id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-w95r-6gjg-73xh
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
GHSA-hh8x-xr4m-qghx
|
Smart Parking Management System from Honding Technology has a Missing Authorization vulnerability, allowing remote attackers with regular privileges to access a specific functionality to create administrator accounts, and subsequently log into the system using those accounts.
|
[] | 8.7 | 8.8 | null | null | null |
|
CVE-2022-22954
|
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
|
[
"cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_automation:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:20.10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:20.10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-rmj9-q58g-9qgg
|
go-unzip vulnerable to Path Traversal
|
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
|
[] | null | 9.1 | null | null | null |
CVE-2019-8699
|
A logic issue existed in the handling of answering phone calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.4. The initiator of a phone call may be able to cause the recipient to answer a simultaneous Walkie-Talkie connection.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-9gph-v8wv-c92v
|
unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
|
[] | null | null | null | null | null |
|
GHSA-q5v8-pxhm-3vh3
|
The eHDR CTMS from Sunnet has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL command to read, modify, and delete database contents.
|
[] | null | 9.8 | null | null | null |
|
GHSA-qfmr-mqxf-7859
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to a denial of service with a specially crafted query on certain columnar tables. IBM X-Force ID: 280905.
|
[] | null | 5.3 | null | null | null |
|
GHSA-j65x-pp5m-j68h
|
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141028068
|
[] | null | null | null | null | null |
|
GHSA-c26r-vw7p-2m7h
|
OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges
|
[] | null | 8.8 | null | null | null |
|
CVE-2012-2241
|
scripts/dget.pl in devscripts before 2.12.3 allows remote attackers to delete arbitrary files via a crafted (1) .dsc or (2) .changes file, probably related to a NULL byte in a filename.
|
[
"cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch1:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch2:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch4:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch5:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.12.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2009-4182
|
Multiple unspecified vulnerabilities in HP Web Jetadmin 10.2, when a remote SQL server is used, allow remote attackers to obtain access to data or cause a denial of service, possibly by leveraging authentication and encryption weaknesses on the SQL server.
|
[
"cpe:2.3:a:hp:web_jetadmin:10.2:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
RHSA-2018:3852
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 6.5 | null | null |
GHSA-gv23-rrw9-jxh8
|
Multiple Read overflows issue due to improper length check while decoding Identity Request in CSdomain/Authentication Reject in CS domain/ PRAU accept/while logging DL message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
|
[] | null | null | null | null | null |
|
CVE-2020-0104
|
In onShowingStateChanged of KeyguardStateMonitor.java, there is a possible inappropriate read due to a logic error. This could lead to local information disclosure of keyguard-protected data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-144430870
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2016-6811
|
In Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
|
[
"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
GHSA-2hgp-5crx-6xc9
|
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Excel for Mac 2011, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
GHSA-jc68-x2f2-3x93
|
PHP remote file inclusion vulnerability in upgrade.php in Coalescent Systems freePBX 2.1.3 allows remote attackers to execute arbitrary PHP code via a URL in the amp_conf[AMPWEBROOT] parameter.
|
[] | null | null | null | null | null |
|
GHSA-vjgj-v6jh-4c36
|
The ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value_filter' parameter in all versions up to, and including, 1.4.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 6.5 | null | null | null |
|
GHSA-75rf-hx73-vjfr
|
Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.
|
[] | null | null | null | null | null |
|
GHSA-23x9-2qmf-qr95
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ExtendThemes Kubio AI Page Builder.This issue affects Kubio AI Page Builder: from n/a through 2.2.4.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-21840
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.40 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
PYSEC-2020-177
| null |
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
|
[] | null | null | null | null | null |
GHSA-88r2-xrwf-mvhm
|
An authenticated RCE vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
|
[] | null | 6.4 | null | null | null |
|
GHSA-mvh8-j583-3mwc
|
A vulnerability, which was classified as critical, was found in kylin-system-updater up to 1.4.20kord. Affected is the function InstallSnap of the component Update Handler. The manipulation leads to command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222600.
|
[] | null | 7.8 | null | null | null |
|
GHSA-hq6f-9m26-g47r
|
A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices.
|
[] | null | null | null | null | null |
|
CVE-2021-37471
|
Cradlepoint IBR900-600 devices running versions < 7.21.10 are vulnerable to a restricted shell escape sequence that provides an attacker the capability to simultaneously deny availability to the device's NetCloud Manager console, local console and SSH command-line.
|
[
"cpe:2.3:o:cradlepoint:ibr600c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cradlepoint:ibr600c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cradlepoint:ibr600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cradlepoint:ibr600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cradlepoint:ibr900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cradlepoint:ibr900:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
RHSA-2020:3504
|
Red Hat Security Advisory: Red Hat Ceph Storage 3.3 security and bug fix update
|
ceph: radosgw: HTTP header injection via CORS ExposeHeader tag
|
[
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | 5.4 | null | null | null |
GHSA-pcqv-c46v-2p4v
|
Ansible Arbitrary File Overwrite Vulnerability
|
`lib/ansible/playbook/__init__.py` in Ansible 1.2.x before 1.2.3, when playbook does not run due to an error, allows local users to overwrite arbitrary files via a symlink attack on a retry file with a predictable name in `/var/tmp/ansible/`.
|
[] | 6.9 | 6.2 | null | null | null |
CVE-2005-1679
|
Stack-based buffer overflow in the error directive in picasm 1.12b and earlier allows attackers to execute arbitrary code via a long error message.
|
[
"cpe:2.3:a:timo_rossi:picasm:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
CVE-2024-30386
|
Junos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash
|
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald)
of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS).
In an EVPN-VXLAN scenario, when
state updates are received and processed by the affected system, the correct order of some processing steps is not ensured, which can lead to an l2ald crash and restart. Whether the crash occurs depends on system internal timing which is outside the attackers control.
This issue affects:
Junos OS:
* All versions before 20.4R3-S8,
* 21.2 versions before 21.2R3-S6,
* 21.3 versions before 21.3R3-S5,
* 21.4 versions before 21.4R3-S4,
* 22.1 versions before 22.1R3-S3,
* 22.2 versions before 22.2R3-S1,
* 22.3 versions before 22.3R3,,
* 22.4 versions before 22.4R2;
Junos OS Evolved:
* All versions before 20.4R3-S8-EVO,
* 21.2-EVO versions before 21.2R3-S6-EVO,
* 21.3-EVO
versions before 21.3R3-S5-EVO,
* 21.4-EVO
versions before 21.4R3-S4-EVO,
* 22.1-EVO
versions before 22.1R3-S3-EVO,
* 22.2-EVO
versions before 22.2R3-S1-EVO,
* 22.3-EVO
versions before 22.3R3-EVO,
* 22.4-EVO
versions before 22.4R2-EVO.
|
[] | 7.1 | 5.3 | null | null | null |
CVE-2022-27446
|
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.
|
[
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2019-6610
|
On BIG-IP versions 14.0.0-14.0.0.4, 13.0.0-13.1.1.1, 12.1.0-12.1.4, 11.6.0-11.6.3.4, and 11.5.1-11.5.8, the system is vulnerable to a denial of service attack when performing URL classification.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*"
] | null | null | 8.6 | 9 | null |
|
GHSA-986g-4mqr-vp66
|
The HydFM (aka com.apheliontechnologies.hydfm) application 1.1.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2004-2394
|
Off-by-one error in passwd 0.68 and earlier, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks.
|
[
"cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2024-6436
|
Rockwell Automation Input Validation Vulnerability exists in the SequenceManager™ Server
|
An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.
|
[
"cpe:2.3:a:rockwellautomation:sequencemanager:*:*:*:*:*:*:*:*"
] | 8.7 | null | null | null | null |
RHSA-2002:297
|
Red Hat Security Advisory: : : : Updated vim packages fix modeline vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null | null |
GHSA-3qgh-vv5w-v35w
|
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with root privileges using chroothole_client's PHP call, a related issue to CVE-2017-11322.
|
[] | null | null | null | null | null |
|
GHSA-82v7-gj6q-fj5r
|
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. There is a stack overflow in the kperfmon driver. The Samsung ID is SVE-2019-15876 (January 2020).
|
[] | null | null | null | null | null |
|
GHSA-hh27-ffr2-f2jc
|
Open redirect in url-parse
|
OverviewAffected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site.ImpactDepending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
|
[] | null | 6.1 | null | null | null |
GHSA-v226-jv33-4v79
|
Multiple PHP remote file inclusion vulnerabilities in SolidState 0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the base_path parameter in manager/pages/ scripts including (1) AccountsPage.class.php, (2) AddInvoicePage.class.php, (3) AddIPAddressPage.class.php, (4) AddPaymentPage.class.php, (5) AddTaxRulePage.class.php, (6) AssignDomainPage.class.php, (7) AssignHostingPage.class.php, (8) AssignProductPage.class.php, (9) BillingPage.class.php, (10) BillingPaymentPage.class.php, (11) BrowseAccountsPage.class.php, (12) BrowseInvoicesPage.class.php, (13) ConfigureEditUserPage.class.php, (14) ConfigureNewUserPage.class.php, (15) ConfigureNewUserReceiptPage.class.php, (16) ConfigureUsersPage.class.php, (17) DeleteAccountPage.class.php, (18) DeleteDomainServicePage.class.php, (19) DeleteHostingServicePage.class.php, (20) DeleteInvoicePage.class.php, (21) DeleteProductPage.class.php, (22) DeleteServerPage.class.php, (23) DomainServicesPage.class.php, (24) DomainsPage.class.php, (25) EditAccountPage.class.php, (26) EditDomainPage.class.php, (27) EditDomainServicePage.class.php, (28) EditHostingServicePage.class.php, (29) EditPaymentPage.class.php, (30) EditProductPage.class.php, (31) EditServerPage.class.php, (32) EmailInvoicePage.class.php, (33) ExecuteOrderPage.class.php, (34) ExpiredDomainsPage.class.php, (35) FulfilledOrdersPage.class.php, (36) GenerateInvoicesPage.class.php, (37) HomePage.class.php, (38) InactiveAccountsPage.class.php, (39) IPManagerPage.class.php, (40) LoginPage.class.php, (41) LogPage.class.php, (42) ModulesPage.class.php, (43) NewAccountPage.class.php, (44) NewDomainServicePage.class.php, (45) NewProductPage.class.php, (46) OutstandingInvoicesPage.class.php, (47) PendingAccountsPage.class.php, (48) PendingOrdersPage.class.php, (49) PrintInvoicePage.class.php, (50) ProductsPage.class.php, (51) RegisterDomainPage.class.php, (52) RegisteredDomainsPage.class.php, (53) ServersPage.class.php, (54) ServicesHostingServicesPage.class.php, (55) ServicesNewHostingPage.class.php, (56) ServicesPage.class.php, (57) ServicesWebHostingPage.class.php, (58) SettingsPage.class.php, (59) TaxesPage.class.php, (60) TransferDomainPage.class.php, (61) ViewAccountPage.class.php, (62) ViewDomainServicePage.class.php, (63) ViewHostingServicePage.class.php, (64) ViewInvoicePage.class.php, (65) ViewLogMessagePage.class.php, (66) ViewOrderPage.class.php, (67) ViewProductPage.class.php, (68) ViewServerPage.class.php, (69) WelcomeEmailPage.class.php; and (70) modules/RegistrarModule.class.php, (71) modules/SolidStateModule.class.php, (72) modules/authorizeaim/authorizeaim.class.php, and (73) modules/authorizeaim/pages/AAIMConfigPage.class.php.
|
[] | null | null | null | null | null |
|
GHSA-v885-gqcv-cj29
|
IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected credentials.
|
[] | null | 4.6 | null | null | null |
|
GHSA-qg6p-r4hj-3683
|
An issue was discovered in nos client version 0.6.6, allows remote attackers to escalate privileges via getRPCEndpoint.js.
|
[] | null | 9.8 | null | null | null |
|
GHSA-m5r3-7h55-8p6v
|
An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
|
[] | null | null | null | null | null |
|
CVE-2010-1524
|
The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and "string indexing," which triggers memory corruption.
|
[
"cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2017-1126
|
IBM WebSphere Message Broker (IBM Integration Bus 9.0 and 10.0) could allow an unauthorized user to obtain sensitive information about software versions that could lead to further attacks. IBM X-Force ID: 121341.
|
[
"cpe:2.3:a:ibm:integration_bus:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.8:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2023-3118
|
Export All URLs < 4.6 - Reflected XSS
|
The Export All URLs WordPress plugin before 4.6 does not sanitise and escape a parameter before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[
"cpe:2.3:a:atlasgondal:export_all_urls:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2024-34397
|
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
|
[] | null | 5.2 | null | null | null |
|
GHSA-g3q9-p77m-rp7m
|
BigProf Online Invoicing System before 4.0 fails to adequately sanitize fields for HTML characters upon an administrator using admin/pageEditGroup.php to create a new group, resulting in Stored XSS. The caveat here is that an attacker would need administrative privileges in order to create the payload. One might think this completely mitigates the privilege-escalation impact as there is only one high-privileged role. However, it was discovered that the endpoint responsible for creating the group lacks CSRF protection.
|
[] | null | null | null | null | null |
|
CVE-2021-31531
|
Zoho ManageEngine ServiceDesk Plus MSP before 10521 is vulnerable to Server-Side Request Forgery (SSRF).
|
[
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10501:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10502:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10503:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10504:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10505:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10506:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10507:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10508:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10509:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10510:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10511:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10512:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10513:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10514:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10515:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10516:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10517:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10518:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10519:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.5:10520:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-g58p-hgrm-327x
|
A vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.
|
[] | null | 7.8 | null | null | null |
|
GHSA-pmjq-9rhw-g9xw
|
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to elevate privileges due to the way that Microsoft Edge validates JavaScript under specific conditions, aka "Microsoft Edge Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8503.
|
[] | null | null | 6.1 | null | null |
|
CVE-2019-14723
|
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.851, an insecure object reference allows an attacker to delete a victim's e-mail account via an attacker account.
|
[
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.851:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 | null |
|
GHSA-c6g2-9gg2-5hq8
|
EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.6 and RSA BSAFE SSL-J before 6.1.4 do not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack."
|
[] | null | null | null | null | null |
|
GHSA-2424-5f9c-864m
|
Multiple cross-site scripting (XSS) vulnerabilities in DeltaScripts Pro Publish allow remote attackers to inject arbitrary web script or HTML via the (1) artid parameter in art.php and the (2) catname parameter in cat.php.
|
[] | null | null | null | null | null |
|
CVE-2006-5985
|
Multiple cross-site scripting (XSS) vulnerabilities in admin/options.php in Extreme CMS 0.9, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) bg1, (2) bg2, (3) text, or (4) size parameters. NOTE: the provenance of this information is unknown; details are obtained from third party sources.
|
[
"cpe:2.3:a:extreme_cms:extreme_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2021-45735
|
TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to use the HTTP protocol for authentication into the admin interface, allowing attackers to intercept user credentials via packet capture software.
|
[
"cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2009-4820
|
Angelo-Emlak 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for veribaze/angelo.mdb.
|
[
"cpe:2.3:a:aspindir:angelo-emlak:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-mpj8-rpjw-gv2w
|
Cross-site scripting (XSS) vulnerability in SVG file handling in Lutim 0.7.1 and earlier allows remote attackers to inject arbitrary web script.
|
[] | null | null | 6.1 | null | null |
|
CVE-2021-0537
|
In onCreate of WiFiInstaller.java, there is a possible way to install a malicious Hotspot 2.0 configuration due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-176756141
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | 4.4 | null |
|
GHSA-rr9j-62f6-whm3
|
Improper access control in secure message component in Devolutions Server allows an authenticated user to steal unauthorized entries via the secure message entry attachment featureThis issue affects the following versions :Devolutions Server 2025.2.2.0 through 2025.2.4.0Devolutions Server 2025.1.11.0 and earlier
|
[] | null | 7.7 | null | null | null |
|
CVE-2024-1972
|
SourceCodester Online Job Portal EditProfile.php cross site scripting
|
A vulnerability was found in SourceCodester Online Job Portal 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /Employer/EditProfile.php. The manipulation of the argument Address leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255128.
|
[
"cpe:2.3:a:sourcecodester:online_job_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:online_job_portal:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
GHSA-28c3-wp2j-prjr
|
The Kibana fix for CVE-2017-8451 was found to be incomplete. With X-Pack installed, Kibana versions before 6.0.1 and 5.6.5 have an open redirect vulnerability on the login page that would enable an attacker to craft a link that redirects to an arbitrary website.
|
[] | null | null | 6.1 | null | null |
|
GHSA-3gp9-h8hw-pxpw
|
Denial of service in .NET core
|
.NET Core and Visual Studio Denial of Service Vulnerability due to a vulnerability which exists when creating HTTPS web request during X509 certificate chain building.
|
[] | null | 6.5 | null | null | null |
GHSA-p3q7-qq4w-p579
|
Unspecified vulnerability in HP Application Lifecycle Management (aka Quality Center) 11.5x and 12.0x allows local users to gain privileges via unknown vectors, aka ZDI-CAN-2138.
|
[] | null | null | null | null | null |
|
GHSA-v5q9-w576-r6ph
|
In wlan driver, there is a possible missing permission check, This could lead to local information disclosure.
|
[] | null | 5.5 | null | null | null |
|
GHSA-5jr9-r58p-jc88
|
An exploitable cross-site request forgery vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP packet can cause cross-site request forgery. An attacker can create malicious HTML to trigger this vulnerability.
|
[] | null | null | 8.8 | null | null |
|
CVE-2023-2028
|
Call Now Accessibility Button < 1.1 - Admin+ Stored Cross Site Scripting
|
The Call Now Accessibility Button WordPress plugin before 1.1 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:stpetedesign:call_now_accessibility_button:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null | null |
CVE-2006-0861
|
Michael Salzer Guestbox 0.6, and other versions before 0.8, allows remote attackers to obtain the source IP addresses of guestbook entries via a direct request to /gb/gblog.
|
[
"cpe:2.3:a:michael_salzer:guestbox:0.6:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2014-9270
|
Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the "profile/Platform" field.
|
[
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:a4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-24857
|
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
|
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2014-0793
|
Multiple cross-site scripting (XSS) vulnerabilities in the StackIdeas Komento (com_komento) component before 1.7.3 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) website or (2) latitude parameter in a comment to the default URI.
|
[
"cpe:2.3:a:stackideas:komento:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stackideas:komento:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stackideas:komento:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2020-7559
|
A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) that could cause a crash of the PLC simulator present in EcoStruxureª Control Expert software when receiving a specially crafted request over Modbus.
|
[
"cpe:2.3:a:schneider-electric:ecostruxure_control_expert:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2021-41415
|
Subscription-Manager v1.0 /main.js has a cross-site scripting (XSS) vulnerability in the machineDetail parameter.
|
[
"cpe:2.3:a:subscription-manager_project:subscription-manager:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
RHSA-2019:3419
|
Red Hat Security Advisory: libtiff security update
|
libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 5.3 | null | null |
CVE-2010-0804
|
Cross-site scripting (XSS) vulnerability in index.php in iBoutique 4.0 allows remote attackers to inject arbitrary web script or HTML via the key parameter in a products action.
|
[
"cpe:2.3:a:netartmedia:iboutique:4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-8rpj-mgcc-4hwx
|
A CSV injection vulnerability exists in the web UI of SolarWinds Serv-U FTP Server v15.1.7.
|
[] | null | null | null | null | null |
|
GHSA-jrq4-jwcw-x9x4
|
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the extra parameter in the news menu component.
|
[] | null | 5.4 | null | null | null |
|
GHSA-574v-3xxh-gwh5
|
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
|
[] | null | 9.8 | null | null | null |
|
CVE-2007-1721
|
Multiple PHP remote file inclusion vulnerabilities in C-Arbre 0.6PR7 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) Richtxt_functions.inc.php, (2) adddocfile.php, (3) auth_check.php, (4) browse_current_category.inc.php, (5) docfile_details.php, (6) main.php, (7) mainarticle.php, (8) maindocfile.php, (9) modify.php, (10) new.php, (11) resource_details.php, or (12) smallsearch.php in lib/; or (13) mwiki/LocalSettings.php.
|
[
"cpe:2.3:a:realink:c-arbre:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2018-5212
|
The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload_thumbnail (aka File Thumbnail) parameter in an edit action to wp-admin/post.php.
|
[
"cpe:2.3:a:simple_download_monitor_project:simple_download_monitor:3.5.4:*:*:*:*:wordpress:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2019-11178
|
Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.
|
[
"cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.5 | null |
|
CVE-2022-41581
|
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access.
|
[
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
CVE-2019-8246
|
Adobe Media Encoder versions 13.1 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-20277
|
A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.
|
[
"cpe:2.3:a:cisco:thousandeyes_enterprise_agent:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
CVE-2024-2716
|
Campcodes Complete Online DJ Booking System contactus.php cross site scripting
|
A vulnerability was found in Campcodes Complete Online DJ Booking System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/contactus.php. The manipulation of the argument email leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257469 was assigned to this vulnerability.
|
[] | null | 3.5 | 3.5 | 4 | null |
GHSA-mpm5-mv3x-34x2
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
|
[] | null | null | null | null | null |
|
CVE-2024-2060
|
SourceCodester Petrol Pump Management Software login_crud.php sql injection
|
A vulnerability classified as critical has been found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/app/login_crud.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255375.
|
[
"cpe:2.3:a:sourcecodester:petrol_pump_management:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 | null |
CVE-2023-22254
|
AEM Reflected XSS Arbitrary code execution
|
Experience Manager versions 6.5.15.0 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-6x5f-79qf-m4q2
|
Cross-site scripting (XSS) vulnerability in album.php in Atomic Photo Album (APA) 1.1.0pre4 allows remote attackers to inject arbitrary web script or HTML via the apa_album_ID parameter.
|
[] | null | null | null | null | null |
|
GHSA-ppc4-w5f5-v2jw
|
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain a command injection vulnerability via the 'port' parameter in the setSSServer function at /cgi-bin/cstecgi.cgi.
|
[] | null | 9.8 | null | null | null |
|
CVE-2001-1193
|
Directory traversal vulnerability in EFTP 2.0.8.346 allows local users to read directories via a ... (modified dot dot) in the CWD command.
|
[
"cpe:2.3:a:khamil_landross_and_zack_jones:eftp:2.0.8.346:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-w5wj-83wg-9p94
|
The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077.
|
[] | null | null | null | null | null |
|
RHSA-2018:1664
|
Red Hat Security Advisory: libvirt security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 5.6 | null | null |
CVE-2025-44072
|
SeaCMS v13.3 was discovered to contain a SQL injection vulnerability via the component admin_manager.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-33pv-vcgh-jfg9
|
Wagtail vulnerable to denial-of-service via memory exhaustion when uploading large files
|
ImpactA memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash or denial of service.The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents.Image uploads are [restricted to 10MB by default](https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size), however this validation only happens on the frontend and on the backend after the vulnerable code.PatchesPatched versions have been released as Wagtail 4.1.4 (for the LTS 4.1 branch) and Wagtail 4.2.2 (for the current 4.2 branch).WorkaroundsSite owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files. Exactly how this is done will vary based on your hosting environment, but here are a few references for common setups:Nginx: [`client_max_body_size`](https://nginx.org/en/docs/http/ngx_http_core_module.html#client_max_body_size)Apache: [`LimitRequestBody`](https://httpd.apache.org/docs/2.4/mod/core.html#limitrequestbody)Cloudflare: Already [imposes a limit of 100MB - 500MB](https://developers.cloudflare.com/cache/about/default-cache-behavior#customization-options-and-limitations) depending on planCloudFront: [`SizeConstraint`](https://docs.aws.amazon.com/waf/latest/APIReference/API_SizeConstraintStatement.html)Traefik: [`traefik.http.middlewares.limit.buffering.maxRequestBodyBytes`](https://doc.traefik.io/traefik/middlewares/http/buffering/#maxrequestbodybytes)The changes themselves are deep inside Wagtail, making patching incredibly difficult.
|
[] | 5.9 | 4.4 | null | null | null |
CVE-2023-52679
|
of: Fix double free in of_parse_phandle_with_args_map
|
In the Linux kernel, the following vulnerability has been resolved:
of: Fix double free in of_parse_phandle_with_args_map
In of_parse_phandle_with_args_map() the inner loop that
iterates through the map entries calls of_node_put(new)
to free the reference acquired by the previous iteration
of the inner loop. This assumes that the value of "new" is
NULL on the first iteration of the inner loop.
Make sure that this is true in all iterations of the outer
loop by setting "new" to NULL after its value is assigned to "cur".
Extend the unittest to detect the double free and add an additional
test case that actually triggers this path.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-39v2-wqcx-xc5w
|
pscal in xcal 4.1 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/pscal##### temporary file.
|
[] | null | null | null | null | null |
|
GHSA-93x6-67rm-2qff
|
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_edge() eh->out_sedge().
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-49760
|
Windows Storage Spoofing Vulnerability
|
External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
|
[] | null | 3.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.