id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2011-0030
|
The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted application that continues to execute throughout the logout of one user and the login session of the next user, aka "CSRSS Elevation of Privilege Vulnerability," a different vulnerability than CVE-2010-0023.
|
[
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 4.7 | null |
|
CVE-2021-1020
|
In snoozeNotification of NotificationListenerService.java, there is a possible way to disable notification for an arbitrary user due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-195111725
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | 4.4 | null |
|
CVE-2011-0489
|
The server components in Objectivity/DB 10.0 do not require authentication for administrative commands, which allows remote attackers to modify data, obtain sensitive information, or cause a denial of service by sending requests over TCP to (1) the Lock Server or (2) the Advanced Multithreaded Server, as demonstrated by commands that are ordinarily sent by the (a) ookillls and (b) oostopams applications. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:objectivity:objectivity\\/db:10.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-37982
|
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
|
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
CVE-2020-11939
|
In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.
|
[
"cpe:2.3:a:ntop:ndpi:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-hff4-vp6j-mc6m
|
The Social Bookmarks (del.icio.us) plug-in 8F in Quicksilver writes usernames and passwords in plaintext to the /Library/Logs/Console/UID/Console.log file, which allows local users to obtain sensitive information by reading this file.
|
[] | null | null | null | null | null |
|
ICSA-21-355-04
|
Emerson DeltaV
|
A specially crafted script could cause a controller to restart and cause a denial-of-service condition.CVE-2021-26264 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H). Missing DLLs, if replaced by an insider, could allow an attacker to achieve local privilege escalation when some DeltaV services are started.CVE-2021-44463 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H).
|
[] | null | null | 8.1 | null | null |
CVE-2018-19114
|
An issue was discovered in MinDoc through v1.0.2. It allows attackers to gain privileges by uploading an image file with contents that represent an admin session, and then sending a Cookie: header with a mindoc_id value containing the relative pathname of this uploaded file. For example, the mindoc_id (aka session ID) could be of the form aa/../../uploads/blog/201811/attach_#.jpg where '#' is a hex value displayed in the upload field of a manage/blogs/edit/ screen.
|
[
"cpe:2.3:a:iminho:mindoc:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
RHSA-2024:1492
|
Red Hat Security Advisory: thunderbird security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null | null |
GHSA-g4pq-p927-7pgg
|
Jenkins Blue Ocean Plugin cross-site request forgery vulnerability
|
Jenkins Blue Ocean Plugin 1.27.5 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.This vulnerability allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job.This issue is due to an incomplete fix of SECURITY-2502.Blue Ocean Plugin 1.27.5.1 uses the configured SCM URL, instead of a user-specified URL provided as a parameter to the HTTP endpoint.
|
[] | null | 5.4 | null | null | null |
GHSA-4cjp-gf5v-8843
|
The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_entry_files() function in all versions up to, and including, 1.7.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
|
[] | null | 8.1 | null | null | null |
|
CVE-2012-1700
|
Unspecified vulnerability in the Siebel CRM component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Siebel UI Framework.
|
[
"cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-mjm4-2fq8-2392
|
Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
|
[] | null | null | null | null | null |
|
GHSA-fj87-6gv7-h87w
|
A maliciously crafted project file may cause a buffer overflow, which may allow the attacker to execute arbitrary code that affects Fuji Electric V-Server Lite 4.0.3.0 and prior.
|
[] | null | null | 7.8 | null | null |
|
CVE-2021-46314
|
A Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetNetworkTomographySettings.php of D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin because backticks can be used for command injection when judging whether it is a reasonable domain name.
|
[
"cpe:2.3:o:dlink:dir-846_firmware:100a43:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-846:a1:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-846_firmware:100a53dla:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-846:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2019-19506
|
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the "homeplugd" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.
|
[
"cpe:2.3:o:tendacn:pa6_firmware:1.0.1.21:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:pa6:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
CVE-2024-36999
|
Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products
|
A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
|
[
"cpe:2.3:a:autodesk:autocad:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2024.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2024.1.5:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-qvqm-4pw7-7g9f
|
A vulnerability in the web framework code for Cisco RV180W Wireless-N Multifunction VPN Router and Small Business RV Series RV220W Wireless Network Security Firewall could allow an unauthenticated, remote attacker to conduct a directory path traversal attack on a targeted device. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location.
|
[] | null | null | 7.5 | null | null |
|
GHSA-374m-mqq5-65qf
|
Remote Desktop Protocol Server Information Disclosure Vulnerability
|
[] | null | 7.7 | null | null | null |
|
GHSA-248q-qwj4-9945
|
D-Link DWL-G700AP with firmware 2.00 and 2.01 allows remote attackers to cause a denial of service (CAMEO HTTP service crash) via a request composed of "GET" followed by a space and two newlines, possibly triggering the crash due to missing arguments.
|
[] | null | null | null | null | null |
|
GHSA-m9wc-h684-m6rq
|
A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user.
|
[] | null | null | null | null | null |
|
GHSA-mcq3-239h-fc92
|
In the Linux kernel, the following vulnerability has been resolved:pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL resultIf the FW doesn't support the PDS_CORE_CMD_FW_CONTROL command
the driver might at the least print garbage and at the worst
crash when the user runs the "devlink dev info" devlink command.This happens because the stack variable fw_list is not 0
initialized which results in fw_list.num_fw_slots being a
garbage value from the stack. Then the driver tries to access
fw_list.fw_names[i] with i >= ARRAY_SIZE and runs off the end
of the array.Fix this by initializing the fw_list and by not failing
completely if the devcmd fails because other useful information
is printed via devlink dev info even if the devcmd fails.
|
[] | null | null | null | null | null |
|
CVE-2021-1082
|
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to information disclosure, tampering of data, or denial of service. vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7)
|
[
"cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2007-4606
|
PHP remote file inclusion vulnerability in convert/mvcw_conver.php in the Virtual War (VWar) module for PHPNuke-Clan (PNC) 4.2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the vwar_root parameter, a different vector than CVE-2006-1602. NOTE: it is possible that this issue stems from a problem in VWar itself.
|
[
"cpe:2.3:a:phpnuke-clan:phpnuke-clan:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
cisco-sa-asr920-ABjcLmef
|
Cisco ASR 920 Series Aggregation Services Router Model 12SZ-IM SNMP Denial of Service Vulnerability
|
A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload.
The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr920-ABjcLmef ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr920-ABjcLmef"]
|
[] | null | null | 6.3 | null | null |
CVE-2022-41653
|
Daikin SVMPC1 version 2.1.22 and prior and SVMPC2 version 1.2.3 and prior are vulnerable to an attacker obtaining user login credentials and control the system.
|
[
"cpe:2.3:a:daikinlatam:svmpc1:*:*:*:*:*:*:*:*",
"cpe:2.3:a:daikinlatam:svmpc2:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-x8v4-j6fc-388p
|
Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085.
|
[] | null | null | null | null | null |
|
RHSA-2021:1627
|
Red Hat Security Advisory: trousers security, bug fix, and enhancement update
|
trousers: fails to drop the root gid privilege when no longer needed trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root trousers: tss user can be used to create or corrupt existing files, this could lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null | null |
GHSA-gxc8-3g43-8358
|
Cross-site scripting (XSS) vulnerability in search.asp in ASP Product Catalog 1.0 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter.
|
[] | null | null | null | null | null |
|
GHSA-xvpm-8w5j-p5mw
|
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).
|
[] | null | null | 7.1 | null | null |
|
GHSA-rp6m-p8jm-p6fq
|
Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element focus.
|
[] | null | null | null | null | null |
|
CVE-2016-10392
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, a driver can potentially leak kernel memory.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-4rx3-cpgg-x277
|
Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3.
|
[] | null | 8.1 | null | null | null |
|
CVE-2013-7397
|
Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.
|
[
"cpe:2.3:a:redhat:jboss_fuse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:async-http-client_project:async-http-client:*:beta24:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2019-9505
|
PrinterLogic Print Management Software does not sanitize special characters
|
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges.
|
[
"cpe:2.3:a:printerlogic:print_management:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
GHSA-3fw8-66wf-pr7m
|
methodOverride Middleware Reflected Cross-Site Scripting in connect
|
Connect is a stack of middleware that is executed in order in each request.The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override".Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser.###Example:RecommendationUpdate to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.
|
[] | null | null | null | null | null |
RHSA-2017:3392
|
Red Hat Security Advisory: java-1.7.0-openjdk security and bug fix update
|
OpenJDK: incorrect key size constraint check (Security, 8179101) OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998) OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null | null |
GHSA-ccv4-6623-442v
|
Unspecified vulnerability in the WebLogic Workshop component in BEA Product Suite WLW 8.1SP5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to "some NetUI pageflows."
|
[] | null | null | null | null | null |
|
PYSEC-2021-214
| null |
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) assumes that the `orig_input_shape` and `grad` tensors have similar first and last dimensions but does not check that this assumption is validated. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2021-25133
|
The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setradiusconfig_func function.
|
[
"cpe:2.3:o:hpe:cloudline_cl3100_gen10_server_firmware:1.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl3100_gen10_server_firmware:1.10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl3100_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl4100_gen10_server_firmware:1.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl4100_gen10_server_firmware:1.10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl4100_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl5200_gen9_server_firmware:1.07.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl5200_gen9_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl5800_gen10_server_firmware:1.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl5800_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:cloudline_cl5800_gen9_server_firmware:1.09.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:cloudline_cl5800_gen9_server:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-w7fv-7j46-wwrv
|
Jenkins Amazon EC2 Plugin leaked beginning of private key in system log
|
Jenkins Amazon EC2 Plugin printed a log message that contained the beginning of the private key to the Jenkins system log.The log message no longer includes the beginning of the private key.
|
[] | null | null | 5.5 | null | null |
GHSA-q7f5-h647-x236
|
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
|
[] | null | 3.3 | null | null | null |
|
CVE-2025-32636
|
WordPress Local Magic Plugin <= 2.6.0 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in matthewrubin Local Magic allows SQL Injection. This issue affects Local Magic: from n/a through 2.6.0.
|
[] | null | 9.3 | null | null | null |
GHSA-7r2x-3qcm-8vfw
|
herbivore downloads Resources over HTTP
|
Affected versions of `herbivore` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `herbivore`.RecommendationThe module author has rewritten much of the package, and in that process, patched the vulnerability, but has not published any of the new code to npm.In order to get an updated version, it is necessary to install the package from github. This can be done using the following command:
|
[] | null | null | 8.1 | null | null |
GHSA-q3vp-5rrx-8cpp
|
Mail in Apple Mac OS X 10.3.9 and 10.4.6 allows remote attackers to execute arbitrary code via an enriched text e-mail message with "invalid color information" that causes Mail to allocate and initialize arbitrary classes.
|
[] | null | null | null | null | null |
|
CVE-2025-24063
|
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
|
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
CVE-2024-2464
|
Application users enumeration in CDeX
|
This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.This issue affects CDeX application versions through 5.7.1.
|
[] | null | 6.3 | null | null | null |
CVE-2021-42666
|
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
|
[
"cpe:2.3:a:engineers_online_portal_project:engineers_online_portal:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
cisco-sa-bw-privesc-yw4ekrXW
|
Cisco BroadWorks Privilege Escalation Vulnerability
|
A vulnerability in Cisco BroadWorks could allow an authenticated, local attacker to elevate privileges to the root user on an affected device.
The vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing a crafted command to the affected system. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, an attacker must have valid BroadWorks administrative privileges on the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6 | null | null | null |
CVE-2005-4655
|
Cross-site scripting (XSS) vulnerability in submit.php in PHP-Fusion 6.0.204 allows remote attackers to inject arbitrary web script or HTML via nested tags in the news_body parameter, as demonstrated by elements such as "<me<meta>ta" and "<sc<script>ript>".
|
[
"cpe:2.3:a:php_fusion:php_fusion:6.00.204:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-782j-x6h5-5vmq
|
Exposure of Sensitive Information in the web interface in McAfee Advanced Threat Defense (ATD) prior to 4.12.2 allows remote authenticated users to view sensitive unencrypted information via a carefully crafted HTTP request parameter. The risk is partially mitigated if your ATD instances are deployed as recommended with no direct access from the Internet to them.
|
[] | null | 4.3 | null | null | null |
|
GHSA-vxq2-p937-3px3
|
Pinned entity creation form shows wrong data
|
ImpactLogged in user can access page state data of pinned pages of other users by pageId hash.Patch
|
[] | null | 4.3 | null | null | null |
CVE-2024-0487
|
code-projects Fighting Cock Information System delete-vaccine.php sql injection
|
A vulnerability was found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/action/delete-vaccine.php. The manipulation of the argument ref leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250592.
|
[
"cpe:2.3:a:code-projects:fighting_cock_information_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
GHSA-mq9g-j3p5-r7xg
|
SQL injection vulnerability in the indianpulse Game Server (com_gameserver) component 1.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the grp parameter in a gameserver action to index.php.
|
[] | null | null | null | null | null |
|
GHSA-3c82-f6j3-5x2g
|
The User Submitted Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [usp_gallery] shortcode in versions up to, and including, 20230811 due to insufficient input sanitization and output escaping on user supplied attributes like 'before'. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-cj5p-x443-5mhx
|
This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may be able to gain elevated privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2017-6831
|
Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
|
[
"cpe:2.3:a:audiofile:audiofile:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:audiofile:audiofile:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:audiofile:audiofile:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:audiofile:audiofile:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:audiofile:audiofile:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:audiofile:audiofile:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:audiofile:audiofile:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2024-51296
|
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the pingtrace function.
|
[
"cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-jq3j-8jmp-v6jp
|
A vulnerability classified as critical was found in SourceCodester One Church Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /one_church/userregister.php. The manipulation leads to authentication bypass. The attack can be launched remotely.
|
[] | null | 9.8 | null | null | null |
|
CVE-2002-1519
|
Format string vulnerability in the CLI interface for WatchGuard Firebox Vclass 3.2 and earlier, and RSSA Appliance 3.0.2, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the password parameter.
|
[
"cpe:2.3:h:rapidstream:rapidstream:500:*:*:*:*:*:*:*",
"cpe:2.3:h:rapidstream:rapidstream:2000:*:*:*:*:*:*:*",
"cpe:2.3:h:rapidstream:rapidstream:4000:*:*:*:*:*:*:*",
"cpe:2.3:h:rapidstream:rapidstream:6000:*:*:*:*:*:*:*",
"cpe:2.3:h:rapidstream:rapidstream:8000:*:*:*:*:*:*:*",
"cpe:2.3:h:watchguard:firebox:v10:*:*:*:*:*:*:*",
"cpe:2.3:h:watchguard:firebox:v60:*:*:*:*:*:*:*",
"cpe:2.3:h:watchguard:firebox:v80:*:*:*:*:*:*:*",
"cpe:2.3:h:watchguard:firebox:v100:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2014-9942
|
In Boot in all Android releases from CAF using the Linux kernel, a Use of Uninitialized Variable vulnerability could potentially exist.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2018-5543
|
The F5 BIG-IP Controller for Kubernetes 1.0.0-1.5.0 (k8s-bigip-crtl) passes BIG-IP username and password as command line parameters, which may lead to disclosure of the credentials used by the container.
|
[
"cpe:2.3:a:f5:big-ip_controller:*:*:*:*:*:kubernetes:*:*"
] | null | null | 8.8 | 4 | null |
|
CVE-2025-8752
|
wangzhixuan spring-shiro-training add command injection
|
A vulnerability was found in wangzhixuan spring-shiro-training up to 94812c1fd8f7fe796c931f4984ff1aa0671ab562. It has been declared as critical. This vulnerability affects unknown code of the file /role/add. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-qqhf-7fqm-49mx
|
Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21850.
|
[] | null | 8.8 | null | null | null |
|
CVE-2022-38021
|
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
|
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
GHSA-fp44-79vr-grcq
|
diatheke.pl in Sword 1.5.7a allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
|
[] | null | null | null | null | null |
|
GHSA-xrr6-69ww-5ggj
|
Cross-site scripting (XSS) vulnerability in clickstream.js in Y! Toolbar plugin for FireFox 3.1.0.20130813024103 for Mac, and 2.5.9.2013418100420 for Windows, allows remote attackers to inject arbitrary web script or HTML via a crafted URL that is stored by the victim.
|
[] | null | null | null | null | null |
|
GHSA-f6pv-j8mr-w6rr
|
** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.
|
[] | null | 9.8 | null | null | null |
|
GHSA-576m-4rvh-6rff
|
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11925.
|
[] | null | null | null | null | null |
|
CVE-2023-49954
|
The CRM Integration in 3CX before 18.0.9.23 and 20 before 20.0.0.1494 allows SQL Injection via a first name, search string, or email address.
|
[
"cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2025-27177
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122)
|
InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
CVE-2018-3960
|
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Producer property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8 | null | null |
|
GHSA-xmp7-hhpr-wjgh
|
An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r29p0 through r42p0 before r43p0, and Arm's GPU Architecture Gen5 r41p0 through r42p0 before r43p0.
|
[] | null | 5.5 | null | null | null |
|
GHSA-3539-3c95-mf2j
|
A SQL Injection vulnerability was discovered in the askquery.php file of CloudClassroom-PHP Project v1.0. The squeryx parameter accepts unsanitized input, which is passed directly into backend SQL queries.
|
[] | null | 9.8 | null | null | null |
|
GHSA-5872-q7c3-cvqr
|
Unparsed web content delivery vulnerability in WIKINDX before 0.9.9g allows remote attackers to obtain sensitive information via a direct HTTP request to the config.inc file.
|
[] | null | null | null | null | null |
|
CVE-2019-7487
|
Installation of the SonicOS SSLVPN NACagent 3.5 on the Windows operating system, an autorun value is created does not put the path in quotes, so if a malicious binary by an attacker within the parent path could allow code execution.
|
[
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:sonicos_sslvpn_nacagent:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2021-32629
|
Memory access due to code generation flaw in Cranelift module
|
Cranelift is an open-source code generator maintained by Bytecode Alliance. It translates a target-independent intermediate representation into executable machine code. There is a bug in 0.73 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a Wasm program. This bug was introduced in the new backend on 2020-09-08 and first included in a release on 2020-09-30, but the new backend was not the default prior to 0.73. The recently-released version 0.73 with default settings, and prior versions with an explicit build flag to select the new backend, are vulnerable. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack, under a specific set of circumstances. If those circumstances occur, the bug could allow access to memory addresses upto 2GiB before the start of the Wasm program heap. If the heap bound is larger than 2GiB, then it would be possible to read memory from a computable range dependent on the size of the heaps bound. The impact of this bug is highly dependent on heap implementation, specifically: * if the heap has bounds checks, and * does not rely exclusively on guard pages, and * the heap bound is 2GiB or smaller * then this bug cannot be used to reach memory from another Wasm program heap. The impact of the vulnerability is mitigated if there is no memory mapped in the range accessible using this bug, for example, if there is a 2 GiB guard region before the Wasm program heap. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack, when the register allocator reloads a spilled integer value narrower than 64 bits. This interacts poorly with another optimization: the instruction selector elides a 32-to-64-bit zero-extend operator when we know that an instruction producing a 32-bit value actually zeros the upper 32 bits of its destination register. Hence, we rely on these zeroed bits, but the type of the value is still i32, and the spill/reload reconstitutes those bits as the sign extension of the i32’s MSB. The issue would thus occur when: * An i32 value in a Wasm program is greater than or equal to 0x8000_0000; * The value is spilled and reloaded by the register allocator due to high register pressure in the program between the value’s definition and its use; * The value is produced by an instruction that we know to be “special” in that it zeroes the upper 32 bits of its destination: add, sub, mul, and, or; * The value is then zero-extended to 64 bits in the Wasm program; * The resulting 64-bit value is used. Under these circumstances there is a potential sandbox escape when the i32 value is a pointer. The usual code emitted for heap accesses zero-extends the Wasm heap address, adds it to a 64-bit heap base, and accesses the resulting address. If the zero-extend becomes a sign-extend, the program could reach backward and access memory up to 2GiB before the start of its heap. In addition to assessing the nature of the code generation bug in Cranelift, we have also determined that under specific circumstances, both Lucet and Wasmtime using this version of Cranelift may be exploitable. See referenced GitHub Advisory for more details.
|
[
"cpe:2.3:a:bytecodealliance:cranelift-codegen:*:*:*:*:*:rust:*:*"
] | null | 7.2 | null | null | null |
CVE-2020-19595
|
Buffer overflow vulnerability in Core FTP Server v2 Build 697, via a crafted username.
|
[
"cpe:2.3:a:coreftp:core_ftp:2.0:build_697:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-6681
|
witmy my-springsecurity-plus dept sql injection
|
A vulnerability, which was classified as critical, has been found in witmy my-springsecurity-plus up to 2024-07-04. Affected by this issue is some unknown functionality of the file /api/dept. The manipulation of the argument params.dataScope leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271154 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:witmy:my-springsecurity-plus:*:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2023-34457
|
MechanicalSoup vulnerable to malicious web server reading arbitrary files on client using file input inside HTML form
|
MechanicalSoup is a Python library for automating interaction with websites. Starting in version 0.2.0 and prior to version 1.3.0, a malicious web server can read arbitrary files on the client using a `<input type="file" ...>` inside HTML form. All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values. Version 1.3.0 contains a patch for this issue.
|
[
"cpe:2.3:a:mechanicalsoup_project:mechanicalsoup:*:*:*:*:*:python:*:*"
] | null | 5.9 | null | null | null |
GHSA-46xw-gc6v-2jrr
|
Payload size is not validated before reading memory that may cause issue of accessing invalid pointer or some garbage data in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Rennell, Saipan, SC8180X, SDA660, SDA845, SDM429W, SDM439, SDM670, SDM710, SDX20, SDX24, SDX55, SM8150, SM8250, SXR1130, SXR2130
|
[] | null | null | null | null | null |
|
GHSA-fgjw-5p88-vmrp
|
In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file.
|
[] | null | null | 6.5 | null | null |
|
GHSA-4jcr-vf56-7rjc
|
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the rm_rlcache_file command to obtain root privileges. IBM X-Force ID: 236690.
|
[] | null | 8.4 | null | null | null |
|
CVE-2015-4214
|
Cisco Unified MeetingPlace 8.6(1.2) and 8.6(1.9) allows remote authenticated users to discover cleartext passwords by reading HTML source code, aka Bug ID CSCuu33050.
|
[
"cpe:2.3:a:cisco:unified_meetingplace:8.6\\(1.2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_meetingplace:8.6\\(1.9\\):*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
RHSA-2018:3529
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 on RHEL 6 security update
|
JBoss/WildFly: iiop does not honour strict transport confidentiality
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 5.3 | null | null |
CVE-2012-4893
|
Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982.
|
[
"cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2020-35818
|
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.74, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBR20 before 2.3.5.26, RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK40 before 2.3.5.30, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
|
[
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-89pv-4g4h-69v4
|
Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors, a different vulnerability than CVE-2015-4443.
|
[] | null | null | null | null | null |
|
GHSA-9f25-wfqc-782v
|
A vulnerability in OTRS Application Server allows session hijacking due to missing attributes for sensitive
cookie settings in HTTPS sessions. A request to an OTRS endpoint from a possible malicious web site, would send the authentication cookie, performing an unwanted read operation.This issue affects:OTRS 7.0.XOTRS 8.0.XOTRS 2023.XOTRS 2024.XOTRS 2025.x
|
[] | null | 4.8 | null | null | null |
|
GHSA-fxvw-v786-822p
|
Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Health Sciences InForm accessible data as well as unauthorized access to critical data or complete access to all Oracle Health Sciences InForm accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
|
[] | null | 6.8 | null | null | null |
|
GHSA-58v3-hf8m-w67r
|
Unspecified vulnerability in Sesamie 1.0 allows remote anonymous attackers to gain access to repositories of other users via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-c445-xm3f-hmfh
|
Incorrect permission check in Health Advisor by CloudBees Plugin
|
Health Advisor by CloudBees Plugin 3.2.0 and earlier does not correctly perform a permission check in an HTTP endpoint.This allows attackers with Overall/Read permission to view an administrative configuration page.Health Advisor by CloudBees Plugin 3.2.1 requires Overall/Administer to view its administrative configuration page.
|
[] | null | 4.3 | null | null | null |
CVE-2025-49531
|
Illustrator | Integer Overflow or Wraparound (CWE-190)
|
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
CVE-2023-46402
|
git-urls 1.0.0 allows ReDOS (Regular Expression Denial of Service) in urls.go.
|
[
"cpe:2.3:a:git-urls_project:git-urls:1.0.1:*:*:*:*:go:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2015-8612
|
The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument.
|
[
"cpe:2.3:a:blueman_project:blueman:*:*:*:*:*:*:*:*"
] | null | null | 8.4 | 7.2 | null |
|
GHSA-vfq3-6prq-j8hp
|
Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via long strings in input such as (1) source-code tokens and (2) pathnames, related to integer overflows in some cases. NOTE: this issue exists because of an incomplete fix for CVE-2004-2541.
|
[] | null | null | null | null | null |
|
GHSA-prj4-495w-f4qv
|
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
|
[] | null | null | 6.2 | null | null |
|
CVE-2019-11077
|
FastAdmin V1.0.0.20190111_beta has a CSRF vulnerability to add a new admin user via the admin/auth/admin/add?dialog=1 URI.
|
[
"cpe:2.3:a:fastadmin:fastadmin:1.0.0.20190111:beta:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-h55c-fv22-38f6
|
PHKP including commit 88fd9cfdf14ea4b6ac3e3967feea7bcaabb6f03b is affected by: Improper Neutralization of Special Elements used in a Command ('Command Injection'). The impact is: It is possible to manipulate gpg-keys or execute commands remotely. The component is: function pgp_exec() phkp.php:98. The attack vector is: HKP-Api: /pks/lookup?search.
|
[] | null | null | 9.8 | null | null |
|
CVE-2025-25063
|
An XSS issue was discovered in Backdrop CMS 1.28.x before 1.28.5 and 1.29.x before 1.29.3. It does not sufficiently validate uploaded SVG images to ensure they do not contain potentially dangerous SVG tags. SVG images can contain clickable links and executable scripting, and using a crafted SVG, it is possible to execute scripting in the browser when an SVG image is viewed. This issue is mitigated by the attacker needing to be able to upload SVG images, and that Backdrop embeds all uploaded SVG images within <img> tags, which prevents scripting from executing. The SVG must be viewed directly by its URL in order to run any embedded scripting.
|
[] | null | 4.4 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.