id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-wc2j-86rx-j339
|
TOTOLINK EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution on the cstecgi.cgi NTPSyncWithHost interface.
|
[] | null | 9.8 | null | null | null |
|
CVE-2015-6265
|
The CLI in Cisco Application Control Engine (ACE) 4700 A5 3.0 and earlier allows local users to bypass intended access restrictions, and read or write to files, by entering an unspecified CLI command with a crafted file as this command's input, aka Bug ID CSCur23662.
|
[
"cpe:2.3:h:cisco:application_control_engine_4700:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-xcp9-f3w5-gqqw
|
The authentication token required to execute NSDP write requests on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices is not properly invalidated and can be reused until a new token is generated, which allows attackers (with access to network traffic) to effectively gain administrative privileges.
|
[] | null | null | null | null | null |
|
GHSA-94xv-rp86-287j
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-23942
|
MB connect line: Configuration File on the client workstation is not encrypted
|
A local user may find a configuration file on the client workstation with unencrypted sensitive data. This allows an attacker to impersonate the device or prevent the device from accessing the cloud portal which leads to a DoS.
|
[] | null | 7.1 | null | null | null |
CVE-2008-1294
|
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
|
[
"cpe:2.3:o:linux:linux_kernel:*:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2021-3278
|
Local Service Search Engine Management System 1.0 has a vulnerability through authentication bypass using SQL injection . Using this vulnerability, an attacker can bypass the login page.
|
[
"cpe:2.3:a:local_services_search_engine_management_system_project:local_services_search_engine_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-vw9p-6xj9-jc99
|
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to macOS Mojave 10.14.
|
[] | null | null | 7.8 | null | null |
|
GHSA-ph7v-w9mv-mxjq
|
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality and integrity via vectors related to UIF Open UI.
|
[] | null | null | 5.4 | null | null |
|
cisco-sa-fmc-xxe-MzPC4bYd
|
Cisco Firepower Management Center Software XML External Entity Injection Vulnerability
|
A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information.
This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838"].
|
[] | null | 4.3 | null | null | null |
CVE-2021-43395
|
An issue was discovered in illumos before f859e7171bb5db34321e45585839c6c3200ebb90, OmniOS Community Edition r151038, OpenIndiana Hipster 2021.04, and SmartOS 20210923. A local unprivileged user can cause a deadlock and kernel panic via crafted rename and rmdir calls on tmpfs filesystems. Oracle Solaris 10 and 11 is also affected.
|
[
"cpe:2.3:o:illumos:illumos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:omniosce:omnios:r151038:*:*:*:community:*:*:*",
"cpe:2.3:o:openindiana:openindiana:hipster_2021.04:*:*:*:*:*:*:*",
"cpe:2.3:o:joyent:smartos:20210923:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
RHSA-2020:1185
|
Red Hat Security Advisory: libsndfile security update
|
libsndfile: stack-based buffer overflow in sndfile-deinterleave utility
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null | null |
CVE-2011-2731
|
Race condition in the RunAsManager mechanism in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 stores the Authentication object in the shared security context, which allows attackers to gain privileges via a crafted thread.
|
[
"cpe:2.3:a:vmware:springsource_spring_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:springsource_spring_security:3.0.4:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
cisco-sa-20190313-sip
|
Cisco Small Business SPA514G IP Phones SIP Denial of Service Vulnerability
|
A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition.
The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-sip ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-sip"]
|
[] | null | null | 7.5 | null | null |
CVE-2021-24285
|
Car Seller - Auto Classifieds Script <= 2.1.0 - Unauthenticated SQL Injection
|
The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue.
|
[
"cpe:2.3:a:cars-seller-auto-classifieds-script_project:cars-seller-auto-classifieds-script:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 | null |
CVE-2019-13152
|
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the IP Address in Add Gaming Rule.
|
[
"cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2021-24545
|
WP HTML Author Bio <= 1.2.0 - Author+ Stored Cross-Site Scripting
|
The WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.
|
[
"cpe:2.3:a:wp_html_author_bio_project:wp_html_author_bio:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null |
CVE-2023-48529
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2007-3499
|
SlackRoll before 8 accepts gpg exit codes other than 0 and 1 as evidence of a valid signature, which allows remote Slackware mirror sites or man-in-the-middle attackers to cause a denial of service (data inconsistency) or possibly install Trojan horse packages via malformed gpg signatures.
|
[
"cpe:2.3:a:slackroll:slackroll:7:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-m4jg-hxh8-hp87
|
Huawei Honor V10 smartphones versions earlier than Berkeley-AL20 9.0.0.125(C00E125R2P14T8) have an authorization bypass vulnerability. Due to improper authorization implementation logic, attackers can bypass certain authorization scopes of smart phones by performing specific operations. This vulnerability can be exploited to perform operations beyond the scope of authorization.
|
[] | null | null | 6.4 | null | null |
|
CVE-2024-6276
|
lahirudanushka School Management System Teacher Page teacher.php sql injection
|
A vulnerability, which was classified as critical, has been found in lahirudanushka School Management System 1.0.0/1.0.1. This issue affects some unknown processing of the file teacher.php of the component Teacher Page. The manipulation of the argument update leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269489 was assigned to this vulnerability.
|
[
"cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*"
] | 5.1 | 4.7 | 4.7 | 5.8 | null |
GHSA-fxqv-9rmw-4376
|
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085.
|
[] | null | null | null | null | null |
|
GHSA-wj8c-rxgm-9jcm
|
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerability, an attacker would need write access to the repository. This vulnerability was reported via the GitHub Bug Bounty Program https://bounty.github.com/ .
|
[] | null | 4.8 | null | null | null |
|
GHSA-3mxq-jvx5-cj48
|
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
|
[] | null | 8 | null | null | null |
|
GHSA-8r58-88c9-cfv7
|
Nextcloud Server before 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from Stored XSS in CardDAV image export. The CardDAV image export functionality as implemented in Nextcloud/ownCloud allows the download of images stored within a vCard. Due to not performing any kind of verification on the image content this is prone to a stored Cross-Site Scripting attack.
|
[] | null | null | 5.4 | null | null |
|
GHSA-p2p2-xpg4-rpvh
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
ICSA-17-094-05
|
Rockwell Automation ControlLogix 5580 and CompactLogix 5380
|
This vulnerability may allow an attacker to cause a denial of service condition by sending a series of specific CIP-based commands to the controller.CVE-2017-6024 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H).
|
[] | null | null | 6.8 | null | null |
GHSA-pjjv-rrqv-5pph
|
Buffer overflow in LeapFTP 2.7.3.600 allows remote FTP servers to execute arbitrary code via a long IP address response to a PASV request.
|
[] | null | null | null | null | null |
|
GHSA-vj42-xq3r-hr3r
|
Out-of-bounds reads in Pillow
|
In `libImaging/Jpeg2KDecode.c` in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file.
|
[] | 7.1 | 5.5 | null | null | null |
GHSA-x452-h4mp-43c7
|
The ff_sbr_apply function in libavcodec/aacsbr.c in FFmpeg before 2.7.2 does not check for a matching AAC frame syntax element before proceeding with Spectral Band Replication calculations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted AAC data.
|
[] | null | null | null | null | null |
|
CVE-2024-45546
|
Buffer Over-read in WLAN Windows Host
|
Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space.
|
[
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2024-0032
|
In queryChildDocuments of FileSystemProvider.java, there is a possible way to request access to directories that should be hidden due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.
|
[
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12l:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
GHSA-97fg-5ggq-j35p
|
IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236441.
|
[] | null | 4.8 | null | null | null |
|
RHSA-2024:4209
|
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
|
389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr) 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request
|
[
"cpe:/a:redhat:directory_server:11.8::el8"
] | null | 7.5 | null | null | null |
RHSA-2010:0291
|
Red Hat Security Advisory: gfs-kmod security, bug fix and enhancement update
|
kernel: bug in GFS/GFS2 locking code leads to dos
|
[
"cpe:/a:redhat:rhel_cluster_storage:5"
] | null | null | null | null | null |
CVE-2023-0374
|
W4 Post List < 2.4.6 - Contributor+ Stored XSS
|
The W4 Post List WordPress plugin before 2.4.6 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[
"cpe:2.3:a:w4_post_list_project:w4_post_list:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-354h-hfgh-65p8
|
Cross-site scripting (XSS) vulnerability in IBM Lotus Mobile Connect (LMC) 6.1.4 allows remote attackers to inject arbitrary web script or HTML via vectors related to a hidden redirect URL.
|
[] | null | null | null | null | null |
|
GHSA-785h-hrf7-gqxc
|
Docker Notary Signature Algorithm Not Matched to Key vulnerability
|
In Docker Notary before 0.1, gotuf/signed/verify.go has a Signature Algorithm Not Matched to Key vulnerability. Because an attacker controls the field specifying the signature algorithm, they might (for example) be able to forge a signature by forcing a misinterpretation of an RSA-PSS key as Ed25519 elliptic-curve data.
|
[] | null | null | 7.5 | null | null |
CVE-2010-3837
|
MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
|
[
"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2014-7317
|
The Aloha Bail Bonds (aka com.onesolutionapps.alohabailbondsandroid) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:onesolutionapps:aloha_bail_bonds:1.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-qmmh-79gf-864m
|
The JavaScript engine in Opera before 11.60 does not properly implement the in operator, which allows remote attackers to bypass the Same Origin Policy via vectors related to variables on different web sites.
|
[] | null | null | null | null | null |
|
GHSA-55qq-x3mf-mhr9
|
In JetBrains TeamCity before 2023.05 bypass of permission checks allowing to perform admin actions was possible
|
[] | null | 9.1 | null | null | null |
|
CVE-2022-34805
|
Jenkins Skype notifier Plugin 1.1.0 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
|
[
"cpe:2.3:a:jenkins:skype_notifier:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-552f-97wf-pmpq
|
Umbraco possible user enumeration
|
ImpactA user enumeration attack is possible.Affected versionsUmbraco 10 with access to the native login screenPatchesThis is fixed in 10.8.5WorkaroundsDisabling the native login screen, by exclusively use external logins.
|
[] | null | 3.7 | null | null | null |
CVE-2016-5065
|
Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 allow Embedded_Ace_Set_Task.cgi command injection.
|
[
"cpe:2.3:o:sierrawireless:aleos_firmware:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:gx_440:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-j2ch-c7pg-phcj
|
The Powerkit – Supercharge your WordPress Site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 2.9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
RHSA-2024:5410
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 OpenShift Jenkins security update
|
jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE
|
[
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 8.8 | null | null | null |
CVE-2001-1538
|
SpeedXess HA-120 DSL router has a default administrative password of "speedxess", which allows remote attackers to gain access.
|
[
"cpe:2.3:h:speedxess:ha-120_dsl_router:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8v3r-gw3g-qx4m
|
An issue was discovered in TopManage OLK 2020. As there is no ReadOnly on the Session cookie, the user and admin accounts can be taken over in a DOM-Based XSS attack.
|
[] | null | null | null | null | null |
|
GHSA-g25f-g39h-p93r
|
A stack-based buffer overflow can occur in fastboot from all Android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the Linux kernel.
|
[] | null | null | 7.8 | null | null |
|
GHSA-wm23-vmw2-c7v3
|
Tenda AC6 v15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetFirewallCfg function via the firewallEn parameter.
|
[] | null | 7.5 | null | null | null |
|
GHSA-8526-rr9p-cjrw
|
Adobe RoboHelp has a cross-site scripting (XSS) vulnerability. This affects versions before RH12.0.4.460 and RH2017 before RH2017.0.2.
|
[] | null | null | 6.1 | null | null |
|
GHSA-4g54-95xv-f353
|
http-proxy.js is malware
|
The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationAs this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.If you have found this installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
[] | null | null | 7.5 | null | null |
GHSA-3rmx-2chr-mp38
|
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
|
[] | null | null | 9.8 | null | null |
|
CVE-2018-11642
|
Incorrect Permission Assignment on the /var/www/xms/cleanzip.sh shell script run periodically in Dialogic PowerMedia XMS through 3.5 allows local users to execute code as the root user.
|
[
"cpe:2.3:a:dialogic:powermedia_xms:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
RHSA-2012:1265
|
Red Hat Security Advisory: libxslt security update
|
libxslt: Heap address leak in XLST libxslt: Out-of-bounds read when parsing certain patterns libxslt: DoS when reading unexpected DTD nodes in XSLT libxslt: Use-after-free when processing an invalid XPath expression libxslt: Heap-buffer overflow caused by bad cast in XSL transforms libxslt: Heap-double-free in xmlFreeNodeList
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-c2qv-xq3w-c77m
|
The MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions.
|
[] | null | null | 9.8 | null | null |
|
CVE-2018-7840
|
A Uncontrolled Search Path Element (CWE-427) vulnerability exists in VideoXpert OpsCenter versions prior to 3.1 which could allow an attacker to cause the system to call an incorrect DLL.
|
[
"cpe:2.3:a:pelco:videoxpert_opscenter:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2024-8227
|
Tenda O1 DhcpSetSer fromDhcpSetSer stack-based overflow
|
A vulnerability was found in Tenda O1 1.0.0.7(10648) and classified as critical. Affected by this issue is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:tenda:o1_firmware:1.0.0.7\\(10648\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:o1:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 | null |
CVE-2022-4613
|
Click Studios Passwordstate Browser Extension Provisioning improper authorization
|
A vulnerability was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as critical. This issue affects some unknown processing of the component Browser Extension Provisioning. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216275.
|
[
"cpe:2.3:a:clickstudios:passwordstate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9500:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9512:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9519:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9531:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9533:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9535:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9583:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5.8.4:*:*:*:*:chrome:*:*"
] | null | 5 | null | null | null |
CVE-2011-2184
|
The key_replace_session_keyring function in security/keys/process_keys.c in the Linux kernel before 2.6.39.1 does not initialize a certain structure member, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function, a different vulnerability than CVE-2010-2960.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-7hx3-c6gv-rvgg
|
The implementation of SYN cookies (syncookies) in FreeBSD 4.5 through 5.0-RELEASE-p3 uses only 32-bit internal keys when generating syncookies, which makes it easier for remote attackers to conduct brute force ISN guessing attacks and spoof legitimate traffic.
|
[] | null | null | null | null | null |
|
CVE-2023-45192
|
IBM Engineering Requirements Management DOORS Next XML external entity injection
|
IBM Engineering Requirements Management DOORS Next 7.0.2 and 7.0.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 268758.
|
[
"cpe:2.3:a:ibm:engineering_requirements_management_doors_next:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_requirements_management_doors_next:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:doors_next:7.0.3:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
CVE-2021-42087
|
An issue was discovered in Zammad before 4.1.1. An admin can discover the application secret via the API.
|
[
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
CVE-2021-22901
|
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.
|
[
"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 | null |
|
CVE-2015-3352
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the Jammer module before 6.x-1.8 and 7.x-1.x before 7.x-1.4 for Drupal allow remote attackers to hijack the authentication of administrators for requests that delete a setting for (1) hidden form elements or (2) status messages via unspecified vectors, related to "report administration."
|
[
"cpe:2.3:a:jammer_project:jammer:*:*:*:*:*:drupal:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-r68r-w4gj-642m
|
The Calendar_plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of `$_SERVER['PHP_SELF']` in the ~/calendar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
|
[] | null | null | null | null | null |
|
GHSA-9hxg-q3r4-6h4w
|
Cross-site request forgery (CSRF) vulnerability in the Insight module in Aruba Networks ClearPass before 6.3.6 and 6.4.x before 6.4.1 allows remote attackers to hijack the authentication of a logged in user via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-4rpx-g82q-hvhm
|
SROS 2 0.8.1 (after CVE-2019-19625 is mitigated) leaks ROS 2 node-related information regardless of the rtps_protection_kind configuration. (SROS2 provides the tools to generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2.)
|
[] | null | 5.3 | null | null | null |
|
GHSA-gf44-5pfx-c922
|
The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
|
[] | null | null | null | null | null |
|
CVE-2017-16844
|
Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618.
|
[
"cpe:2.3:a:procmail:procmail:3.22:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2021-45971
|
An issue was discovered in SdHostDriver in Insyde InsydeH2O with kernel 5.1 before 05.16.25, 5.2 before 05.26.25, 5.3 before 05.35.25, 5.4 before 05.43.25, and 5.5 before 05.51.25. A vulnerability exists in the SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer (CommBufferData).
|
[
"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | 7.2 | null |
|
GHSA-8c46-752x-j848
|
A vulnerability was found in PHPGurukul Car Washing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/editcar-washpoint.php. The manipulation of the argument wpid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2 | 4.7 | null | null | null |
|
CVE-2023-5168
|
A compromised content process could have provided malicious data to `FilterNodeD2D1` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.
*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-jxfr-4vcf-h5vv
|
Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
|
[] | null | null | null | null | null |
|
RHSA-2021:0599
|
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
|
389-ds-base: information disclosure during the binding of a DN
|
[
"cpe:/a:redhat:directory_server:11.1::el8"
] | null | 5.3 | null | null | null |
GHSA-xh73-ww8f-499f
|
Transient DOS during music playback of ALAC content.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2020:2289
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.9 | 8 | null | null |
GHSA-gcmg-mgh2-gvc3
|
In the Linux kernel, the following vulnerability has been resolved:ext4: add reserved GDT blocks checkWe capture a NULL pointer issue when resizing a corrupt ext4 image which
is freshly clear resize_inode feature (not run e2fsck). It could be
simply reproduced by following steps. The problem is because of the
resize_inode feature was cleared, and it will convert the filesystem to
meta_bg mode in ext4_resize_fs(), but the es->s_reserved_gdt_blocks was
not reduced to zero, so could we mistakenly call reserve_backup_gdb()
and passing an uninitialized resize_inode to it when adding new group
descriptors.mkfs.ext4 /dev/sda 3G
tune2fs -O ^resize_inode /dev/sda #forget to run requested e2fsck
mount /dev/sda /mnt
resize2fs /dev/sda 8G========
BUG: kernel NULL pointer dereference, address: 0000000000000028
CPU: 19 PID: 3243 Comm: resize2fs Not tainted 5.18.0-rc7-00001-gfde086c5ebfd #748
...
RIP: 0010:ext4_flex_group_add+0xe08/0x2570
...
Call Trace:
<TASK>
ext4_resize_fs+0xbec/0x1660
__ext4_ioctl+0x1749/0x24e0
ext4_ioctl+0x12/0x20
__x64_sys_ioctl+0xa6/0x110
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f2dd739617bThe fix is simple, add a check in ext4_resize_begin() to make sure that
the es->s_reserved_gdt_blocks is zero when the resize_inode feature is
disabled.
|
[] | null | 5.5 | null | null | null |
|
GHSA-xfrf-fhfw-cw7h
|
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Link Properties Handling Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-36w2-wp3m-gg7j
|
The transferFrom function of a smart contract implementation for FuturXE (FXE), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized transfer of digital assets because of a logic error. The developer messed up with the boolean judgment - if the input value is smaller than or equal to allowed value, the transfer session would stop execution by returning false. This makes no sense, because the transferFrom() function should require the transferring value to not exceed the allowed value in the first place. Suppose this function asks for the allowed value to be smaller than the input. Then, the attacker could easily ignore the allowance: after this condition, the `allowed[from][msg.sender] -= value;` would cause an underflow because the allowed part is smaller than the value. The attacker could transfer any amount of FuturXe tokens of any accounts to an appointed account (the `_to` address) because the allowed value is initialized to 0, and the attacker could bypass this restriction even without the victim's private key.
|
[] | null | null | 7.5 | null | null |
|
PYSEC-2022-79
| null |
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is guarded by a `DCHECK`. However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the dereferencing of the null pointer, whereas in the second case it results in a crash due to the assertion failure. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
GHSA-8m9x-pxwq-j236
|
Pillow command injection
|
Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.5.0 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py.
|
[] | 9.3 | 9.8 | null | null | null |
GHSA-f9rc-g2vv-h5f9
|
Buffer overflow in Netscape Navigator/Communicator 4.7 for Windows 95 and Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument after the ? character in a URL that references an .asp, .cgi, .html, or .pl file.
|
[] | null | null | null | null | null |
|
CVE-2023-20012
|
Cisco Nexus 9300-FX3 Series Fabric Extender for UCS Fabric Interconnects Authentication Bypass Vulnerability
|
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
|
[
"cpe:2.3:o:cisco:nexus_93180yc-fx3s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nexus_93180yc-fx3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_central_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ucs_6536_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6536:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ucs_64108_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ucs_6454_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-fvjc-j5cj-ghc3
|
An issue was discovered in 74cms v4.2.111. It allows remote authenticated users to read or modify arbitrary resumes by changing a job-search intention, as demonstrated by the index.php?c=Personal&a=ajax_save_basic pid parameter.
|
[] | null | null | 8.1 | null | null |
|
CVE-2025-50581
|
MRCMS v3.1.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/group/save.do.
|
[] | null | 4.8 | null | null | null |
|
GHSA-pvf7-pgpm-3q43
|
In the Linux kernel, the following vulnerability has been resolved:PM / devfreq: Fix buffer overflow in trans_stat_showFix buffer overflow in trans_stat_show().Convert simple snprintf to the more secure scnprintf with size of
PAGE_SIZE.Add condition checking if we are exceeding PAGE_SIZE and exit early from
loop. Also add at the end a warning that we exceeded PAGE_SIZE and that
stats is disabled.Return -EFBIG in the case where we don't have enough space to write the
full transition table.Also document in the ABI that this function can return -EFBIG error.
|
[] | null | 7.8 | null | null | null |
|
GHSA-qr32-x399-q68j
|
Vulnerability in Easy2map-photos WordPress Plugin v1.09 MapPinImageUpload.php and MapPinIconSave.php allows path traversal when specifying file names creating files outside of the upload directory.
|
[] | null | null | 7.5 | null | null |
|
CVE-2025-31497
|
TEIGarage XML External Entity (XXE) Injection in Document Conversion Service
|
TEIGarage is a webservice and RESTful service to transform, convert and validate various formats, focussing on the TEI format. The Document Conversion Service contains a critical XML External Entity (XXE) Injection vulnerability in its document conversion functionality. The service processes XML files during the conversion process but fails to disable external entity processing, allowing an attacker to read arbitrary files from the server's filesystem. This vulnerability could allow attackers to read sensitive files from the server's filesystem, potentially exposing configuration files, credentials, or other confidential information. Additionally, depending on the server configuration, this could potentially be used to perform server-side request forgery (SSRF) attacks by making the server connect to internal services. This issue is patched in version 1.2.4. A workaround for this vulnerability includes disabling external entity processing in the XML parser by setting the appropriate security features (e.g., XMLConstants.FEATURE_SECURE_PROCESSING).
|
[] | null | 7.5 | null | null | null |
CVE-2022-1461
|
Non Privilege User can Enable or Disable Registered in openemr/openemr
|
Non Privilege User can Enable or Disable Registered in GitHub repository openemr/openemr prior to 6.1.0.1.
|
[
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | null | null |
CVE-2017-2130
|
Untrusted search path vulnerability in the installer of PhishWall Client Internet Explorer version Ver. 3.7.13 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:securebrain:phishwall_client:*:*:*:*:*:internet_explorer:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2024-33962
|
SQL injection in Janobe products
|
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'code' in '/admin/mod_reservation/index.php' parameter.
|
[
"cpe:2.3:a:janobe:janobe_paypal:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:janobe_credit_card:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:janobe_debit_card_payment:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-9x37-h43v-mqc4
|
Xshell before 7.0.0.76 allows attackers to cause a crash by triggering rapid changes to the title bar.
|
[] | null | null | null | null | null |
|
CVE-2008-6874
|
Multiple SQL injection vulnerabilities in ASP SiteWare autoDealer 1 and 2 allow remote attackers to execute arbitrary SQL commands via the iType parameter in (1) Auto1/type.asp or (2) auto2/type.asp.
|
[
"cpe:2.3:a:aspsiteware:autodealer:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:aspsiteware:autodealer:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-9fw8-mqf2-cw8g
|
The com.callos14.callscreen.colorphone (aka iCall OS17 - Color Phone Flash) application through 4.3 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.callos14.callscreen.colorphone.DialerActivity component.
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-3162
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
CVE-2016-3032
|
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 114516.
|
[
"cpe:2.3:a:ibm:cognos_analytics:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.6:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2000-0420
|
The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2022-22111
|
DayByDay CRM - Missing Authorization when Changing Password
|
In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.
|
[
"cpe:2.3:a:daybydaycrm:daybyday_crm:2.2.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.