id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-v53j-5xg5-wr7x
WeBid version up to current version 1.2.2 contains a Cross Site Scripting (XSS) vulnerability in user_login.php, register.php that can result in Javascript execution in the user's browser, injection of malicious markup into the page. This attack appear to be exploitable via The victim user must click a malicous link. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
[]
null
null
6.1
null
null
GHSA-q29r-xr2f-g7j5
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
[]
null
7.5
null
null
null
GHSA-qvcf-rgf7-ff3j
c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.
[]
null
null
null
null
null
CVE-2022-36322
In JetBrains TeamCity before 2022.04.2 build parameter injection was possible
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2016-0899
EMC RSA Archer GRC 5.5.x before 5.5.3.4 allows remote authenticated users to read the web.config.bak file, and obtain sensitive credential information, by modifying the IIS configuration to set a Content-Type header for .bak files.
[ "cpe:2.3:a:emc:rsa_archer_egrc:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_egrc:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_egrc:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_egrc:5.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_egrc:5.5.2.3:*:*:*:*:*:*:*" ]
null
null
6.3
3.5
null
CVE-2006-4643
SQL injection vulnerability in consult/joueurs.php in Uni-Vert PhpLeague 0.82 and earlier allows remote attackers to execute arbitrary SQL commands via the id_joueur parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[ "cpe:2.3:a:uni-vert:phpleague:0.82:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-hgwc-78jr-63c3
The WPSmartContracts WordPress plugin before 1.3.12 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author
[]
null
8.8
null
null
null
CVE-2020-25857
The function ClientEAPOLKeyRecvd() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which can be exploited for denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker does not need to know the network's PSK.
[ "cpe:2.3:o:realtek:rtl8195a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:realtek:rtl8195a:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2025-37890
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As described in Gerrard's report [1], we have a UAF case when an hfsc class has a netem child qdisc. The crux of the issue is that hfsc is assuming that checking for cl->qdisc->q.qlen == 0 guarantees that it hasn't inserted the class in the vttree or eltree (which is not true for the netem duplicate case). This patch checks the n_active class variable to make sure that the code won't insert the class in the vttree or eltree twice, catering for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
[]
null
null
null
null
null
GHSA-h724-w27c-6j67
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the timeZone parameter in the fromSetSysTime function.
[]
null
9.8
null
null
null
CVE-2023-1208
HTTP Headers < 1.18.11 - Admin+ Remote Code Execution
This HTTP Headers WordPress plugin before 1.18.11 allows arbitrary data to be written to arbitrary files, leading to a Remote Code Execution vulnerability.
[ "cpe:2.3:a:riverside:http_headers:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
null
RHSA-2007:1030
Red Hat Security Advisory: xpdf security update
t1lib font filename string overflow DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
null
CVE-2015-9529
The Easy Digital Downloads (EDD) Stripe extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
[ "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:easydigitaldownloads:stripe:-:*:*:*:*:easy_digital_downloads:*:*" ]
null
6.1
null
4.3
null
CVE-2010-0564
Buffer overflow in Trend Micro URL Filtering Engine (TMUFE) in OfficeScan 8.0 before SP1 Patch 5 - Build 3510, possibly tmufeng.dll before 3.0.0.1029, allows attackers to cause a denial of service (crash or OfficeScan hang) via unspecified vectors. NOTE: it is likely that this issue also affects tmufeng.dll before 2.0.0.1049 for OfficeScan 10.0.
[ "cpe:2.3:a:trendmicro:officescan:*:sp1:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2003-0848
Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
[ "cpe:2.3:a:slocate:slocate:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:slocate:slocate:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:slocate:slocate:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:slocate:slocate:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:slocate:slocate:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:slocate:slocate:2.6:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-pq6p-fc96-wc5w
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[]
null
9.8
null
null
null
CVE-2004-1719
Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an <img> tag, or (15) the subject of an e-mail message.
[ "cpe:2.3:a:merak:mail_server:7.4.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2020:4320
Red Hat Security Advisory: OpenShift Container Platform 4.5.16 security update
openshift: restricted SCC allows pods to craft custom network packets
[ "cpe:/a:redhat:openshift:4.5::el7" ]
null
3.1
null
null
null
GHSA-m8wf-52qg-w2qv
A vulnerability classified as critical has been found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/student_payment_details.php. The manipulation of the argument index leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265095.
[]
null
6.3
null
null
null
CVE-2007-1950
Cross-site scripting (XSS) vulnerability in index_cms.php in WebBlizzard CMS allows remote attackers to inject arbitrary web script or HTML via the Suchzeile parameter.
[ "cpe:2.3:a:webblizzard:content_management_system:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-m9gx-79mm-q64v
An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacker to cause a partial Denial of Service (DoS), or lead to remote code execution (RCE). The vulnerability exists in the packet parsing logic on the client that processes the response from the server using a custom protocol. An attacker with control of a JAL License Manager, or with access to the local broadcast domain, may be able to spoof a new JAL License Manager and/or craft a response to the Junos OS License Client, leading to exploitation of this vulnerability. This issue only affects Junos systems configured in Network Mode. Systems that are configured in Standalone Mode (the default mode of operation for all systems) are not vulnerable to this issue. This issue affects: Juniper Networks Junos OS: 19.2 versions prior to 19.2R3-S3; 19.3 versions prior to 19.3R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. Juniper Networks Junos OS Evolved: version 20.1R1-EVO and later versions, prior to 21.2R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1.
[]
null
null
null
null
null
CVE-2021-20100
Nessus Agent 8.2.4 and earlier for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20099.
[ "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
null
CVE-2000-0206
The installation of Oracle 8.1.5.x on Linux follows symlinks and creates the orainstRoot.sh file with world-writeable permissions, which allows local users to gain privileges.
[ "cpe:2.3:a:oracle:oracle8i:8.1.5:*:*:*:*:*:*:*" ]
null
null
null
6.2
null
GHSA-h9g9-92v6-jw8x
MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way that attackers within range could connect to the device's web services and compromise the device.
[]
null
8.8
null
null
null
GHSA-pw7h-wfmq-9ph4
Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
[]
null
null
null
null
null
CVE-2005-1487
Multiple SQL injection vulnerabilities in FishCart 3.1 allow remote attackers to execute arbitrary SQL commands via the (1) cartid parameter to upstnt.php or (2) psku parameter to display.php. NOTE: the vendor disputes this report, saying that they are forced SQL errors. The original researcher is known to be unreliable
[ "cpe:2.3:a:fishnet:fishcart:3.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-wg5x-j7p6-x5pc
File Upload vulnerability in Laravel CMS v.1.4.7 and before allows a remote attacker to execute arbitrary code via the shell.php a component.
[]
null
7.2
null
null
null
CVE-2021-20177
A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
4.4
null
2.1
null
GHSA-7xf9-6885-2xx3
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
null
GHSA-fw83-jf8x-8666
The Car Wallpapers HD (aka com.arab4x4.gallery.app) application 1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2012-0002
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2005-0139
Unknown vulnerability in rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not sufficiently restrict access rights for read-mostly exports, which allows attackers to conduct unauthorized activities.
[ "cpe:2.3:o:sgi:irix:6.5.25:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.26:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.27:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2013-1602
An Information Disclosure vulnerability exists due to insufficient validation of authentication cookies for the RTSP session in D-Link DCS-5635 1.01, DCS-1100L 1.04, DCS-1130L 1.04, DCS-1100 1.03/1.04_US, DCS-1130 1.03/1.04_US , DCS-2102 1.05_RU/1.06/1.06_FR/1.05_TESCO, DCS-2121 1.05_RU/1.06/1.06_FR/1.05_TESCO, DCS-3410 1.02, DCS-5230 1.02, DCS-5230L 1.02, DCS-6410 1.0, DCS-7410 1.0, DCS-7510 1.0, and WCS-1100 1.02, which could let a malicious user obtain unauthorized access to video streams.
[ "cpe:2.3:o:dlink:dcs-3411_firmware:1.02:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-3411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-3430_firmware:1.02:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-5605_firmware:1.01:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-5605:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-5635_firmware:1.01:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-5635:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-1100l_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-1100l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-1130l_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-1130l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-1100_firmware:1.03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-1100_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-1100:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-1130_firmware:1.03:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-1130_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-1130:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-2102_firmware:1.05:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-2102_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-2102:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-2121_firmware:1.05:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-2121_firmware:1.06:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-2121:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-3410_firmware:1.02:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-3410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-5230_firmware:1.02:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-5230:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-5230l_firmware:1.02:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-5230l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-6410_firmware:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-6410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-7410_firmware:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dcs-7510_firmware:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:wcs-1100_firmware:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:wcs-1100:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-v6f2-92p8-cg2q
A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlx, and pptx files as attachments to messages.
[]
null
null
null
null
null
GHSA-w8pq-wqhw-ch5q
An unauthenticated user could discover account credentials via a brute-force attack without rate limiting
[]
null
8.1
null
null
null
CVE-2021-41099
Integer overflow issue with strings in Redis
Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves changing the default proto-max-bulk-len configuration parameter to a very large value and constructing specially crafted network payloads or commands. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the proto-max-bulk-len configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
[ "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-63f8-cmv9-r78g
Cross-site request forgery (CSRF) vulnerability in application/modules/admin/controllers/users.php in Tomaz Muraus Open Blog 1.2.1, and possibly earlier, allows remote attackers to hijack the authentication of administrators for requests to admin/users/edit that grant administrative privileges.
[]
null
null
null
null
null
CVE-2008-7097
Multiple SQL injection vulnerabilities in Qsoft K-Rate Premium allow remote attackers to execute arbitrary SQL commands via (1) the $id variable in admin/includes/dele_cpac.php, (2) $ord[order_id] variable in payments/payment_received.php, (3) $id variable in includes/functions.php, and (4) unspecified variables in modules/chat.php, as demonstrated via the (a) show parameter in an online action to index.php; (b) PATH_INTO to the room/ handler; (c) image and (d) id parameters in a vote action to index.php; (e) PATH_INFO to the blog/ handler; and (f) id parameter in a blog_edit action to index.php.
[ "cpe:2.3:a:qsoft-inc:k-rate:-:-:premium:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2018-7213
The Password Manager Extension in Abine Blur 7.8.242* before 7.8.2428 allows attackers to bypass the Multi-Factor Authentication and macOS disk-encryption protection mechanisms, and consequently exfiltrate secured data, because the right-click context menu is not secured.
[ "cpe:2.3:a:abine:blur:7.8.2424:*:*:*:*:*:*:*" ]
null
null
9.8
5
null
GHSA-fqrg-p497-vw5j
Battlefront Dropteam 1.3.3 and earlier sends the client's online account name and password to the game server, which allows malicious game servers to steal account information.
[]
null
null
null
null
null
GHSA-qq9h-27w8-76xf
Vulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users to access arbitrary files and gain privileges.
[]
null
null
null
null
null
CVE-2024-3065
PayPal Pay Now, Buy Now, Donation and Cart Buttons Shortcode <= 1.7 - Authenticated (Admin+) Stored Cross-Site Scripting
The PayPal Pay Now, Buy Now, Donation and Cart Buttons Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
4.4
null
null
null
GHSA-f6fm-8rjv-g8ww
In venc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08810810 / ALPS08805789; Issue ID: MSV-1502.
[]
null
9.8
null
null
null
CVE-2016-4966
The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
[ "cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
CVE-2006-0022
Unspecified vulnerability in Microsoft PowerPoint in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP1 and SP2, Office 2004 for Mac, and v. X for Mac allows user-assisted attackers to execute arbitrary code via a PowerPoint document with a malformed record, which triggers memory corruption.
[ "cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2000:sr1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2002:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2002:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2002:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2003:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2004:*:mac:*:*:*:*:*" ]
null
null
null
7.6
null
GHSA-wx59-w85q-r62g
Google Chrome before 5.0.375.99 does not properly isolate sandboxed IFRAME elements, which has unspecified impact and remote attack vectors.
[]
null
null
null
null
null
CVE-2015-1955
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (CPU consumption) via a crafted byte sequence in authentication data.
[ "cpe:2.3:a:ibm:websphere_mq_light:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq_light:1.0.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2025-1276
DWG File Parsing Out-of-Bounds Write Vulnerability
A maliciously crafted DWG file, when parsed through certain Autodesk applications, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
[]
null
7.8
null
null
null
GHSA-3vc6-wmgr-gj4q
The 404 Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.35.17 via the export feature. This makes it possible for unauthenticated attackers to extract sensitive data such as redirects including GET parameters which may reveal sensitive information.
[]
null
5.3
null
null
null
CVE-2023-45775
In CreateAudioBroadcast of broadcaster.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2025-5292
Element Pack Addons for Elementor – Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder <= 5.11.2 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting
The Element Pack Addons for Elementor – Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'marker_content’ parameter in all versions up to, and including, 5.11.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2024-46806
drm/amdgpu: Fix the warning division or modulo by zero
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the warning division or modulo by zero Checks the partition mode and returns an error for an invalid mode.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-mxv4-hqqr-c5rm
Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.0 and JBoss WildFly Application Server, when run under a security manager, do not properly restrict access to the Modular Service Container (MSC) service registry, which allows local users to modify the server via a crafted deployment.
[]
null
null
null
null
null
GHSA-g79w-q84v-cx7q
A vulnerability in the authentication component of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the authentication component of Cisco Webex Meetings. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
6.1
null
null
null
GHSA-7gf6-788h-c56f
Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
[]
null
null
null
null
null
CVE-2022-35620
D-LINK DIR-818LW A1:DIR818L_FW105b01 was discovered to contain a remote code execution (RCE) vulnerability via the function binary.soapcgi_main.
[ "cpe:2.3:o:dlink:dir-818l_firmware:105b01:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-818l:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-x6v4-jh5f-25pv
The “List_Add” function of message board of ShinHer StudyOnline System does not filter special characters in the title parameter. After logging in with user’s privilege, remote attackers can inject JavaScript and execute stored XSS attacks.
[]
null
null
null
null
null
CVE-2007-3563
SQL injection vulnerability in includes/view_page.php in AV Arcade 2.1b allows remote attackers to execute arbitrary SQL commands via the id parameter in a view_page action to index.php.
[ "cpe:2.3:a:avscripts:av_arcade:2.1b:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-c396-cvpq-g9cm
Reflected Cross-Site Scripting (XSS) in /customer_support/index.php in Customer Support System v1.0, which allows remote attackers to execute arbitrary code via the page parameter.
[]
4.8
null
null
null
null
GHSA-qr4g-ghx2-6476
lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
[]
null
null
null
null
null
RHSA-2022:6634
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
null
CVE-2007-4253
SQL injection vulnerability in the News module in modules.php in Envolution 1.1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the topic parameter, a different vector than CVE-2005-4263.
[ "cpe:2.3:a:envolution:envolution:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-35973
Authenticated Remote Command Execution in the ArubaOS Command Line Interface
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
[ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:sd-wan:-:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:mcr-hw-10k:-:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:mcr-hw-1k:-:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:mcr-hw-5k:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-qjmx-q3f9-2ph2
Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
[]
null
6.5
null
null
null
GHSA-wx7p-737c-9wqw
Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions.
[]
null
null
9.8
null
null
RHSA-2006:0592
Red Hat Security Advisory: tomcat security update for Red Hat Application Server
tomcat examples XSS
[ "cpe:/a:redhat:rhel_application_server:1" ]
null
null
null
null
null
cisco-sa-20190515-nxos-sisv2
Cisco NX-OS CLI Command Software Image Signature Verification Vulnerabilities
Multiple vulnerabilities in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerabilities exist because software digital signatures are not properly verified during CLI command execution. An attacker could exploit these vulnerabilities to install an unsigned software image on an affected device. Note: If the device has not been patched for the vulnerability previously disclosed in the Cisco Security Advisory cisco-sa-20190306-nxos-sig-verif ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif"], a successful exploit could allow the attacker to boot a malicious software image. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-sisv2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-sisv2"]
[]
null
null
6.7
null
null
RHSA-2018:1204
Red Hat Security Advisory: java-1.8.0-oracle security update
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
[ "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
5.3
null
null
GHSA-w3v8-rrpc-q26v
In ion_ioctl of ion-ioctl.c, there is a possible way to leak kernel head data due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208277166References: Upstream kernel
[]
null
5.5
null
null
null
RHSA-2019:2332
Red Hat Security Advisory: advancecomp security update
advancecomp: null pointer dereference in function be_uint32_read() in endianrw.h advancecomp: denial of service in function adv_png_unfilter_8 in lib/png.c
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.9
null
null
ICSA-20-056-05
Honeywell WIN-PAK
The affected product is vulnerable to a cross-site request forgery, which may allow an attacker to remotely execute arbitrary code.CVE-2020-7005 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The header injection vulnerability has been identified, which may allow remote code execution.CVE-2020-6982 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). The affected product is vulnerable due to the usage of old jQuery libraries.CVE-2020-6978 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
[]
null
null
7.2
null
null
GHSA-pmf3-wffg-82x2
A vulnerability classified as critical was found in Tenda i21 1.0.0.14(4656). This vulnerability affects the function formGetDiagnoseInfo. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263080. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
8.8
null
null
null
CVE-2017-3874
A vulnerability in the web framework of Cisco Unified Communications Manager (CallManager) could allow an authenticated, remote attacker to perform a cross-site scripting (XSS) attack. More Information: CSCvb70033. Known Affected Releases: 11.5(1.11007.2). Known Fixed Releases: 12.0(0.98000.507) 11.0(1.23900.5) 11.0(1.23900.3) 10.5(2.15900.2).
[ "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.11007.2\\):*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2022-21930
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
4.2
null
null
null
GHSA-ppxp-px5q-gwqm
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json.
[]
null
9.8
null
null
null
CVE-2024-41078
btrfs: qgroup: fix quota root leak after quota disable failure
In the Linux kernel, the following vulnerability has been resolved: btrfs: qgroup: fix quota root leak after quota disable failure If during the quota disable we fail when cleaning the quota tree or when deleting the root from the root tree, we jump to the 'out' label without ever dropping the reference on the quota root, resulting in a leak of the root since fs_info->quota_root is no longer pointing to the root (we have set it to NULL just before those steps). Fix this by always doing a btrfs_put_root() call under the 'out' label. This is a problem that exists since qgroups were first added in 2012 by commit bed92eae26cc ("Btrfs: qgroup implementation and prototypes"), but back then we missed a kfree on the quota root and free_extent_buffer() calls on its root and commit root nodes, since back then roots were not yet reference counted.
[]
null
null
null
null
null
CVE-2021-32076
Access Restriction bypass vulnerability via referrer spoof - Business Logic Bypass
Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the 'Web Help Desk Getting Started Wizard', especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback.
[ "cpe:2.3:a:solarwinds:web_help_desk:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2022-38138
The Triangle Microworks IEC 61850 Library (Any client or server using the C language library with a version number of 11.2.0 or earlier and any client or server using the C++, C#, or Java language library with a version number of 5.0.1 or earlier) and 60870-6 (ICCP/TASE.2) Library (Any client or server using a C++ language library with a version number of 4.4.3 or earlier) are vulnerable to access given to a small number of uninitialized pointers within their code. This could allow an attacker to target any client or server using the affected libraries to cause a denial-of-service condition.
[ "cpe:2.3:a:trianglemicroworks:iec_60870-6_software_library:-:*:*:*:*:*:*:*", "cpe:2.3:a:trianglemicroworks:iec_61850_software_library:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2003-0440
The (1) semi MIME library 1.14.5 and earlier, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
[ "cpe:2.3:a:semi:semi:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-cj6f-97f2-wp7j
An issue was discovered in PDF24 Creator 11.14.0. The configuration of the msi installer file was found to produce a visible cmd.exe window when using the repair function of msiexec.exe. This allows an unprivileged local attacker to use a chain of actions (e.g., an oplock on faxPrnInst.log) to open a SYSTEM cmd.exe.
[]
null
7.8
null
null
null
CVE-2021-35661
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-5398-f28q-m8pc
Stack-based buffer overflow in oninit in IBM Informix Dynamic Server Enterprise Edition 12.1 allows an authenticated user to execute predefined code with root privileges, such as escalating to a root shell. IBM X-Force ID: 144439.
[]
null
6.7
null
null
null
CVE-2011-0204
Heap-based buffer overflow in ImageIO in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image.
[ "cpe:2.3:a:apple:imageio:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
RHSA-2022:0460
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.1 ansible-runner security update
ansible-tower: Privilege escalation via job isolation escape
[ "cpe:/a:redhat:ansible_automation_platform:2.1::el8" ]
null
8.8
null
null
null
GHSA-5j4g-4xcj-q7jg
An improper access control vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows unauthorized users to alter the maximum size of storage groups and enable/disable the setting for the 'follow schedule' function.
[]
null
null
6.5
null
null
GHSA-2gw8-rmq5-c5gv
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the Cluster description of the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
[]
null
null
4.8
null
null
CVE-2001-0782
KDE ktvision 0.1.1-271 and earlier allows local attackers to gain root privileges via a symlink attack on a user configuration file.
[ "cpe:2.3:a:kde:ktv:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2023-6340
SonicWall Capture Client version 3.7.10, NetExtender client version 10.2.337 and earlier versions are installed with sfpmonitor.sys driver. The driver has been found to be vulnerable to Denial-of-Service (DoS) caused by Stack-based Buffer Overflow vulnerability.
[ "cpe:2.3:a:sonicwall:capture_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*" ]
null
5.5
null
null
null
CVE-2024-37637
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWizardCfg.
[ "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
ICSA-22-167-03
AutomationDirect DirectLOGIC with Ethernet
A specially crafted packet can be sent continuously to the PLC to prevent access from DirectSoft and other devices, causing a denial-of-service condition.CVE-2022-2004 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The product is vulnerable to a specifically crafted Ethernet packet that will cause the PLC to respond with the PLC password in cleartext. This could allow an attacker to access the system and make unauthorized changes.CVE-2022-2003 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
7.5
null
null
CVE-2021-41862
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).
[ "cpe:2.3:a:aviatorscript_project:aviatorscript:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-xvh7-cvv2-7h78
FontForge 20161012 is vulnerable to a heap-based buffer over-read in readttfcopyrights (parsettf.c) resulting in DoS or code execution via a crafted otf file.
[]
null
null
7.8
null
null
CVE-2019-17433
z-song laravel-admin 1.7.3 has XSS via the Slug or Name on the Roles screen, because of mishandling on the "Operation log" screen.
[ "cpe:2.3:a:laravel-admin:laravel-admin:1.7.3:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
CVE-2023-5982
The UpdraftPlus: WordPress Backup & Migration Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.23.10. This is due to a lack of nonce validation and insufficient validation of the instance_id on the 'updraftmethod-googledrive-auth' action used to update Google Drive remote storage location. This makes it possible for unauthenticated attackers to modify the Google Drive location that backups are sent to via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can make it possible for attackers to receive backups for a site which may contain sensitive information.
[ "cpe:2.3:a:updraftplus:updraftplus:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-4f3q-6cq7-8w4p
A Creation of Temporary File With Insecure Permissions vulnerability in hawk2 of SUSE Linux Enterprise High Availability 12-SP3, SUSE Linux Enterprise High Availability 12-SP5, SUSE Linux Enterprise High Availability 15-SP2 allows local attackers to escalate to root. This issue affects: SUSE Linux Enterprise High Availability 12-SP3 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 12-SP5 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 15-SP2 hawk2 versions prior to 2.6.3+git.1614684118.af555ad9.
[]
null
7.8
null
null
null
GHSA-3wqr-pcvr-hx5r
Sander Bos discovered Apport's lock file was in a world-writable director which allowed all users to prevent crash handling.
[]
null
null
null
null
null
CVE-2018-18963
Busca.aspx.cs in Degrau Publicidade e Internet Plataforma de E-commerce allows SQL Injection via the busca/ URI.
[ "cpe:2.3:a:degraupublicidade:degraupublicidade:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2017-5937
The util_format_is_pure_uint function in vrend_renderer.c in Virgil 3d project (aka virglrenderer) 0.6.0 and earlier allows local guest OS users to cause a denial of service (NULL pointer dereference) via a crafted VIRGL_CCMD_CLEAR command.
[ "cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*" ]
null
null
6.5
2.1
null
CVE-2022-28013
Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \admin\schedule_employee_edit.php.
[ "cpe:2.3:a:attendance_and_payroll_system_project:attendance_and_payroll_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-jmx2-8qx7-7pc4
The mjpeg_decode_app function in libavcodec/mjpegdec.c in FFMpeg before 2.1.6, 2.2.x through 2.3.x, and 2.4.x before 2.4.4 allows remote attackers to cause a denial of service (out-of-bounds heap access) and possibly have other unspecified impact via vectors related to LJIF tags in an MJPEG file.
[]
null
null
null
null
null