id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2019-19769
|
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 6.7 | null | 6.5 | null |
|
CVE-2018-1000193
|
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 | null |
|
CVE-2021-1598
|
Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities
|
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
|
[
"cpe:2.3:o:cisco:video_surveillance_7530pd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:video_surveillance_7530pd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:video_surveillance_7070_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:video_surveillance_7070:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2019-13511
|
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited exposure of information related to the targeted workstation.
|
[
"cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | 4.3 | null |
|
GHSA-mgj9-j8fg-4qpr
|
In the Linux kernel, the following vulnerability has been resolved:drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modesIn psb_intel_lvds_get_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
|
[] | null | 5.5 | null | null | null |
|
GHSA-hjgh-vh3c-8rg8
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-49089
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2023-1691
|
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
|
[
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2015-4808
|
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via vectors related to Outside In Filters, a different vulnerability than CVE-2015-6013, CVE-2015-6014, CVE-2015-6015, and CVE-2016-0432.
|
[
"cpe:2.3:a:oracle:fusion_middleware:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:8.5.2:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
GHSA-v784-rfch-9wq8
|
Information disclosure due to buffer over-read in modem while reading configuration parameters.
|
[] | null | 7.5 | null | null | null |
|
GHSA-53q7-57w3-2j4r
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | 7.2 | null | null | null |
|
GHSA-3xhx-7chp-7wq6
|
Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setcasualleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] | null | 9.8 | null | null | null |
|
GHSA-m9h3-f3g9-fqrf
|
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
|
[] | null | 9.8 | null | null | null |
|
GHSA-q62x-pq6x-fhvw
|
A SQL injection vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows authenticated users to inject arbitrary SQL directives into an SQL statement and execute arbitrary SQL commands.
|
[] | null | 8.8 | null | null | null |
|
CVE-2023-28656
|
NGINX Management Suite vulnerability
|
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:nginx_api_connectivity_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:nginx_security_monitoring:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
RHSA-2023:4415
|
Red Hat Security Advisory: iperf3 security update
|
iperf3: memory allocation hazard and crash
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null | null |
GHSA-8v66-v52g-2mp3
|
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on the permalink_setup function. This makes it possible for unauthenticated attackers to change the permalink structure via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. While nonce verification is implemented, verification only takes place when a nonce is provided.
|
[] | null | 5.4 | null | null | null |
|
CVE-2023-40111
|
In setMediaButtonReceiver of MediaSessionRecord.java, there is a possible way to send a pending intent on behalf of system_server due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
|
[
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-ffv6-5mrv-qxf3
|
Tableau Server fails to validate certain URLs that are embedded in emails sent to Tableau Server users.
|
[] | null | null | null | null | null |
|
GHSA-hcp3-6p74-64v4
|
Directory traversal vulnerability in TFTPdWin 0.4.2 allows remote attackers to read or modify arbitrary files outside the TFTP root via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-0751
|
GELI silently omits the keyfile if read from stdin
|
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
|
[
"cpe:2.3:o:freebsd:freebsd:12.3:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.3:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-hv55-4hhf-gp33
|
Unspecified vulnerability in CrawlTrack before 3.2.7, when a public stats page is provided, allows remote attackers to execute arbitrary PHP code via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2001-0355
|
Novell Groupwise 5.5 (sp1 and sp2) allows a remote user to access arbitrary files via an implementation error in Groupwise system policies.
|
[
"cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2022-50108
|
mfd: max77620: Fix refcount leak in max77620_initialise_fps
|
In the Linux kernel, the following vulnerability has been resolved:
mfd: max77620: Fix refcount leak in max77620_initialise_fps
of_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
|
[] | null | null | null | null | null |
GHSA-wj9g-5wf3-5pxf
|
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.
|
[] | null | null | 6.1 | null | null |
|
CVE-2020-9492
|
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification.
|
[
"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:8.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-fx4x-ppc2-pxxf
|
Multiple stack-based buffer overflows in Final Draft 8 before 8.02 allow remote attackers to execute arbitrary code via a .fdx or .fdxt file with long (1) Word, (2) Transition, (3) Location, (4) Extension, (5) SceneIntro, (6) TimeOfDay, and (7) Character elements.
|
[] | null | null | null | null | null |
|
CVE-2023-29207
|
Improper Neutralization of Script-Related HTML Tags (XSS) in the LiveTable Macro
|
XWiki Commons are technical libraries common to several other top level XWiki projects. The Livetable Macro wasn't properly sanitizing column names, thus allowing the insertion of raw HTML code including JavaScript. This vulnerability was also exploitable via the Documents Macro that is included since XWiki 3.5M1 and doesn't require script rights, this can be demonstrated with the syntax `{{documents id="example" count="5" actions="false" columns="doc.title, before<script>alert(1)</script>after"/}}`. Therefore, this can also be exploited by users without script right and in comments. With the interaction of a user with more rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.
|
[
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:1.9:milestone2:*:*:*:*:*:*"
] | null | 8.9 | null | null | null |
CVE-2012-1677
|
Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via unknown vectors.
|
[
"cpe:2.3:a:oracle:fusion_middleware:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:8.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:8.3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:8.3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:9.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:27.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:27.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:28.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:28.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:28.2.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-rc5c-4c27-cg98
|
Under certain conditions, the SAP Host Agent logfile shows information which would otherwise be restricted.
|
[] | null | 5.5 | null | null | null |
|
CVE-2010-3641
|
Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2015-2841
|
Citrix NetScaler AppFirewall, as used in NetScaler 10.5, allows remote attackers to bypass intended firewall restrictions via a crafted Content-Type header, as demonstrated by the application/octet-stream and text/xml Content-Types.
|
[
"cpe:2.3:a:citrix:netscaler:10.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-q43q-mp42-75vm
|
Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429.
|
[] | null | 7.7 | null | null | null |
|
CVE-2016-10830
|
cPanel before 55.9999.141 allows ACL bypass for AppConfig applications via magic_revision (SEC-100).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | 5.5 | null |
|
GHSA-vvhp-c548-j66x
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
GHSA-62mf-g244-32xg
|
Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `ssid_hex` HTTP parameter, as used within the `/action/wirelessConnect` handler.
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-23294
|
NVIDIA WebDataset for all platforms contains a vulnerability where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.
|
[] | null | 7.8 | null | null | null |
|
GHSA-3hfj-pw8w-wj22
|
Open Solution Quick.Cart 5.0 allows remote attackers to obtain sensitive information via (1) a long string or (2) invalid characters in a cookie, which reveals the installation path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-43ff-4wjr-j993
|
An Improper Access Control issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The FTP server on the pump does not require authentication if the pump is configured to allow FTP connections.
|
[] | null | null | 8.1 | null | null |
|
GHSA-q2wp-r77c-3cw8
|
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.Users are recommended to upgrade to version 2.4.64 which fixes this issue.
|
[] | null | 7.5 | null | null | null |
|
CVE-2025-44658
|
In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malicious scripts disguised with alternate extensions and tricking the web server into executing them as PHP, bypassing security mechanisms based on file extension filtering. This may lead to remote code execution (RCE), information disclosure, or full system compromise.
|
[] | null | 9.8 | null | null | null |
|
CVE-2013-2326
|
Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1634.
|
[
"cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:hp-ux:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:redhat_enterprise_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:sunos:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:suse_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2003:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.20:-:*:*:*:windows_server_2008:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:hp-ux:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:redhat_enterprise_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:sunos:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:suse_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2003:*:*",
"cpe:2.3:a:hp:storage_data_protector:6.21:-:*:*:*:windows_server_2008:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:hp-ux:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:redhat_enterprise_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:suse_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2003:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.00:-:*:*:*:windows_server_2008:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:hp-ux:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:redhat_enterprise_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:suse_linux:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2003:*:*",
"cpe:2.3:a:hp:storage_data_protector:7.01:-:*:*:*:windows_server_2008:*:*"
] | null | null | null | 10 | null |
|
GHSA-7m6w-6686-g729
|
The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's SiteOrigin Blog Widget in all versions up to, and including, 1.61.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-hjxm-p5wf-9v7p
|
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
|
[] | null | null | null | null | null |
|
GHSA-79xx-p4p4-fv5q
|
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.
|
[] | null | null | null | null | null |
|
GHSA-3m7v-3ggq-789x
|
A vulnerability in the web-based management interface of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected application. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected application. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
[] | null | null | null | null | null |
|
CVE-2023-3399
|
Insertion of Sensitive Information Into Sent Data in GitLab
|
An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.0.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.0.0:*:*:*:enterprise:*:*:*"
] | null | 8.5 | null | null | null |
GHSA-52qf-8fcc-9f9g
|
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
|
[] | null | 8.8 | null | null | null |
|
RHSA-2015:0016
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: crash in code page decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) glibc: command execution in wordexp() with WRDE_NOCMD specified
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2021-29449
|
Multiple Privilege Escalation Vulnerabilities Pihole
|
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Multiple privilege escalation vulnerabilities were discovered in version 5.2.4 of Pi-hole core. See the referenced GitHub security advisory for details.
|
[
"cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
GHSA-4wpp-22r3-jr8g
|
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.
|
[] | null | 5.3 | null | null | null |
|
ICSA-19-337-01
|
Reliable Controls LicenseManager
|
An authenticated user may be able to insert malicious code into the system root path, which may allow execution of code with elevated privileges of the application.CVE-2019-18245 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
CVE-2023-47620
|
Scrypted reflected Cross-site Scripting vulnerability
|
Scrypted is a home video integration and automation platform. In versions 0.55.0 and prior, a reflected cross-site scripting vulnerability exists in the plugin-http.ts file via the `owner' and 'pkg` parameters. An attacker can run arbitrary JavaScript code.
|
[
"cpe:2.3:a:clockworkmod:scrypted:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
GHSA-6mcp-rmfc-cqp5
|
Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can exploit HANA cockpit?s data volume to gain access to highly sensitive information (e.g., high privileged account credentials)
|
[] | null | 7.5 | null | null | null |
|
GHSA-v9r7-j9px-3j3q
|
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS).
|
[] | null | null | null | null | null |
|
CVE-2021-20844
|
Improper neutralization of HTTP request headers for scripting syntax vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to obtain sensitive information via a specially crafted web page.
|
[
"cpe:2.3:o:yamaha:rtx830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yamaha:rtx830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yamaha:nvr510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yamaha:nvr510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yamaha:nvr700w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yamaha:nvr700w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yamaha:rtx1210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yamaha:rtx1210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ntt-west:biz_box_rtx830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ntt-west:biz_box_rtx830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ntt-west:biz_box_nvr510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ntt-west:biz_box_nvr510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ntt-west:biz_box_nvr700w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ntt-west:biz_box_nvr700w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ntt-west:biz_box_rtx1210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ntt-west:biz_box_rtx1210:-:*:*:*:*:*:*:*"
] | null | 5.7 | null | 3.5 | null |
|
CVE-2024-7101
|
ForIP Tecnologia Administração PABX Authentication Form login sql injection
|
A vulnerability, which was classified as critical, has been found in ForIP Tecnologia Administração PABX 1.x. This issue affects some unknown processing of the file /login of the component Authentication Form. The manipulation of the argument usuario leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:forip:pabx:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-j3ch-wr39-62m3
|
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_client.lua file.
|
[] | null | null | 7.2 | null | null |
|
RHSA-2022:1354
|
Red Hat Security Advisory: rh-dotnet31-curl security update
|
curl: Leak of authentication credentials in URL via automatic Referer curl: Bad connection reuse due to flawed path name checks curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols curl: Server responses received before STARTTLS processed after TLS handshake
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 6.1 | null | null | null |
CVE-2019-10301
|
A missing permission check in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[
"cpe:2.3:a:jenkins:gitlab:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 4 | null |
|
GHSA-6fpv-q3vm-j4gh
|
D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter.
|
[] | null | 3.5 | null | null | null |
|
CVE-2015-0665
|
The Hostscan module in Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to write to arbitrary files via crafted IPC messages, aka Bug ID CSCus79173.
|
[
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*"
] | null | null | null | 6.6 | null |
|
CVE-2023-5391
|
A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker to
execute arbitrary code on the targeted system by sending a specifically crafted packet to the
application.
|
[
"cpe:2.3:a:schneider-electric:ecostruxure_power_monitoring_expert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_power_operation_with_advanced_reports:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_power_scada_operation_with_advanced_reports:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-rm2v-wh2x-rj6w
|
An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.
|
[] | null | null | 9.9 | null | null |
|
GHSA-xw43-24rr-hxcr
|
Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)."
|
[] | null | null | null | null | null |
|
CVE-2024-42337
|
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
|
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
|
[
"cpe:2.3:a:cyberark:identity:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2014-3738
|
Cross-site scripting (XSS) vulnerability in Zenoss 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the title of a device.
|
[
"cpe:2.3:a:zenoss:zenoss:4.2.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-qqj4-453q-5665
|
The One Click Demo Import WordPress plugin before 3.1.0 does not validate the imported file, allowing high privilege users such as admin to upload arbitrary files (such as PHP) even when FILE_MODS and FILE_EDIT are disallowed
|
[] | null | 7.2 | null | null | null |
|
CVE-2024-31613
|
BOSSCMS v3.10 is vulnerable to Cross Site Request Forgery (CSRF) in name="head_code" or name="foot_code."
|
[
"cpe:2.3:a:bosscms:bosscms:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2006-0791
|
PHP remote file inclusion vulnerability in index.php in DreamCost HostAdmin allows remote attackers to include arbitrary files via the $path variable, which is not initialized before use.
|
[
"cpe:2.3:a:dreamcost:hostadmin:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-13552
|
In WebAccess versions 8.4.1 and prior, multiple command injection vulnerabilities are caused by a lack of proper validation of user-supplied data and may allow arbitrary file deletion and remote code execution.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
RHSA-2021:0497
|
Red Hat Security Advisory: openvswitch2.13 security and bug fix update
|
lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 7.5 | null | null | null |
CVE-2007-2989
|
The libike library in Sun Solaris 9 before 20070529 contains a logic error related to a certain pointer, which allows remote attackers to cause a denial of service (in.iked daemon crash) by sending certain UDP packets with a source port different from 500. NOTE: this issue might overlap CVE-2006-2298.
|
[
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2025-38368
|
misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()
|
In the Linux kernel, the following vulnerability has been resolved:
misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()
The returned value, pfsm->miscdev.name, from devm_kasprintf()
could be NULL.
A pointer check is added to prevent potential NULL pointer dereference.
This is similar to the fix in commit 3027e7b15b02
("ice: Fix some null pointer dereference issues in ice_ptp.c").
This issue is found by our static analysis tool.
|
[] | null | null | null | null | null |
GHSA-8hqg-3q4j-8px9
|
In FreeBSD 12.1-STABLE before r356089, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r356090, and 11.3-RELEASE before 11.3-RELEASE-p7, driver specific ioctl command handlers in the oce network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to send passthrough commands to the device firmware.
|
[] | null | null | null | null | null |
|
GHSA-m467-x355-47w9
|
There are several endpoints in the Store Locator Plus for WordPress plugin through 5.5.15 that could allow unauthenticated attackers the ability to inject malicious JavaScript into pages.
|
[] | null | null | null | null | null |
|
CVE-2013-2392
|
Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2016-6536
|
The /setup URI on AVer Information EH6108H+ devices with firmware X9.03.24.00.07l allows remote attackers to bypass intended page-access restrictions or modify passwords by leveraging knowledge of a handle parameter value.
|
[
"cpe:2.3:o:aver:eh6108h\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aver:eh6108h\\+:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-4cr4-j8fx-567m
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4132 and CVE-2014-4138.
|
[] | null | null | null | null | null |
|
GHSA-4w67-4rr6-54cg
|
PHP remote file inclusion vulnerability in admin/admin_news_bot.php in Drunken:Golem Gaming Portal 0.5.1 alpha 2 allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter, a different vector than CVE-2007-0572.
|
[] | null | null | null | null | null |
|
CVE-2025-5510
|
quequnlong shiyi-blog optimize server-side request forgery
|
A vulnerability classified as critical was found in quequnlong shiyi-blog up to 1.2.1. This vulnerability affects unknown code of the file /app/sys/article/optimize. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-c8w7-vpqv-v7f3
|
The kernel in Apple Mac OS X before 10.7.2 does not properly implement the sticky bit for directories, which might allow local users to bypass intended permissions and delete files via an unlink system call.
|
[] | null | null | null | null | null |
|
GHSA-r234-xxf3-j66w
|
A Blind SQL Injection vulnerability in Kronos WebTA 3.8.x and later before 4.0 (affecting the com.threeis.webta.H352premPayRequest servlet's SortBy parameter) allows an attacker with the Employee, Supervisor, or Timekeeper role to read sensitive data from the database.
|
[] | null | null | null | null | null |
|
GHSA-hggh-f6m4-4c3w
|
An attacker with local access the to medical office computer can
escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by
exploiting a command injection vulnerability in the Elefant Update
Service. The command injection can be exploited by communicating with
the Elefant Update Service which is running as "SYSTEM" via Windows
Named Pipes.The Elefant Software Updater (ESU) consists of two components. An ESU
service which runs as "NT AUTHORITY\SYSTEM" and an ESU tray client
which communicates with the service to update or repair the installation
and is running with user permissions. The communication is implemented
using named pipes. A crafted message of type
"MessageType.SupportServiceInfos" can be sent to the local ESU service
to inject commands, which are then executed as "NT AUTHORITY\SYSTEM".
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-3165
|
Database Credential Exposure in the Logs
|
System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment.
OWASP Top 10 - A05) Insecure Design
OWASP Top 10 - A05) Security Misconfiguration
OWASP Top 10 - A09) Security Logging and Monitoring Failure
|
[
"cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*"
] | null | 4.5 | null | null | null |
GHSA-x939-2wmx-j42c
|
Unspecified vulnerability in the Network Layer component in Oracle Database Server 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-f8x4-74pw-c6pm
|
Nanoleaf Desktop App before v1.3.1 was discovered to contain a command injection vulnerability which is exploited via a crafted HTTP request.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-22103
|
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
|
[
"cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
|
CVE-2024-35112
|
IBM Control Center cross-site scripting
|
IBM Control Center 6.2.1 and 6.3.1
could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
|
[
"cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-pfpc-c982-xg3q
|
The FiWin SS28S WiFi VoIP SIP/Skype Phone, firmware version 01_02_07, has a hard-coded username and password, which allows remote attackers to gain administrative access via telnet.
|
[] | null | null | null | null | null |
|
CVE-2014-9596
|
Panasonic Arbitrator Back-End Server (BES) MK 2.0 VPU before 9.3.1 build 4.08.003.0, when USB Wi-Fi or Direct LAN is enabled, and MK 3.0 VPU before 9.3.1 build 5.06.000.0, when Embedded Wi-Fi or Direct LAN is enabled, does not use encryption, which allows remote attackers to obtain sensitive information by sniffing the network for client-server traffic, as demonstrated by Active Directory credential information.
|
[
"cpe:2.3:o:panasonic:arbitrator_back-end_server_mk_3.0_vpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:panasonic:arbitrator_back-end_server_mk_3.0_vpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:panasonic:arbitrator_back-end_server_mk_2.0_vpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:panasonic:arbitrator_back-end_server_mk_2.0_vpu:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-5mwv-x2qc-g5cj
|
In the Linux kernel, the following vulnerability has been resolved:nvme: fix reconnection fail due to reserved tag allocationWe found a issue on production environment while using NVMe over RDMA,
admin_q reconnect failed forever while remote target and network is ok.
After dig into it, we found it may caused by a ABBA deadlock due to tag
allocation. In my case, the tag was hold by a keep alive request
waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the
request maked as idle and will not process before reset success. As
fabric_q shares tagset with admin_q, while reconnect remote target, we
need a tag for connect command, but the only one reserved tag was held
by keep alive command which waiting inside admin_q. As a result, we
failed to reconnect admin_q forever. In order to fix this issue, I
think we should keep two reserved tags for admin queue.
|
[] | null | 5.5 | null | null | null |
|
CVE-2017-9413
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the Podcast feature in Subsonic 6.1.1 allow remote attackers to hijack the authentication of users for requests that (1) subscribe to a podcast via the add parameter to podcastReceiverAdmin.view or (2) update Internet Radio Settings via the urlRedirectCustomUrl parameter to networkSettings.view. NOTE: These vulnerabilities can be exploited to conduct server-side request forgery (SSRF) attacks.
|
[
"cpe:2.3:a:subsonic:subsonic:6.1.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-hq7p-p5vr-p695
|
A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /category.php. The manipulation of the argument categoryname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
RHSA-2023:6813
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null | null |
CVE-2017-3116
|
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the MakeAccessible plugin when parsing TrueType font data. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
GHSA-wwqj-cvrv-7w8x
|
The Intel 2200BG 802.11 Wireless Mini-PCI driver 9.0.3.9 (w29n51.sys) allows remote attackers to cause a denial of service (system crash) via crafted disassociation packets, which triggers memory corruption of "internal kernel structures," a different vulnerability than CVE-2006-6651. NOTE: this issue might overlap CVE-2006-3992.
|
[] | null | null | null | null | null |
|
CVE-2014-0383
|
Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.2.0 and 11.1.2.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Identity Console.
|
[
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
RHSA-2020:1288
|
Red Hat Security Advisory: haproxy security update
|
haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null | null |
CVE-2020-1734
|
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
|
[
"cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_tower:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_tower:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_tower:3.6.3:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.