treatment of `Map` because the indexed properties represent mutable content and non-indexed properties represent the API.Due to a defect in `harden`, properties that have names that parse as numbers but are not the same as the canonical representation of those numbers, as in `"+0"` and `""` which are both equivalent to their canonical number `"0"`, remain writable after hardening.Any program treating one of these properties as part of its API and relying on `harden` to prevent modifications would be vulnerable to an API pollution attack, affecting only instances shared by mutually suspicious parties.Unlike a `Map`, a hardened `TypedArray` can only have numbers for content. Any program that is sharing hardened `TypedArrays` between co-tentant programs and relying on harden to only allow these programs to communicate exclusively by changing numbers within the bounds of the TypedArray, may inadvertently have arranged for a mechanism for a pair of third-parties to communicate arbitrary objects on these other properties.Patches_Has the problem been patched? What versions should users upgrade to?_SES version 0.16.0 patches this issue, causing `harden` to recognize properties with non-canonical numeric representations and ensuring that these properties are non-configurable.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_Users should avoid sharing `TypedArrays` between co-tenant programs and instead create wrapper objects that produce a read-only view of the underlying data. We allow `harden` to succeed for `TypedArrays` because the treatment is in fact consistent with the behavior of collections like `Map`, but all collections shared between co-tentant programs should probably be attenuated to either read- or write-only facets and probably close over only part of the content of the collection. However, the motivation for allowing `TypedArrays` to be hardened in practice is to allow certain legacy modules to function under Hardened JavaScript with LavaMoat, since they export `TypedArrays`, even though they would ideally export read-only facets of these.References_Are there any links users can visit to find out more?_Not at this time.For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
null
null
null
null
null
CVE-2017-20187
Magnesium-PHP Base.php formatEmailString injection
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file src/Magnesium/Message/Base.php. The manipulation of the argument email/name leads to injection. Upgrading to version 0.3.1 is able to address this issue. The patch is identified as 500d340e1f6421007413cc08a8383475221c2604. It is recommended to upgrade the affected component. VDB-244482 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ "cpe:2.3:a:floriangaerber:magnesium-php:*:*:*:*:*:*:*:*" ]
null
3.5
3.5
2.7
https://github.com/floriangaerber/Magnesium-PHP/commit/500d340e1f6421007413cc08a8383475221c2604
CVE-2017-17088
The Enterprise version of SyncBreeze 10.2.12 and earlier is affected by a Remote Denial of Service vulnerability. The web server does not check bounds when reading server requests in the Host header on making a connection, resulting in a classic Buffer Overflow that causes a Denial of Service.
[ "cpe:2.3:a:flexense:syncbreeze:*:*:*:*:enterprise:*:*:*" ]
null
null
7.5
5
null
GHSA-xqj5-x7c8-6f4h
Uncontrolled search path in software installer for Intel(R) PROSet/Wireless WiFi in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
null
CVE-2023-38744
Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.
[ "cpe:2.3:h:omron:cj2m_cpu_unit:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h_cpu_unit:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cs_cj_series_ethernet_ip_unit:*:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu35_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu35:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu34_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu34:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu33_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu33:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu32_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu32:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2m-cpu31_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2m-cpu31:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu68-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu68-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu67-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu67-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu66-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu66-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu65-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu65-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj2h-cpu64-eip_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj2h-cpu64-eip:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cs1w-eip21_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cs1w-eip21:-:*:*:*:*:*:*:*", "cpe:2.3:o:omron:cj1w-eip21_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:omron:cj1w-eip21:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
GHSA-7749-gxmh-frwx
Multiple cross-site scripting (XSS) vulnerabilities in Utopia News Pro (UNP) 1.1.3 and 1.1.4 allow remote attackers to inject arbitrary web script or HTML via (1) the sitetitle parameter in header.php and (2) the version and (3) query_count parameters in footer.php.
[]
null
null
null
null
null
GHSA-w4vh-2xrr-v7qg
Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email.
[]
null
null
null
null
null
CVE-2003-0266
Multiple buffer overflows in SLWebMail 3 on Windows systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long Language parameter to showlogin.dll, (2) a long CompanyID parameter to recman.dll, (3) a long CompanyID parameter to admin.dll, or (4) a long CompanyID parameter to globallogin.dll.
[ "cpe:2.3:a:bvrp_software:slwebmail:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-54296
Extension - mooj.org - Stored XSS vulnerability in ProFiles component 1.0-1.5.0 for Joomla
A stored XSS vulnerability in ProFiles component 1.0-1.5.0 for Joomla was discovered.
[]
7
null
null
null
null
GHSA-jv99-wf4f-255j
Missing Authorization vulnerability in BeRocket Brands for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Brands for WooCommerce: from n/a through 3.8.2.2.
[]
null
5.3
null
null
null
GHSA-7vfp-8536-jvm3
IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. IBM X-Force ID: 240903.
[]
null
4.3
null
null
null
GHSA-w9cm-j7x2-f2c4
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
[]
null
null
7.5
null
null
GHSA-5pwx-9pq2-mxqx
A vulnerability has been found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This vulnerability affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument host_time leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249862 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
7.3
null
null
null
CVE-2021-1210
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-fj38-vjwx-24wv
Unspecified vulnerability in the TimesTen Client/Server component in Oracle Times Ten In-Memory Database 7.0.3.0.0 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2597 and CVE-2008-2599.
[]
null
null
null
null
null
CVE-2023-21113
In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2013-3089
Cross-site request forgery (CSRF) vulnerability in apply.cgi in Belkin N300 (F7D7301v1) router allows remote attackers to hijack the authentication of administrators for requests that modify configuration.
[ "cpe:2.3:o:belkin:n300_firmware:1.00.06:*:*:*:*:*:*:*", "cpe:2.3:h:belkin:n300:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-829c-jqf8-5r5c
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
null
GHSA-jf53-8v78-xf68
The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.
[]
null
null
null
null
null
CVE-2021-22227
A reflected cross-site script vulnerability in GitLab before versions 13.11.6, 13.12.6 and 14.0.2 allowed an attacker to send a malicious link to a victim and trigger actions on their behalf if they clicked it
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:-:*:*:*" ]
null
6.1
null
null
null
GHSA-v82c-prq9-mg8q
Unrestricted file upload vulnerability in IBM Rational AppScan Enterprise 5.x and 8.x before 8.5.0.1 allows remote authenticated users to execute arbitrary ASP.NET code by uploading a .aspx file, and then accessing it via unspecified vectors.
[]
null
null
null
null
null
GHSA-fh52-7j8h-w7j3
In the Linux kernel, the following vulnerability has been resolved:phy: realtek: usb: fix NULL deref in rtk_usb3phy_probeIn rtk_usb3phy_probe() devm_kzalloc() may return NULL but this returned value is not checked.
[]
null
5.5
null
null
null
GHSA-crq8-2jwq-9c2c
Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
[]
null
null
null
null
null
GHSA-36fg-m6m3-3q45
Missing Authorization vulnerability in Undsgn Uncode Core.This issue affects Uncode Core: from n/a through 2.8.8.
[]
null
7.7
null
null
null
CVE-2008-1022
Stack-based buffer overflow in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted VR movie with an obji atom of zero size.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
RHSA-2022:1417
Red Hat Security Advisory: kernel security update
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: cgroups v1 release_agent feature may allow privilege escalation
[ "cpe:/o:redhat:rhel_els:6" ]
null
7
null
null
null
CVE-2023-39224
Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided.
[ "cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:archer_c7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:archer_c7:2.0:*:*:*:*:*:*:*" ]
null
8
null
null
null
CVE-2024-42482
fish-shop/syntax-check Improper Neutralization of Delimiters
fish-shop/syntax-check is a GitHub action for syntax checking fish shell files. Improper neutralization of delimiters in the `pattern` input (specifically the command separator `;` and command substitution characters `(` and `)`) mean that arbitrary command injection is possible by modification of the input value used in a workflow. This has the potential for exposure or exfiltration of sensitive information from the workflow runner, such as might be achieved by sending environment variables to an external entity. It is recommended that users update to the patched version `v1.6.12` or the latest release version `v2.0.0`, however remediation may be possible through careful control of workflows and the `pattern` input value used by this action.
[ "cpe:2.3:a:fish-shop:syntax-check:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
GHSA-v9jw-7cc5-cw3r
admin/core/admin_func.php in razorCMS before 1.2.1 does not properly restrict access to certain administrator directories and files, which allows remote authenticated users to read, edit, rename, move, copy and delete files via the (1) dir parameter in a fileman or (2) filemanview action. NOTE: this issue has been referred to as a "path traversal."
[]
null
null
null
null
null
RHSA-2016:1001
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: incorrect banked access bounds checking in vga module
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
7.6
null
null
GHSA-6fc9-hr4q-q8mm
Directory traversal vulnerability in src/torrent_info.cpp in Rasterbar libtorrent before 0.14.4, as used in firetorrent, qBittorrent, deluge Torrent, and other applications, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) and partial relative pathname in a Multiple File Mode list element in a .torrent file.
[]
null
null
null
null
null
CVE-2017-16997
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
[ "cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2001-0545
IIS 4.0 with URL redirection enabled allows remote attackers to cause a denial of service (crash) via a malformed request that specifies a length that is different than the actual length.
[ "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-32x6-qvw6-mxj4
Forwarding of confidentials headers to third parties in fluture-node
ImpactUsing `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing.PatchesThe redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin.WorkaroundsUse a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in [email protected] vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
[]
2.1
2.6
null
null
null
CVE-2022-28913
TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the filename parameter in /setting/setUploadSetting.
[ "cpe:2.3:o:totolink:n600r_firmware:5.3c.7159_b20190425:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
RHSA-2019:2998
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Thorntail 2.5.0 security & bug fix update
keycloak: session hijack using the user access token undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: default typing mishandling leading to remote code execution
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
9.8
null
null
GHSA-3rfx-p4vj-g7v6
The Adobe Premiere Clip app before 1.2.1 for iOS mishandles unspecified input, which has unknown impact and attack vectors.
[]
null
null
null
null
null
CVE-2025-46971
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
GHSA-45g7-4cgq-4vp4
Jsish 2.4.84 2.0484 is affected by: Reachable Assertion. The impact is: denial of service. The component is: function Jsi_ValueArrayIndex (jsiValue.c:366). The attack vector is: executing crafted javascript code. The fixed version is: after commit 738ead193aff380a7e3d7ffb8e11e446f76867f3.
[]
null
null
null
null
null
GHSA-664w-gxq6-68m4
VCM5010 with software versions earlier before V100R002C50SPC100 has an authentication bypass vulnerability. This is due to improper implementation of authentication for accessing web pages. An unauthenticated attacker could bypass the authentication by sending a crafted HTTP request. 5010 with software versions earlier before V100R002C50SPC100 has an arbitrary file upload vulnerability. The software does not validate the files that uploaded. An authenticated attacker could upload arbitrary files to the system.
[]
null
null
9.8
null
null
CVE-2023-36163
Cross Site Scripting vulnerability in IP-DOT BuildaGate v.BuildaGate5 allows a remote attacker to execute arbitrary code via a crafted script to the mc parameter of the URL.
[ "cpe:2.3:a:buildagate_project:buildagate:5:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2017-8633
Windows Error Reporting (WER) in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability, aka "Windows Error Reporting Elevation of Privilege Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
7.5
8.5
null
CVE-2025-30660
Junos OS: MX Series: Decapsulation of specific GRE packets leads to PFE reset
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When processing a high rate of specific GRE traffic destined to the device, the respective PFE will hang causing traffic forwarding to stop. When this issue occurs the following logs can be observed: <fpc #> MQSS(0): LI-3: Received a parcel with more than 512B accompanying data CHASSISD_FPC_ASIC_ERROR: ASIC Error detected <...> This issue affects Junos OS: * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S8, * 22.2 versions before 22.2R3-S4, * 22.4 versions before 22.4R3-S5, * 23.2 versions before 23.2R2-S2, * 23.4 versions before 23.4R2.
[]
8.7
7.5
null
null
null
cisco-sa-iosxe-buffover-CqdRWLc
Cisco IOS XE SD-WAN Software vDaemon Buffer Overflow Vulnerability
A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. This vulnerability is due to insufficient bounds checking when the device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. The attacker must have a man-in-the-middle position between Cisco vManage and an associated device that is running an affected version of Cisco IOS XE SD-WAN Software. An exploit could allow the attacker to conduct a controllable buffer overflow attack (and possibly execute arbitrary commands as the root user) or cause a device reload, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"].
[]
null
8.1
null
null
null
GHSA-9388-m6c7-2394
In the Linux kernel, the following vulnerability has been resolved:btrfs: do not BUG_ON() when freeing tree block after errorWhen freeing a tree block, at btrfs_free_tree_block(), if we fail to create a delayed reference we don't deal with the error and just do a BUG_ON(). The error most likely to happen is -ENOMEM, and we have a comment mentioning that only -ENOMEM can happen, but that is not true, because in case qgroups are enabled any error returned from btrfs_qgroup_trace_extent_post() (can be -EUCLEAN or anything returned from btrfs_search_slot() for example) can be propagated back to btrfs_free_tree_block().So stop doing a BUG_ON() and return the error to the callers and make them abort the transaction to prevent leaking space. Syzbot was triggering this, likely due to memory allocation failure injection.
[]
null
5.5
null
null
null
GHSA-4pjf-jwfp-vg6f
Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter.
[]
null
null
7.2
null
null
RHSA-2023:5202
Red Hat Security Advisory: thunderbird security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
0
null
null
null
CVE-2006-2114
Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request.
[ "cpe:2.3:a:sws:sws_simple_web_server:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:sws:sws_simple_web_server:0.1.7:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-wxmf-fmxq-57qq
Symantec Norton SystemWorks and SystemWorks Premier 2005 and 2006 stores temporary copies of files in the Norton Protected Recycle Bin NProtect directory, which is hidden from the FindFirst and FindNext Windows APIs and allows remote attackers to hide arbitrary files from virus scanners and other products.
[]
null
null
null
null
null
GHSA-wwvc-xq5p-g468
There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration.
[]
null
null
null
null
null
GHSA-m227-w3jm-cmgq
Cross-site scripting (XSS) vulnerability in ActionScript in arbitrary Shockwave Flash (SWF) files created by Adobe Dreamweaver, when the Insert Flash Video feature is used, allows remote attackers to inject arbitrary web script or HTML via an asfunction: URI in the skinName parameter. NOTE: this may overlap CVE-2007-6242, CVE-2007-6244, or CVE-2007-6637.
[]
null
null
null
null
null
GHSA-852r-9m3w-pq97
Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
[]
null
null
null
null
null
CVE-2022-3572
A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions from 13.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the Jira Connect integration which could lead to a reflected XSS that allowed attackers to perform arbitrary actions on behalf of victims.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.6.0:*:*:*:enterprise:*:*:*" ]
null
9.3
null
null
null
GHSA-3v83-x3vq-3mmv
When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
[]
null
6.5
null
null
null
CVE-2025-49436
WordPress Custom Menu plugin <= 1.8 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in thiudis Custom Menu allows Stored XSS. This issue affects Custom Menu: from n/a through 1.8.
[]
null
6.5
null
null
null
CVE-2023-26332
ZDI-CAN-20144: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-cj6m-q665-hjp4
The Just Custom Fields plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on several AJAX function. This makes it possible for unauthenticated attackers to invoke this functionality intended for admin users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This enables subscribers to manage field groups, change visibility of items among other things.
[]
null
4.3
null
null
null
GHSA-6572-69wh-jpjp
Free PHP VX Guestbook 1.06 allows remote attackers to bypass authentication and download a backup of the database via a direct request to admin/backupdb.php.
[]
null
null
null
null
null
GHSA-rwv8-j25h-rxjw
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2200HP all versions allows a attacker to deletespecific files in the product.
[]
null
5.4
null
null
null
GHSA-5wv5-fjr2-cm75
Cross-site scripting (XSS) vulnerability in Calendar in Apple iOS before 5 allows remote attackers to inject arbitrary web script or HTML via an invitation note.
[]
null
null
null
null
null
CVE-2021-41083
CSRF Vulnerability in dada-mail 11.15.1 and below
Dada Mail is a web-based e-mail list management system. In affected versions a bad actor could give someone a carefully crafted web page via email, SMS, etc, that - when visited, allows them control of the list control panel as if the bad actor was logged in themselves. This includes changing any mailing list password, as well as the Dada Mail Root Password - which could effectively shut out actual list owners of the mailing list and allow the bad actor complete and unfettered control of your mailing list. This vulnerability also affects profile logins. For this vulnerability to work, the target of the bad actor would need to be logged into the list control panel themselves. This CSRF vulnerability in Dada Mail affects all versions of Dada Mail v11.15.1 and below. Although we know of no known CSRF exploits that have happened in the wild, this vulnerability has been confirmed by our testing, and by a third party. Users are advised to update to version 11.16.0.
[ "cpe:2.3:a:dadamailproject:dada_mail:*:*:*:*:*:*:*:*" ]
null
8
null
null
null
CVE-2007-1896
Directory traversal vulnerability in chat.php in Sky GUNNING MySpeach 3.0.7 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) and trailing %00 (NULL) in a my_ms[root] cookie.
[ "cpe:2.3:a:sky_gunning:myspeach:2.1_beta:*:*:*:*:*:*:*", "cpe:2.3:a:sky_gunning:myspeach:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:sky_gunning:myspeach:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:sky_gunning:myspeach:3.0.7:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
RHSA-2024:0793
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.3 release security update
parsson: Denial of Service due to large number parsing logback: serialization vulnerability in logback receiver logback: A serialization vulnerability in logback receiver
[ "cpe:/a:redhat:camel_spring_boot:4.0.3" ]
null
7.5
null
null
null
GHSA-3f2p-fcxq-w4cm
In the Linux kernel, the following vulnerability has been resolved:media: gspca: cpia1: shift-out-of-bounds in set_flickerSyzkaller reported the following issue: UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27 shift exponent 245 is too large for 32-bit type 'int'When the value of the variable "sd->params.exposure.gain" exceeds the number of bits in an integer, a shift-out-of-bounds error is reported. It is triggered because the variable "currentexp" cannot be left-shifted by more than the number of bits in an integer. In order to avoid invalid range during left-shift, the conditional expression is added.
[]
null
null
null
null
null
ICSA-23-073-04
AVEVA Plant SCADA and AVEVA Telemetry Server
The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit, which could allow an unauthenticated user to remotely read data, cause a denial-of-service condition, and tamper with alarm states. CVE-2023-1256 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
null
GHSA-2r4p-gw5x-3p8w
General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface.
[]
null
9.8
null
null
null
CVE-2017-5017
Interactions with the OS in Google Chrome prior to 56.0.2924.76 for Mac insufficiently cleared video memory, which allowed a remote attacker to possibly extract image fragments on systems with GeForce 8600M graphics chips via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
4.3
4.3
null
GHSA-gp3m-x389-m39x
The Paid Memberships Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.2. This is due to missing or incorrect nonce validation on the pmpro_page_save() function. This makes it possible for unauthenticated attackers to save pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
CVE-2012-4537
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
[ "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-9m3f-27xq-x4j5
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.
[]
null
8.8
null
null
null
GHSA-f7hm-xqp4-h2q8
In the Linux kernel, the following vulnerability has been resolved:HID: logitech-hidpp: Fix kernel crash on receiver USB disconnecthidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU) races when it races with itself.hidpp_connect_event() primarily runs from a workqueue but it also runs on probe() and if a "device-connected" packet is received by the hw when the thread running hidpp_connect_event() from probe() is waiting on the hw, then a second thread running hidpp_connect_event() will be started from the workqueue.This opens the following races (note the below code is simplified):Retrieving + printing the protocol (harmless race):if (!hidpp->protocol_major) { hidpp_root_get_protocol_version() hidpp->protocol_major = response.rap.params[0]; }We can actually see this race hit in the dmesg in the abrt output attached to rhbz#2227968:[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected. [ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.Testing with extra logging added has shown that after this the 2 threads take turn grabbing the hw access mutex (send_mutex) so they ping-pong through all the other TOCTOU cases managing to hit all of them:Updating the name to the HIDPP name (harmless race):if (hidpp->name == hdev->name) { ... hidpp->name = new_name; }Initializing the power_supply class for the battery (problematic!):hidpp_initialize_battery() { if (hidpp->battery.ps) return 0;}Creating delayed input_device (potentially problematic):if (hidpp->delayed_input) return;hidpp->delayed_input = hidpp_allocate_input(hdev);The really big problem here is 3. Hitting the race leads to the following sequence:So now we have registered 2 power supplies for the same battery, which looks a bit weird from userspace's pov but this is not even the really big problem.Notice how:This is all devm-maganagedThe hidpp->battery.desc struct is shared between the 2 power supplieshidpp->battery.desc.properties points to the result from the second devm_kmemdup()This causes a use after free scenario on USB disconnect of the receiver:The last registered power supply class device gets unregisteredThe memory from the last devm_kmemdup() call gets freed, hidpp->battery.desc.properties now points to freed memoryThe first registered power supply class device gets unregistered, this involves sending a remove uevent to userspace which invokes power_supply_uevent() to fill the uevent datapower_supply_uevent() uses hidpp->battery.desc.properties which now points to freed memory leading to backtraces like this one:Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08 ... Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0 ... Sep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30 Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0 Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0 Sep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0 Sep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680 Sep 22 20:01:35 eric kernel: ---truncated---
[]
null
4.7
null
null
null
GHSA-cccc-7v4m-r37j
An issue was discovered in certain Apple products. iOS before 11 is affected. macOS before 10.13 is affected. tvOS before 11 is affected. watchOS before 4 is affected. The issue involves the "CFNetwork Proxies" component. It allows remote attackers to cause a denial of service.
[]
null
null
4.9
null
null
GHSA-mrv2-38v6-5385
The setName function in filesystem/File.php in SilverStripe 2.3.x before 2.3.8 and 2.4.x before 2.4.1 allows remote authenticated users with CMS author privileges to execute arbitrary PHP code by changing the extension of an uploaded file.
[]
null
null
null
null
null
GHSA-9crq-chhp-cxh5
Launch Services in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to cause a denial of service (persistent Finder crash) via a crafted Mach-O executable that triggers an out-of-bounds memory read.
[]
null
null
null
null
null
GHSA-2m36-m26c-9mc8
An elevation of privilege vulnerability in the Huawei bootloader. Product: Android. Versions: Android kernel. Android ID: A-34622855.
[]
null
null
9.8
null
null
GHSA-pfx6-89gh-7jqf
Libarchive v3.6.0 was discovered to contain a read memory access vulnerability via the function lzma_decode.
[]
null
5.5
null
null
null
GHSA-qhf9-rxqc-q34r
In MMSProvider, there is a possible read of protected data due to improper input validationSQL injection. This could lead to local information disclosure of sms/mms data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-204117261
[]
null
3.3
null
null
null
CVE-2023-43357
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the Manage Shortcuts component.
[ "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2021-44731
snapd could be made to escalate privileges and run programs as administrator
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
[ "cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2024-11023
Session Hijacking in Firebase JavaScript SDK
Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.
[]
5.2
null
null
null
null
GHSA-xj48-mr94-q545
An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, 8.1, and 9.0 software. A system service allows local retrieval of the user's password. The LG ID is LVE-SMP-190009 (August 2019).
[]
null
null
null
null
null
CVE-2019-19513
The BASSMIDI plugin 2.4.12.1 for Un4seen BASS Audio Library on Windows is prone to an out of bounds write vulnerability. An attacker may exploit this to execute code on the target machine. A failure in exploitation leads to a denial of service.
[ "cpe:2.3:a:un4seen:bassmidi:*:*:*:*:*:bass:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-13534
Small Package Quotes – Worldwide Express Edition <= 5.2.18 - Unauthenticated SQL Injection
The Small Package Quotes – Worldwide Express Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 5.2.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
7.5
null
null
null
GHSA-f23h-hwfp-6r8p
blog/index.php in SansCMS 0.7 has XSS via the q parameter.
[]
null
null
6.1
null
null
GHSA-pfq2-75vc-mj87
Improper Neutralization of Input During CMS Backend (adminstrative section) Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Progress Sitefinity.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421.
[]
null
8.4
null
null
null
GHSA-vcx8-x3m9-gr6g
A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). A factory account with hardcoded password might allow attackers access to the device over port 5900/tcp. Successful exploitation requires no user interaction or privileges and impacts the confidentiality, integrity, and availability of the affected device. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.
[]
null
null
9.8
null
null
CVE-2018-5289
The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-information page.
[ "cpe:2.3:a:gd_rating_system_project:gd_rating_system:2.3:*:*:*:*:wordpress:*:*" ]
null
null
7.5
5
null
CVE-2014-3545
Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to execute arbitrary code via a calculated question in a quiz.
[ "cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*" ]
null
null
null
6
null