id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2016-4456
|
The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.
|
[
"cpe:2.3:a:gnu:gnutls:3.4.12:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-5jcx-pvq7-vfwp
|
An issue was discovered in GitLab Community and Enterprise Edition 11.10 through 12.2.1. Label descriptions are vulnerable to HTML injection.
|
[] | null | null | null | null | null |
|
CVE-2023-34923
|
XML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation.
|
[
"cpe:2.3:a:topdesk:topdesk:12.10.12:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-f7c3-7vp3-44p6
|
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5, when used as an OAuth 2.0 service provider. It mishandles a deny action for a redirection.
|
[] | null | null | null | null | null |
|
CVE-2007-5283
|
The TSC Domain Manager in Hitachi TPBroker Object Transaction Monitor and Cosminexus TPBroker Object Transaction Monitor 01-00 through 03-00 might allow attackers to cause a denial of service (crash) via invalid messages.
|
[
"cpe:2.3:a:hitachi:tpbroker_object_transaction_monitor:01_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:tpbroker_object_transaction_monitor:03_00:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-2w5g-v7f6-76vp
|
PHP remote file inclusion in main.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.
|
[] | null | null | null | null | null |
|
GHSA-fg6g-52rg-vr9q
|
Stored XSS vulnerability in Jenkins Static Analysis Utilities Plugin
|
Jenkins Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
|
[] | null | 5.4 | null | null | null |
RHSA-2008:0665
|
Red Hat Security Advisory: Updated kernel packages for Red Hat Enterprise Linux 4.7
|
UDF truncating issue kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-f632-g49p-9jqc
|
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root.This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-5383
|
lakernote EasyAdmin upload cross site scripting
|
A vulnerability classified as problematic has been found in lakernote EasyAdmin up to 20240324. This affects an unknown part of the file /sys/file/upload. The manipulation of the argument file leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 9c8a836ace17a93c45e5ad52a2340788b7795030. It is recommended to apply a patch to fix this issue. The identifier VDB-266301 was assigned to this vulnerability.
|
[] | 5.3 | 3.5 | 3.5 | 4 | null |
RHSA-2020:3308
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.2 security update
|
tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.3"
] | null | 7.5 | null | null | null |
GHSA-x4j2-cgw7-f7xv
|
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
|
[] | null | 9.8 | null | null | null |
|
CVE-2005-2349
|
Zoo 2.10 has Directory traversal
|
[
"cpe:2.3:a:zoo_project:zoo:2.10-27:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2009:0411
|
Red Hat Security Advisory: device-mapper-multipath security update
|
device-mapper-multipath: insecure permissions on multipathd.sock
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
RHSA-2018:1169
|
Red Hat Security Advisory: corosync security update
|
corosync: Integer overflow in exec/totemcrypto.c:authenticate_nss_2_3() function
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.5 | null | null |
CVE-2014-4446
|
Mail Service in Apple OS X Server before 4.0 does not enforce SACL changes until after a service restart, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging a change made by an administrator.
|
[
"cpe:2.3:o:apple:os_x_server:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2019-19306
|
The Zoho CRM Lead Magnet plugin 1.6.9.1 for WordPress allows XSS via module, EditShortcode, or LayoutName.
|
[
"cpe:2.3:a:zoho:lead_magnet:1.6.9.1:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2024-38309
|
There are multiple stack-based buffer overflow vulnerabilities in V-SFT (v6.2.2.0 and earlier), TELLUS (v4.0.19.0 and earlier), and TELLUS Lite (v4.0.19.0 and earlier).
If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed.
|
[
"cpe:2.3:a:fujielectric:v-sft:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fujielectric:tellus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fujielectric:tellus_lite:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-c835-vr4r-5hjm
|
pollit.cgi in Poll It 2.01 and earlier uses data files that are located under the web document root, which allows remote attackers to access sensitive or private information.
|
[] | null | null | null | null | null |
|
RHSA-2025:9102
|
Red Hat Security Advisory: RHOAI 2.21.0 - Red Hat OpenShift AI
|
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
|
[
"cpe:/a:redhat:openshift_ai:2.21::el9"
] | null | 5.4 | null | null | null |
RHSA-2012:1430
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: sfc: potential remote denial of service through TCP MSS option
|
[
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null | null |
RHSA-2020:5473
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: information exposure in drivers/char/random.c and kernel/time/timer.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.7 | null | null | null |
CVE-2024-43403
|
Kanister has a potential risk which can be leveraged to make a cluster-level privilege escalation
|
Kanister is a data protection workflow management tool. The kanister has a deployment called default-kanister-operator, which is bound with a ClusterRole called edit via ClusterRoleBinding. The "edit" ClusterRole is one of Kubernetes default-created ClusterRole, and it has the create/patch/udpate verbs of daemonset resources, create verb of serviceaccount/token resources, and impersonate verb of serviceaccounts resources. A malicious user can leverage access the worker node which has this component to make a cluster-level privilege escalation.
|
[
"cpe:2.3:a:kanisterio:kanister:0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
PYSEC-2015-3
| null |
The admin command in ceph-deploy before 1.5.25 uses world-readable permissions for /etc/ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.
|
[] | null | null | null | null | null |
GHSA-2mc4-f3f5-xmwp
|
A vulnerability was found in YFCMF up to 3.0.4. It has been rated as problematic. This issue affects some unknown processing of the file app/admin/controller/Ajax.php. The manipulation of the argument controllername leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230543.
|
[] | null | null | 4.3 | null | null |
|
CVE-2017-9377
|
A command injection was identified on Barco ClickShare Base Unit devices with CSM-1 firmware before 1.7.0.3 and CSC-1 firmware before 1.10.0.10. An attacker with access to the product's web API can exploit this vulnerability to completely compromise the vulnerable device.
|
[
"cpe:2.3:o:barco:clickshare_csm-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_csm-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:clickshare_csc-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_csc-1:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
CVE-2024-21197
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
GHSA-3vx3-xf6q-r5xp
|
Exposure of Resource to Wrong Sphere in Apache Tomcat
|
While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
|
[] | null | null | 9.1 | null | null |
CVE-2025-45767
|
jose v6.0.10 was discovered to contain weak encryption. NOTE: this is disputed by a third party because the claim of "do not meet recommended security standards" does not reflect guidance in a final publication.
|
[] | null | 7 | null | null | null |
|
RHSA-2022:0533
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 5.5 | null | null | null |
ICSA-22-333-05
|
Mitsubishi Electric FA Engineering Software
|
If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users can gain access to the CPU module and the OPC UA server module. If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view programs and project files or execute programs. If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view programs and project files or execute programs. If this vulnerability is exploited, unauthorized users could obtain information about the safety CPU module project file. If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could access the safety CPU module. If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view programs and project files or execute programs. If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view programs and project files or execute programs. If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could view programs and project files or execute programs. If this vulnerability is exploited, sensitive information could be tampered with or disclosed. As a result, information about project files could be obtained without permission by unauthorized users. If this vulnerability is exploited, sensitive information could be disclosed. As a result, unauthorized users could obtain information about the project file for the safety CPU module or the project file for MELSEC Q/FX/L series with security setting.
|
[] | null | null | 3.7 | null | null |
GHSA-mg25-cv3c-p76j
|
A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
|
[] | null | null | 7.8 | null | null |
|
GHSA-h934-f4m4-wc8x
|
Typo3 Information Disclosure in Page Tree
|
It has been discovered backend users not having read access to specific pages still could see them in the page tree which actually should be disallowed. A valid backend user account is needed in order to exploit this vulnerability.
|
[] | null | null | null | null | null |
GHSA-p3wm-5jfq-m55m
|
An issue was discovered in certain WSO2 products. A valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, aka Session Hijacking. This affects API Manager through 3.1.0, API Manager Analytics 2.5.0, IS as Key Manager through 5.10.0, Identity Server through 5.10.0, Identity Server Analytics through 5.6.0, and IoT Server 3.1.0.
|
[] | null | 8.8 | null | null | null |
|
CVE-2023-1419
|
Debezium: script injection via connector parameter
|
A script injection vulnerability was found in the Debezium database connector, where it does not properly sanitize some parameters. This flaw allows an attacker to send a malicious request to inject a parameter that may allow the viewing of unauthorized data.
|
[
"cpe:/a:redhat:debezium:2",
"cpe:/a:redhat:integration:1"
] | null | 5.9 | null | null | null |
GHSA-gjqc-j2jf-4gcm
|
emlog through 6.0.0beta has an arbitrary file deletion vulnerability via an admin/data.php?action=dell_all_bak request with directory traversal sequences in the bak[] parameter.
|
[] | null | 9.8 | null | null | null |
|
GHSA-p8f5-w48m-rr6p
|
Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
|
[] | null | null | null | null | null |
|
CVE-2021-47194
|
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
In the Linux kernel, the following vulnerability has been resolved:
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
If the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata->assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2014-4581
|
Cross-site scripting (XSS) vulnerability in facture.php in the WPCB plugin 2.4.8 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.
|
[
"cpe:2.3:a:wpcb_project:wpcb:*:-:-:*:-:wordpress:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-xjhx-x9fp-x5mx
|
Authentication Bypass by Spoofing vulnerability in Filipe Seabra WordPress Manutenção allows Functionality Bypass.This issue affects WordPress Manutenção: from n/a through 1.0.6.
|
[] | null | 3.7 | null | null | null |
|
GHSA-6672-57h5-f9rw
|
Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php.
|
[] | null | null | null | null | null |
|
CVE-2017-5936
|
OpenStack Nova-LXD before 13.1.1 uses the wrong name for the veth pairs when applying Neutron security group rules for instances, which allows remote attackers to bypass intended security restrictions.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:openstack:nova-lxd:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2024:3462
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send RHEL: Add Spectre-BHB mitigation for AmpereOne kernel: net: bridge: data races indata-races in br_handle_frame_finish()
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 4.7 | null | null | null |
GHSA-7w79-2w84-7wvc
|
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
|
[] | null | null | null | null | null |
|
CVE-2018-13103
|
OX App Suite 7.8.4 and earlier allows SSRF.
|
[
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 5.5 | null |
|
CVE-2020-11847
|
Vulnerability in sshrelay in privileged access manager provides full system access.
|
SSH authenticated user when access the PAM server can execute an OS command to gain the full system access using bash. This issue affects Privileged Access Manager before 3.7.0.1.
|
[
"cpe:2.3:a:opentext:privileged_access_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_privileged_access_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:netiq_privileged_access_manager:3.7:-:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
GHSA-c32x-wpfc-fr3r
|
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-9388
|
Scada-LTS watch_list.shtm cross site scripting
|
A vulnerability was determined in Scada-LTS up to 2.7.8.1. This impacts an unknown function of the file watch_list.shtm. Executing manipulation of the argument Name can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
|
[] | 5.1 | 3.5 | 3.5 | 4 | null |
CVE-2024-20145
|
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040.
|
[] | null | 6.6 | null | null | null |
|
GHSA-mhmg-w75c-4vrr
|
SQL injection vulnerability in action.php in Nucleus CMS 3.01 allows remote attackers to execute arbitrary SQL statements via the itemid parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-49464
|
libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci.
|
[
"cpe:2.3:a:struktur:libheif:1.17.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2025-23084
|
A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.
On Windows, a path that does not start with the file separator is treated as relative to the current directory.
This vulnerability affects Windows users of `path.join` API.
|
[] | null | null | 5.6 | null | null |
|
GHSA-c2vf-6g7v-8m6c
|
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.Users are recommended to upgrade to version 2.4.64, which fixes the issue.
|
[] | null | 7.5 | null | null | null |
|
GHSA-hh2w-p6rv-4g7w
|
Microsoft Security Advisory CVE-2024-30105 | .NET Denial of Service Vulnerability
|
Microsoft Security Advisory CVE-2024-30105 | .NET Denial of Service Vulnerability<a name="executive-summary"></a>Executive summaryMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.A vulnerability exists in .NET when calling the JsonSerializer.DeserializeAsyncEnumerable method against an untrusted input using System.Text.Json may result in Denial of Service.DiscussionDiscussion for this issue can be found at https://github.com/dotnet/runtime/issues/104619<a name="mitigation-factors"></a>Mitigation factorsMicrosoft has not identified any mitigating factors for this vulnerability.<a name="affected-software"></a>Affected softwareAny .NET 8.0 application running on .NET 8.0.6 or earlier.<a name="affected-packages"></a>Affected PackagesThe vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below<a name=".NET 8"></a>.NET 8Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Text.Json](https://www.nuget.org/packages/System.Text.Json) | >= 7.0.0, < =8.0.3 | 8.0.4Advisory FAQ<a name="how-affected"></a>How do I know if I am affected?If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-packages) or [affected packages](#affected-software), you're exposed to the vulnerability.<a name="how-fix"></a>How do I fix the issue?To fix the issue please install the latest version of .NET 8.0 . If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;If you're using .NET 8.0, you should download and install .NET 8.0.7 Runtime or .NET 8.0.107 SDK (for Visual Studio 2022 v17.8) from https://dotnet.microsoft.com/download/dotnet-core/8.0..NET 8.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.Other InformationReporting Security IssuesIf you have found a potential security issue in .NET 8.0 or .NET 7.0 or .NET 6.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.SupportYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.DisclaimerThe information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.External Links[CVE-2024-30105]( https://www.cve.org/CVERecord?id=CVE-2024-30105)RevisionsV1.0 (July 09, 2024): Advisory published._Version 1.0__Last Updated 2024-07-09_
|
[] | 8.7 | 7.5 | null | null | null |
CVE-2021-0073
|
Insufficient control flow management in Intel(R) DSA before version 20.11.50.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-3f5r-wqg2-6x74
|
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the JavaScript API related to color conversion. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
|
[] | null | null | 8.8 | null | null |
|
GHSA-2gq8-953m-fqr3
|
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
|
[] | null | null | 5.5 | null | null |
|
CVE-2021-3703
|
It was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless 1.16.0 and Serverless client kn 1.16.0. These have been fixed with Serverless 1.17.0.
|
[
"cpe:2.3:a:redhat:openshift_serverless:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-xg8r-6fgf-crxr
|
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13190.
|
[] | null | null | null | null | null |
|
CVE-2021-27984
|
In Pluck-4.7.15 admin background a remote command execution vulnerability exists when uploading files.
|
[
"cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*"
] | null | 8.1 | null | 7.5 | null |
|
GHSA-h2q9-p4wq-924f
|
Directory traversal vulnerability in pdmwService.exe in SolidWorks Workgroup PDM 2014 allows remote attackers to write to arbitrary files via a .. (dot dot) in the filename in a file upload.
|
[] | null | null | null | null | null |
|
GHSA-2q2v-7x59-8w6v
|
In the Linux kernel, the following vulnerability has been resolved:nfp: flower: handle acti_netdevs allocation failureThe kmalloc_array() in nfp_fl_lag_do_work() will return null, if
the physical memory has run out. As a result, if we dereference
the acti_netdevs, the null pointer dereference bugs will happen.This patch adds a check to judge whether allocation failure occurs.
If it happens, the delayed work will be rescheduled and try again.
|
[] | null | 5.5 | null | null | null |
|
CVE-2019-10654
|
The lzo1x_decompress function in liblzo2.so.2 in LZO 2.10, as used in Long Range Zip (aka lrzip) 0.631, allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted archive, a different vulnerability than CVE-2017-8845.
|
[
"cpe:2.3:a:long_range_zip_project:long_range_zip:0.631:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-ppr7-4hv8-j939
|
An improper authorization check of local device settings in TeamViewer Remote between version 15.41 and 15.42.7 for Windows and macOS allows an unprivileged user to change basic local device settings even though the options were locked. This can result in unwanted changes to the configuration.
|
[] | null | 6.6 | null | null | null |
|
GHSA-6mh4-v7fh-gj6x
|
Untrusted search path vulnerability in 7 Zip for Windows 16.02 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[] | null | null | 7.8 | null | null |
|
GHSA-99qm-767f-jq9q
|
Open redirect vulnerability in an unspecified web application in Siemens WinCC 7.0 SP3 before Update 2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a GET request.
|
[] | null | null | null | null | null |
|
CVE-2023-42547
|
Use of implicit intent for sensitive communication vulnerability in startEmailValidationActivity in Samsung Account prior to version 14.5.00.7 allows attackers to access arbitrary file with Samsung Account privilege.
|
[
"cpe:2.3:a:samsung:account:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
cisco-sa-asaftd-fileup-dos-zvC7wtys
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services File Upload Denial of Service Vulnerability
|
Update from October 22nd, 2020: Cisco has become aware of a new Cisco Adaptive Security Appliance vulnerability that could affect the fixed releases recommended for code trains 9.13 and 9.14 in the Fixed Software ["#fs"] section of this advisory. See the Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy"] for additional information.
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to upload arbitrary-sized files to specific folders on an affected device, which could lead to an unexpected device reload.
The vulnerability exists because the affected software does not efficiently handle the writing of large files to specific folders on the local file system. An attacker could exploit this vulnerability by uploading files to those specific folders. A successful exploit could allow the attacker to write a file that triggers a watchdog timeout, which would cause the device to unexpectedly reload, causing a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 17 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74302"].
|
[] | null | null | 8.6 | null | null |
GHSA-2xw4-7mq9-jfcm
|
An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.
|
[] | null | 8.2 | null | null | null |
|
RHSA-2020:3010
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: kvm: Information leak within a KVM guest kernel: use-after-free in sound/core/timer.c kernel: kernel: DAX hugepages not considered during mremap kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null | null |
CVE-2018-4275
|
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | 8.6 | 6.8 | null |
|
GHSA-wxm4-9f8p-gggv
|
Flowise Cross-site Scripting in/api/v1/credentials/id
|
Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `/api/v1/credentials/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available.
|
[] | 5.3 | 6.1 | null | null | null |
GHSA-cphr-3j6j-hwcv
|
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6) and Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
|
[] | null | 9.6 | null | null | null |
|
GHSA-cp47-gcrh-fx43
|
Vulnerability in the Oracle Integrated Lights Out Manager (ILOM) component of Oracle Sun Systems Products Suite (subcomponent: System Management). The supported version that is affected is Prior to 3.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Integrated Lights Out Manager (ILOM). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Integrated Lights Out Manager (ILOM). CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
|
GHSA-w358-hq9x-mwxh
|
In Universal Media Server (UMS) 7.1.0, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Remote, unauthenticated attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running UMS, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack to cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
|
[] | null | null | 9.8 | null | null |
|
GHSA-fvwj-m5w2-xrx6
|
Cross Site Scripting vulnerability in Service Provider Management System v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the firstname, middlename and lastname parameters in the /php-spms/admin/?page=user endpoint.
|
[] | null | 5.4 | null | null | null |
|
CVE-2025-3099
|
Advanced Search by My Solr Server <= 2.0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting
|
The Advanced Search by My Solr Server plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.5. This is due to missing or incorrect nonce validation on the 'MySolrServerSettings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2021-24663
|
Simple School Staff Directory <= 1.1 - Admin+ Arbitrary File Upload
|
The Simple Schools Staff Directory WordPress plugin through 1.1 does not validate uploaded logo pictures to ensure that are indeed images, allowing high privilege users such as admin to upload arbitrary file like PHP, leading to RCE
|
[
"cpe:2.3:a:simple_schools_staff_directory_project:simple_schools_staff_directory:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 | null |
GHSA-5mxf-42f5-j782
|
Grafana's users with permissions to create a data source can CRUD all data sources
|
A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *.
Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
|
[] | 7 | 6 | null | null | null |
GHSA-9rg5-49f6-x8mf
|
RealVNC 4.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of connections to port 5900.
|
[] | null | null | null | null | null |
|
GHSA-7g9q-ww3r-j77g
|
In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces
|
[] | null | 8.3 | null | null | null |
|
CVE-2022-26930
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2025-0149
|
Zoom Apps - Insufficient Verification of Data Authenticity
|
Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access.
|
[] | null | 6.5 | null | null | null |
GHSA-pjf2-268r-g6x9
|
Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. Parsing the content of emails where HTML code is copied from Microsoft Word could lead to high CPU usage and block the parsing process.
|
[] | null | 7.5 | null | null | null |
|
CVE-2011-2769
|
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.
|
[
"cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2020-13657
|
An elevation of privilege vulnerability exists in Avast Free Antivirus and AVG AntiVirus Free before 20.4 due to improperly handling hard links. The vulnerability allows local users to take control of arbitrary files.
|
[
"cpe:2.3:a:avast:avg_antivirus:*:*:*:*:free:*:*:*",
"cpe:2.3:a:avast:free_antivirus:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2021-25396
|
An improper input validation vulnerability in NPU firmware prior to SMR MAY-2021 Release 1 allows arbitrary memory write and code execution.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_9830:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-32pq-c6vh-9cq5
|
Memory corruption in Audio while running concurrent tunnel playback or during concurrent audio tunnel recording sessions.
|
[] | null | 8.4 | null | null | null |
|
GHSA-23cg-3343-mmvh
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile MDM9625, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 810, SD 820, and SD 820A, untrusted pointer dereference in QSEE Syscall without proper validation can lead to access of blacklisted memory.
|
[] | null | null | 9.8 | null | null |
|
RHSA-2024:6611
|
Red Hat Security Advisory: fence-agents security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 8.8 | null | null | null |
GHSA-gx5x-gf3p-pr98
|
The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.
|
[] | null | null | 6.5 | null | null |
|
GHSA-7783-6q32-p3qm
|
SQL injection vulnerability in Techno Dreams Guest Book script allows remote attackers to execute arbitrary SQL commands and bypass authentication via the userid parameter in admin/login.asp.
|
[] | null | null | null | null | null |
|
CVE-2020-35712
|
Esri ArcGIS Server before 10.8 is vulnerable to SSRF in some configurations.
|
[
"cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 9.3 | null |
|
CVE-2024-43297
|
WordPress Clone plugin <= 2.4.5 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.4.5.
|
[
"cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-99p4-7rf3-p26q
|
An information disclosure vulnerability in Totolink A830R V4.1.2cu.5182 allows attackers to obtain the root password via a brute-force attack.
|
[] | null | 5.5 | null | null | null |
|
CVE-2016-4566
|
Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:plupload:plupload:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-p593-3hwx-qcvm
|
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427.
|
[] | null | null | null | null | null |
|
GHSA-r3m5-v6wj-p838
|
IBM AIX 7.2, 7.3, VIOS 3.1, and 4.1could allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service.
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-42492
|
EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key
|
EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key
|
[
"cpe:2.3:a:busbaer:eisbaer_scada:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
GHSA-2c5j-c3wx-m67f
|
Cloud Foundry Garden-Linux versions prior to v0.333.0 and Elastic Runtime 1.6.x version prior to 1.6.17 contain a flaw in managing container files during Docker image preparation that could be used to delete, corrupt or overwrite host files and directories, including other container filesystems on the host.
|
[] | null | 9.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.