id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2016-4838
|
The Android Apps Money Forward (prior to v7.18.0), Money Forward for The Gunma Bank (prior to v1.2.0), Money Forward for SHIGA BANK (prior to v1.2.0), Money Forward for SHIZUOKA BANK (prior to v1.4.0), Money Forward for SBI Sumishin Net Bank (prior to v1.6.0), Money Forward for Tokai Tokyo Securities (prior to v1.4.0), Money Forward for THE TOHO BANK (prior to v1.3.0), Money Forward for YMFG (prior to v1.5.0) provided by Money Forward, Inc. and Money Forward for AppPass (prior to v7.18.3), Money Forward for au SMARTPASS (prior to v7.18.0), Money Forward for Chou Houdai (prior to v7.18.3) provided by SOURCENEXT CORPORATION allows an attacker to execute unintended operations via a specially crafted application.
|
[
"cpe:2.3:a:moneyforward:money_forward_for_apppass:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_au_smartpass:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_chou_houdai:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_sbi_sumishin_net_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_shiga_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_shizuoka_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_the_gunma_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_the_toho_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_tokai_tokyo_securities:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_ymfg:*:*:*:*:*:android:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2024-30031
|
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
|
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2008:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-gwc7-j4mc-q8fw
|
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)
|
[] | null | 9.1 | null | null | null |
|
GHSA-gm4m-9rm8-7rxj
|
Magento Open Source has Improper Access Control vulnerability
|
Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to leak minor information of another user's account details. Exploitation of this issue does not require user interaction.
|
[] | null | 5.3 | null | null | null |
RHSA-2010:0019
|
Red Hat Security Advisory: kernel security update
|
kernel: ipv6_hop_jumbo remote system crash kernel: e1000 issue reported at 26c3 kernel: r8169 issue reported at 26c3 kernel: e1000e frame fragment issue
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-rw47-3hmf-cmhq
|
The SEO Tools WordPress plugin through 4.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[] | null | 6.1 | null | null | null |
|
RHSA-2010:0143
|
Red Hat Security Advisory: cpio security update
|
cpio: Heap-based buffer overflow by expanding a specially-crafted archive
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2017-7437
|
Cross site scripting attacks against NetIQ Privileged Account Manager
|
NetIQ Privileged Account Manager before 3.1 Patch Update 3 allowed cross site scripting attacks via the "type" and "account" parameters of json requests.
|
[
"cpe:2.3:a:netiq:privileged_account_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netiq:privileged_account_manager:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netiq:privileged_account_manager:3.1:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:netiq:privileged_account_manager:3.1:hotfix2:*:*:*:*:*:*"
] | null | null | 4.6 | null | null |
CVE-2023-20893
|
The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
|
[
"cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
CVE-2009-1686
|
WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle constant (aka const) declarations in a type-conversion operation during JavaScript exception handling, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
|
[
"cpe:2.3:a:apple:safari:*:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:0.8:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:0.9:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:-:windows:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-m3vc-772v-7h3f
|
Multiple SQL injection vulnerabilities in index.php in dotProject 2.1.2 allow (1) remote authenticated users to execute arbitrary SQL commands via the tab parameter in a projects action, and (2) remote authenticated administrators to execute arbitrary SQL commands via the user_id parameter in a viewuser action.
|
[] | null | null | null | null | null |
|
CVE-2024-51711
|
WordPress Saragna plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in saragna Saragna allows Reflected XSS.This issue affects Saragna: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
RHSA-2016:1385
|
Red Hat Security Advisory: ceph security update
|
crash: mon_command crashes ceph monitors on receiving empty prefix
|
[
"cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04"
] | null | null | 4.9 | null | null |
CVE-2017-4987
|
In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user can load a maliciously crafted file in the search path which may potentially allow the attacker to execute arbitrary code on the targeted VNX Control Station system, aka an uncontrolled search path vulnerability.
|
[
"cpe:2.3:o:emc:vnx2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:emc:vnx2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:vnx1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:emc:vnx1:-:*:*:*:*:*:*:*"
] | null | null | 7.3 | 4.4 | null |
|
CVE-2021-47633
|
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
|
In the Linux kernel, the following vulnerability has been resolved:
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
The bug was found during fuzzing. Stacktrace locates it in
ath5k_eeprom_convert_pcal_info_5111.
When none of the curve is selected in the loop, idx can go
up to AR5K_EEPROM_N_PD_CURVES. The line makes pd out of bound.
pd = &chinfo[pier].pd_curves[idx];
There are many OOB writes using pd later in the code. So I
added a sanity check for idx. Checks for other loops involving
AR5K_EEPROM_N_PD_CURVES are not needed as the loop index is not
used outside the loops.
The patch is NOT tested with real device.
The following is the fuzzing report
BUG: KASAN: slab-out-of-bounds in ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]
Write of size 1 at addr ffff8880174a4d60 by task modprobe/214
CPU: 0 PID: 214 Comm: modprobe Not tainted 5.6.0 #1
Call Trace:
dump_stack+0x76/0xa0
print_address_description.constprop.0+0x16/0x200
? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]
? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]
__kasan_report.cold+0x37/0x7c
? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]
kasan_report+0xe/0x20
ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]
? apic_timer_interrupt+0xa/0x20
? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k]
? ath5k_pci_eeprom_read+0x228/0x3c0 [ath5k]
ath5k_eeprom_init+0x2513/0x6290 [ath5k]
? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k]
? usleep_range+0xb8/0x100
? apic_timer_interrupt+0xa/0x20
? ath5k_eeprom_read_pcal_info_2413+0x2f20/0x2f20 [ath5k]
ath5k_hw_init+0xb60/0x1970 [ath5k]
ath5k_init_ah+0x6fe/0x2530 [ath5k]
? kasprintf+0xa6/0xe0
? ath5k_stop+0x140/0x140 [ath5k]
? _dev_notice+0xf6/0xf6
? apic_timer_interrupt+0xa/0x20
ath5k_pci_probe.cold+0x29a/0x3d6 [ath5k]
? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k]
? mutex_lock+0x89/0xd0
? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k]
local_pci_probe+0xd3/0x160
pci_device_probe+0x23f/0x3e0
? pci_device_remove+0x280/0x280
? pci_device_remove+0x280/0x280
really_probe+0x209/0x5d0
|
[] | null | null | null | null | null |
CVE-2025-4006
|
youyiio BeyongCms Document Management Page Upload.html unrestricted upload
|
A vulnerability classified as critical has been found in youyiio BeyongCms 1.6.0. Affected is an unknown function of the file /admin/theme/Upload.html of the component Document Management Page. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 4.7 | 4.7 | 5.8 | null |
CVE-2023-6909
|
Path Traversal: '\..\filename' in mlflow/mlflow
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
|
[
"cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
CVE-2023-51655
|
In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration
|
[
"cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
|
GHSA-v243-mg8q-q94c
|
A vulnerability, which was classified as critical, was found in code-projects Online Hotel Reservation System 1.0. This affects an unknown part of the file /reservation/demo.php. The manipulation of the argument Start leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
CVE-2021-28575
|
Adobe Animate out-of-bounds read vulnerability could lead to information exposure
|
Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2023-1088
|
WP Plugin Manager < 1.1.8 - Arbitrary Plugin Activation via CSRF
|
The WP Plugin Manager WordPress plugin before 1.1.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
[
"cpe:2.3:a:hasthemes:wp_plugin_manager:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2023-6805
|
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 4.4.7 via the fetch_feed functionality. This makes it possible for authenticated attackers, with contributor access and above, to make web requests to arbitrary locations originating from the web application and can be used to modify information from internal services. NOTE: This vulnerability, exploitable by contributor-level users, was was fixed in version 4.4.7. The same vulnerability was fixed for author-level users in version 4.4.8.
|
[] | null | 6.4 | null | null | null |
|
CVE-2022-32858
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 16, macOS Ventura 13, watchOS 9. An app may be able to leak sensitive kernel state.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
RHSA-2014:1768
|
Red Hat Security Advisory: php53 security update
|
php: xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime() php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail() file: out-of-bounds read in elf note headers
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2014-7372
|
The Mr.Sausage (aka com.app_mrsausage.layout) application 1.301 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:kellygerards:mr.sausage:1.301:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2007-5060
|
Cross-site request forgery (CSRF) vulnerability in the cpass functionality in an admin action in index.php in XCMS allows remote attackers to change arbitrary passwords via certain password_ and rpassword_ parameters, possibly related to timestamp values.
|
[
"cpe:2.3:a:xcms:xcms:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-p3wg-g3gr-3fxj
|
Uninitialized buffer in GBL parser in Silicon Labs GSDK v4.3.0 and earlier allows attacker to leak data from Secure stack via malformed GBL file.
|
[] | null | 3.8 | null | null | null |
|
GHSA-mm62-chgv-w7jc
|
The OJPEGReadBufferFill function in tif_ojpeg.c in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an OJPEG image with undefined strip offsets, related to the TIFFVGetField function.
|
[] | null | null | null | null | null |
|
CVE-2017-11399
|
Integer overflow in the ape_decode_frame function in libavcodec/apedec.c in FFmpeg 2.4 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access and application crash) or possibly have unspecified other impact via a crafted APE file.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-c5c4-6w52-p8qr
|
Adobe Illustrator version 25.2.3 (and earlier) is affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | null | null | null | null |
|
CVE-2024-45086
|
IBM WebSphere Application Server XML external entity injection
|
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A privileged user could exploit this vulnerability to expose sensitive information or consume memory resources.
|
[
"cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
ICSA-19-183-01
|
Schneider Electric Modicon Controllers
|
An attacker could create a denial-of-service condition by sending a specific crafted Modbus frame to the affected device.CVE-2019-6819 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
CVE-2022-36569
|
Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the deviceList parameter at /goform/setMacFilterCfg.
|
[
"cpe:2.3:o:tenda:ac9_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-r85q-7hfh-c29p
|
Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Playlists plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user's playlists.
|
[] | null | 5 | null | null | null |
|
GHSA-6jvj-64ff-4p62
|
Static code injection vulnerability in RunCMS 2M1 allows remote authenticated administrators to execute arbitrary PHP code via the "Filter/Banning" feature, as demonstrated by modifying modules/system/cache/bademails.php using the "Prohibited: Emails" action, and other unspecified filters.
|
[] | null | null | null | null | null |
|
GHSA-5jwg-x2gx-689v
|
The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
|
[] | null | null | null | null | null |
|
GHSA-743q-jjrj-pgrc
|
IBM Security Guardium 11.2 could disclose sensitive information due to reliance on untrusted inputs that could aid in further attacks against the system. IBM X-Force ID: 196281.
|
[] | null | null | null | null | null |
|
CVE-2025-39202
|
A vulnerability exists in in the Monitor Pro interface of the MicroSCADA X SYS600 product. An authenticated user with low privileges can see and overwrite files causing information leak and data corruption.
|
[] | 8.3 | 7.3 | null | null | null |
|
CVE-2020-5653
|
Buffer overflow vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
|
[
"cpe:2.3:o:mitsubishielectric:melsec_iq-rj71eip91_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rj71eip91:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rj71pn92_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rj71pn92:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rd81dl96_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rd81dl96:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rd81mes96n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rd81mes96n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rd81opc96_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rd81opc96:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2020-0559
|
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-gc4h-7vrf-356x
|
The Visual Website Collaboration, Feedback & Project Management – Atarim plugin for WordPress is vulnerable to Stored Cross-Site Scripting via comments in all versions up to, and including, 3.30 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 7.2 | null | null | null |
|
CVE-2007-0413
|
BEA WebLogic Server 8.1 through 8.1 SP5 stores cleartext data in a backup of config.xml after offline editing, which allows local users to obtain sensitive information by reading this backup file.
|
[
"cpe:2.3:a:bea:weblogic_server:*:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*"
] | null | null | null | 4.4 | null |
|
CVE-2024-54802
|
In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-33921
|
Dell GeoDrive, versions prior to 2.2, contains Multiple DLL Hijacking Vulnerabilities. A low privilege attacker could potentially exploit this vulnerability, leading to the execution of arbitrary code in the SYSTEM security context.
|
[
"cpe:2.3:a:dell:geodrive:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
GHSA-7rw5-8cqx-4h7v
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R8300 before 1.0.2.104 and R8500 before 1.0.2.104.
|
[] | null | null | null | null | null |
|
CVE-2025-1576
|
code-projects Real Estate Property Management System ajax_state.php sql injection
|
A vulnerability classified as critical was found in code-projects Real Estate Property Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /ajax_state.php. The manipulation of the argument StateName as part of String leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2022-44313
|
PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceUnsignedInteger function in expression.c when called from ExpressionParseFunctionCall.
|
[
"cpe:2.3:a:picoc_project:picoc:3.2.2:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
RHSA-2008:0245
|
Red Hat Security Advisory: java-1.6.0-bea security update
|
java-1.6.0 default external entity processing Untrusted applet and application XSLT processing privilege escalation JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null | null |
GHSA-v2wc-pfq2-5cm6
|
Possible XSS attack in Wagtail
|
ImpactA cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.PatchesPatched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch).WorkaroundsSite owners who are unable to upgrade to the new versions can disable the revision comparison view by adding the following URL route to the top of their project's `urls.py` configuration:AcknowledgementsMany thanks to Vlad Gerasimenko for reporting this issue.For more informationIf you have any questions or comments about this advisory:Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)Email us at [[email protected]](mailto:[email protected]) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
|
[] | 4.6 | 5.8 | null | null | null |
CVE-2025-26055
|
An OS Command Injection vulnerability exists in the Infinxt iEdge 100 2.1.32 Troubleshoot module, specifically in the tracertVal parameter of the Tracert function.
|
[] | null | 6.5 | null | null | null |
|
GHSA-64f6-crjj-24hf
|
A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to escalate their privileges to root. An attacker would need local access to the machine to successfully exploit this flaw.
|
[] | null | null | 7.8 | null | null |
|
GHSA-m83p-2xxp-x33x
|
Hospital Management System in PHP with Source Code (HMS) 1.0 was discovered to contain a File upload vulnerability in treatmentrecord.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2003-1065
|
Unknown vulnerability in patches 108993-14 through 108993-19 and 108994-14 through 108994-19 for Solaris 8 may allow local users to cause a denial of service (automountd crash).
|
[
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-g4xm-5mqm-8m32
|
Cross-Site Request Forgery in Jenkins PaaSLane Estimate Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token.
|
[] | null | 4.3 | null | null | null |
CVE-2024-21866
|
Generation of Error Message Containing Sensitive Information in Rapid SCADA
|
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product responds back with an error message containing sensitive data if it receives a specific malformed request.
|
[
"cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-j2x8-rxqv-6q66
|
IBM Quality Manager (RQM) 5.0.x and 6.0 through 6.0.5 could reveal sensitive information in HTTP 500 Internal Server Error responses. IBM X-Force ID: 124357.
|
[] | null | null | 5.3 | null | null |
|
CVE-2023-26593
|
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later
|
[
"cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:b\\/m9000cs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:centum_cs_1000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:centum_cs_3000_entry_class:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-j6j3-4m9h-mmjr
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 4.9 | null | null |
|
GHSA-mqj9-7x6g-mr5p
|
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1.
|
[] | null | null | 6.5 | null | null |
|
GHSA-m3v8-8px9-3652
|
A vulnerability classified as critical was found in Campcodes Online Hospital Management System 1.0. This vulnerability affects unknown code of the file /hms/admin/query-details.php. The manipulation of the argument adminremark leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
GHSA-q47c-4q22-chh4
|
The ce4arab market (aka com.dreamstep.wce4arabmarket) application 0.12.13093.40460 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-fqgm-98vq-7hgr
|
Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.
|
[] | null | null | null | null | null |
|
RHSA-2018:1448
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update
|
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 8.1 | null | null |
GHSA-gxj5-32g8-7m3j
|
Cross-site scripting (XSS) vulnerability in McAfee Network Data Loss Prevention (NDLP) before 9.3 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2019-18319
|
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could cause a Denial-of-Service condition by sending specifically crafted objects via RMI. This vulnerability is independent from CVE-2019-18317 and CVE-2019-18318. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
[
"cpe:2.3:a:siemens:sppa-t3000_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sppa-t3000_application_server:r8.2:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sppa-t3000_application_server:r8.2:sp1:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
cisco-sa-wlc-udp-dos-XDyEwhNz
|
Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Points UDP Processing Denial of Service Vulnerability
|
A vulnerability in the UDP processing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Points could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to the improper processing of UDP datagrams. An attacker could exploit this vulnerability by sending malicious UDP datagrams to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the September 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74745"]
|
[] | null | 8.6 | null | null | null |
GHSA-qf7v-8hj3-4xw7
|
Improper Verification of Cryptographic Signature in PySAML2
|
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertions that have been signed.
|
[] | 8.7 | 7.5 | null | null | null |
CVE-2010-1963
|
Cross-site scripting (XSS) vulnerability in HP ServiceCenter allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:hp:servicecenter:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2017-10321
|
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows low privileged attacker having Create session privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS. While the vulnerability is in Core RDBMS, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Core RDBMS. Note: This score is for Windows platform version 11.2.0.4 of Database. For Windows platform version 12.1.0.2 and Linux, the score is 7.8 with scope Unchanged. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database:12.2.0.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4.6 | null |
|
GHSA-hp2c-jfrj-q3c3
|
A vulnerability was found in Emlog Pro up to 2.4.1. It has been rated as problematic. This issue affects some unknown processing of the file /admin/plugin.php. The manipulation of the argument filter leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 4.3 | null | null | null |
|
RHSA-2024:1518
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.6 (python-twisted) security update
|
python-twisted: disordered HTTP pipeline response in twisted.web
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.3 | null | null | null |
CVE-2017-20033
|
PHPList Reflected cross site scriting
|
A vulnerability classified as problematic has been found in PHPList 3.2.6. This affects an unknown part of the file /lists/admin/. The manipulation of the argument page with the input send\'\";><script>alert(8)</script> leads to cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
|
[
"cpe:2.3:a:phplist:phplist:3.2.6:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2019-2213
|
In binder_free_transaction of binder.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-133758011References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | 6.9 | null |
|
CVE-2021-44380
|
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetTime param is not object. An attacker can send an HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | null | null |
|
CVE-2008-1731
|
The Simple Access module for Drupal 5.x through 5.x-1.2-2 does not properly handle the privacy information for nodes, which might allow remote attackers to bypass intended access restrictions, and read or modify nodes, in opportunistic circumstances related to interaction between Simple Access and (1) Node clone or (2) Project issue tracking.
|
[
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:3281d:simple_access:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:3281d:simple_access:5.x-1.0-beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:3281d:simple_access:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:3281d:simple_access:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:3281d:simple_access:5.x-1.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:3281d:simple_access:5.x-1.x-dev:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-32868
|
ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass
|
ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email. While ZITADEL already gives administrators the option to define a `Lockout Policy` with a maximum amount of failed password check attempts, there was no such mechanism for (T)OTP checks. This issue has been patched in version 2.50.0.
|
[
"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-x635-xvwm-g4ww
|
Buffer overflow in IBM Net.Data db2www CGI program allows remote attackers to execute arbitrary commands via a long PATH_INFO environmental variable.
|
[] | null | null | null | null | null |
|
CVE-2005-1469
|
Unknown vulnerability in the GSM dissector in Ethereal before 0.10.11 allows remote attackers to cause the dissector to access an invalid pointer.
|
[
"cpe:2.3:a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-p52g-5qgx-4crw
|
In the Linux kernel, the following vulnerability has been resolved:mm/memory-failure: make sure wait for page writeback in memory_failureOur syzkaller trigger the "BUG_ON(!list_empty(&inode->i_wb_list))" in
clear_inode:kernel BUG at fs/inode.c:519!
Internal error: Oops - BUG: 0 [#1] SMP
Modules linked in:
Process syz-executor.0 (pid: 249, stack limit = 0x00000000a12409d7)
CPU: 1 PID: 249 Comm: syz-executor.0 Not tainted 4.19.95
Hardware name: linux,dummy-virt (DT)
pstate: 80000005 (Nzcv daif -PAN -UAO)
pc : clear_inode+0x280/0x2a8
lr : clear_inode+0x280/0x2a8
Call trace:
clear_inode+0x280/0x2a8
ext4_clear_inode+0x38/0xe8
ext4_free_inode+0x130/0xc68
ext4_evict_inode+0xb20/0xcb8
evict+0x1a8/0x3c0
iput+0x344/0x460
do_unlinkat+0x260/0x410
__arm64_sys_unlinkat+0x6c/0xc0
el0_svc_common+0xdc/0x3b0
el0_svc_handler+0xf8/0x160
el0_svc+0x10/0x218
Kernel panic - not syncing: Fatal exceptionA crash dump of this problem show that someone called __munlock_pagevec
to clear page LRU without lock_page: do_mmap -> mmap_region -> do_munmap
-> munlock_vma_pages_range -> __munlock_pagevec.As a result memory_failure will call identify_page_state without
wait_on_page_writeback. And after truncate_error_page clear the mapping
of this page. end_page_writeback won't call sb_clear_inode_writeback to
clear inode->i_wb_list. That will trigger BUG_ON in clear_inode!Fix it by checking PageWriteback too to help determine should we skip
wait_on_page_writeback.
|
[] | null | 5.5 | null | null | null |
|
GHSA-4pr7-5493-phmj
|
Microsoft Outlook 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-10150
|
Bamazoo – Button Generator <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via dgs Shortcode
|
The Bamazoo – Button Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's dgs shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:bamazoo:button_generator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bamazoo:button_generator:1.0:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null | null |
CVE-2021-43302
|
Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.
|
[
"cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2019-13664
|
Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2014-7258
|
Cross-site scripting (XSS) vulnerability in KENT-WEB Clip Board 2.91 and earlier, when running certain versions of Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:kent-web:clip_board:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-36813
|
Kanboard Authenticated SQL Injections vulnerability
|
Kanboard is project management software that focuses on the Kanban methodology. In versions prior to 1.2.31authenticated user is able to perform a SQL Injection, leading to a privilege escalation or loss of confidentiality. It appears that in some insert and update operations, the code improperly uses the PicoDB library to update/insert new information. Version 1.2.31 contains a fix for this issue.
|
[
"cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
CVE-2008-1235
|
Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-vfhx-w4xw-3mwg
|
Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
|
[] | null | null | null | null | null |
|
CVE-2024-53268
|
Lack of validation on openExternal allows 1 click remote code execution in joplin
|
Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:laurent_22:joplin:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
RHSA-2025:0827
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.33 security and extras update
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null | null |
GHSA-jr8w-j9v9-c93x
|
Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-46739
|
Timing attack can leak user passwords
|
CubeFS is an open-source cloud-native file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.
|
[
"cpe:2.3:a:linuxfoundation:cubefs:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-c6c4-gfjc-9wrj
|
In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix potential use-after-free in oplock/lease break ackIf ksmbd_iov_pin_rsp return error, use-after-free can happen by
accessing opinfo->state and opinfo_put and ksmbd_fd_put could
called twice.
|
[] | null | null | null | null | null |
|
cisco-sa-20180328-dos
|
Cisco IOS Software Integrated Services Module for VPN Denial of Service Vulnerability
|
A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos"]
This advisory is part of the March 28, 2018, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 20 Cisco Security Advisories that describe 22 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-66682"]
|
[] | null | null | 8.6 | null | null |
GHSA-24mg-jwcv-j892
|
Multiple cross-site scripting (XSS) vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to inject arbitrary web script or HTML via the (1) tag parameter to opac-search.pl; the (2) value parameter to authorities/authorities-home.pl; the (3) delay parameter to acqui/lateorders.pl; the (4) authtypecode or (5) tagfield to admin/auth_subfields_structure.pl; the (6) tagfield parameter to admin/marc_subfields_structure.pl; the (7) limit parameter to catalogue/search.pl; the (8) bookseller_filter, (9) callnumber_filter, (10) EAN_filter, (11) ISSN_filter, (12) publisher_filter, or (13) title_filter parameter to serials/serials-search.pl; or the (14) author, (15) collectiontitle, (16) copyrightdate, (17) isbn, (18) manageddate_from, (19) manageddate_to, (20) publishercode, (21) suggesteddate_from, or (22) suggesteddate_to parameter to suggestion/suggestion.pl; or the (23) direction, (24) display or (25) addshelf parameter to opac-shelves.pl.
|
[] | null | null | 5.4 | null | null |
|
CVE-2022-43256
|
SeaCms before v12.6 was discovered to contain a SQL injection vulnerability via the component /js/player/dmplayer/dmku/index.php.
|
[
"cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-gw4q-hwmm-c6rq
|
WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
|
[] | null | null | null | null | null |
|
CVE-2021-24617
|
GamePress <= 1.1.0 - Reflected Cross-Site Scripting
|
The GamePress WordPress plugin through 1.1.0 does not escape the op_edit POST parameter before outputting it back in multiple Game Option pages, leading to Reflected Cross-Site Scripting issues
|
[
"cpe:2.3:a:gamepress_project:gamepress:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
CVE-2008-5729
|
Multiple cross-site scripting (XSS) vulnerabilities in AIST NetCat 3.12 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) form and (2) control parameters to FCKeditor/neditor.php, and the (3) path parameter to admin/siteinfo/iframe.inc.php.
|
[
"cpe:2.3:a:netcat:netcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:netcat:netcat:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-86jg-35xj-3vv5
|
Mattermost fails to properly enforce access control restrictions for System Manager roles
|
Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly enforce access control restrictions for System Manager roles, allowing authenticated users with System Manager privileges to view team details they should not have access to via direct API requests to team endpoints, even when explicitly configured with 'No access' to Teams in the System Console.
|
[] | null | 3.1 | null | null | null |
GHSA-xrq3-qh6q-h4xq
|
In JetBrains Hub before 2024.3.47707 improper access control allowed users to generate permanent tokens for unauthorized services
|
[] | null | 4.3 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.