id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2021-29989
Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.13, Firefox ESR < 78.13, and Firefox < 91.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2025-39780
sched/ext: Fix invalid task state transitions on class switch
In the Linux kernel, the following vulnerability has been resolved: sched/ext: Fix invalid task state transitions on class switch When enabling a sched_ext scheduler, we may trigger invalid task state transitions, resulting in warnings like the following (which can be easily reproduced by running the hotplug selftest in a loop): sched_ext: Invalid task state transition 0 -> 3 for fish[770] WARNING: CPU: 18 PID: 787 at kernel/sched/ext.c:3862 scx_set_task_state+0x7c/0xc0 ... RIP: 0010:scx_set_task_state+0x7c/0xc0 ... Call Trace: <TASK> scx_enable_task+0x11f/0x2e0 switching_to_scx+0x24/0x110 scx_enable.isra.0+0xd14/0x13d0 bpf_struct_ops_link_create+0x136/0x1a0 __sys_bpf+0x1edd/0x2c30 __x64_sys_bpf+0x21/0x30 do_syscall_64+0xbb/0x370 entry_SYSCALL_64_after_hwframe+0x77/0x7f This happens because we skip initialization for tasks that are already dead (with their usage counter set to zero), but we don't exclude them during the scheduling class transition phase. Fix this by also skipping dead tasks during class swiching, preventing invalid task state transitions.
[]
null
null
null
null
null
CVE-2019-8382
An issue was discovered in Bento4 1.5.1-628. A NULL pointer dereference occurs in the function AP4_List:Find located in Core/Ap4List.h when called from Core/Ap4Movie.cpp. It can be triggered by sending a crafted file to the mp4dump binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
[ "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-pq3x-98gp-f857
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Mounting a maliciously crafted Samba network share may lead to arbitrary code execution.
[]
null
null
null
null
null
GHSA-v6g2-g5rp-j92j
Improper access control vulnerability in ContactsDumpActivity of?Contacts Provider prior to version 12.7.59 allows attacker to access the file without permission.
[]
null
6.1
null
null
null
GHSA-r86g-g8qv-wvcr
In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a heap-based buffer over-read in ReadOneMNGImage in coders/png.c, related to length calculation and caused by an off-by-one error.
[]
null
null
8.8
null
null
CVE-2013-3164
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-p6wr-rmq4-5284
Uncontrolled search path for the Intel(R) NUC Pro Software Suite before version 2.0.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
null
GHSA-px2g-q8p3-hh7q
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jorge Garcia de Bustos AWStats Script allows Stored XSS. This issue affects AWStats Script: from n/a through 0.3.
[]
null
5.9
null
null
null
CVE-2021-1543
Cisco Small Business 220 Series Smart Switches Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:o:cisco:sf220-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf220-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf220-24p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf220-24p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf220-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf220-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sf220-48p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sf220-48p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg220-26_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg220-26:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg220-26p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg220-26p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg220-28mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg220-28mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg220-50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg220-50:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sg220-50p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:sg220-50p:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-3f44-4jr2-wjvp
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
[]
null
7.8
null
null
null
GHSA-6h78-85v2-mmch
PHPMailer Shell command injection
PHPMailer before 1.7.4, when configured to use sendmail, allows remote attackers to execute arbitrary shell commands via shell metacharacters in the SendmailSend function in `class.phpmailer.php`.ImpactShell command injection, remotely exploitable if host application does not filter user data appropriately.PatchesFixed in 1.7.4WorkaroundsFilter and validate user-supplied data before putting in the into the `Sender` property.Referenceshttps://nvd.nist.gov/vuln/detail/CVE-2007-3215For more informationIf you have any questions or comments about this advisory:Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
[]
null
null
null
null
null
CVE-2025-23020
An issue was discovered in Kwik before 0.10.1. A hash collision vulnerability (in the hash table used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs).
[]
null
5.3
null
null
null
CVE-2019-0704
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0703, CVE-2019-0821.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
GHSA-cmqq-5rp5-x675
Secure Boot Security Feature Bypass Vulnerability
[]
null
6.8
null
null
null
GHSA-c7f2-5336-87pq
SQL injection vulnerability in the ticket grid in the admin interface in LicensePal ArcticDesk before 1.2.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
RHSA-2024:0144
Red Hat Security Advisory: idm:DL1 security update
ipa: Invalid CSRF protection
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
6.5
null
null
null
GHSA-vm96-4qrg-6r96
Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2181.
[]
null
null
null
null
null
GHSA-m3r2-wj3v-57ch
Foreman has improper input validation which could lead to partial Denial of Service
[]
null
5.3
null
null
null
RHSA-2010:0471
Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update
OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
[ "cpe:/a:redhat:network_satellite:5.3::el4", "cpe:/a:redhat:network_satellite:5.3::el5" ]
null
null
null
null
null
GHSA-244m-v8jg-hv24
A low privileged local attacker can abuse the affected service by using a hardcoded cryptographic key.
[]
null
5.5
null
null
null
CVE-2020-17398
This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.4. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the prl_hypervisor kext. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-11302.
[ "cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:macos:*:*" ]
null
null
6.5
null
null
GHSA-55rp-jrc5-px98
Cross-Site Request Forgery (CSRF) vulnerability in Pure Chat by Ruby Pure Chat.This issue affects Pure Chat: from n/a through 2.22.
[]
null
4.3
null
null
null
GHSA-gx8c-7452-frr8
A vulnerability was found in Email Registration 5.x-2.1. It has been declared as critical. This vulnerability affects the function email_registration_user of the file email_registration.module. The manipulation of the argument namenew leads to sql injection. The attack can be initiated remotely. Upgrading to version 6.x-1.0 is able to address this issue. The name of the patch is 126c141b7db038c778a2dc931d38766aad8d1112. It is recommended to upgrade the affected component. VDB-222334 is the identifier assigned to this vulnerability.
[]
null
9.8
null
null
null
CVE-2015-9289
In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
null
CVE-2016-3384
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
7.5
9.3
null
CVE-2012-2339
Cross-site scripting (XSS) vulnerability in the Glossary module 6.x-1.x before 6.x-1.8 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "taxonomy information."
[ "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.0:dev:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:glossary:6.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-c476-5cw2-72fp
The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
[]
null
7.3
null
null
null
RHSA-2013:0898
Red Hat Security Advisory: mesa security update
Mesa: Multiple integer overflows leading to heap-based bufer overflows
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-hccv-rqmr-8xqg
A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0002, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014).
[]
null
7.8
null
null
null
GHSA-jmq6-2q85-fwg2
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
7.5
null
null
null
CVE-2015-2292
Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
[ "cpe:2.3:a:yoast:wordpress_seo:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.6.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.6.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.6.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.6.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.7.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.7.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.7.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.7.3.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.7.3.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yoast:wordpress_seo:1.7.3.3:*:*:*:*:wordpress:*:*" ]
null
null
null
6.5
null
GHSA-cwx3-9577-fcx4
The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant administrative privileges. This could result in complete compromise of system confidentiality, integrity, and availability.
[]
null
null
null
null
null
GHSA-86rv-pvv7-jwp8
clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
[]
null
null
null
null
null
CVE-2023-3140
KNIME Hub Web Application is vulnerable to clickjacking
Missing HTTP headers (X-Frame-Options, Content-Security-Policy) in KNIME Business Hub before 1.4.0 has left users vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server.
[ "cpe:2.3:a:knime:business_hub:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
ICSA-17-355-01
ICSA-17-355-01_Moxa NPort W2150A and W2250A
The default password is empty on the device. An unauthorized user can access the device without a password. An unauthorized user has the ability to completely compromise the confidentiality and integrity of the wireless traffic.CVE-2017-16727 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
[]
null
null
6.5
null
null
GHSA-8xqp-9h4v-j8vf
An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged attacker to copy potentially malicious files into an existing Docker container on the local system. A follow-on administrator could then inadvertently start the Docker container leading to the malicious files being executed as root. This issue only affects systems with Docker configured and enabled, which is not enabled by default. Systems without Docker started are not vulnerable to this issue. This issue affects Juniper Networks Junos OS Evolved: 20.4 versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R3-EVO; 21.4 versions prior to 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 19.2R1-EVO.
[]
null
8.2
null
null
null
CVE-2012-0563
Unspecified vulnerability in Oracle Solaris 9, 10, and 11 allows local users to affect availability via unknown vectors related to Kerberos/klist.
[ "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-jqpq-72xc-xqvj
Cross-site scripting (XSS) vulnerability in zTree 3.5.19.1 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to demo/en/asyncData/getNodesForBigData.php.
[]
null
null
null
null
null
GHSA-4hrr-7cq5-fj96
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
[]
null
null
null
null
null
GHSA-x944-3w5c-5hcg
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) WordPress plugin before 5.10.3 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null
null
CVE-2023-40057
SolarWinds Access Rights Manager (ARM) Deserialization of Untrusted Data Remote Code Execution
The SolarWinds Access Rights Manager was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service resulting in remote code execution.
[ "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*" ]
null
9
null
null
null
GHSA-5p3x-r448-pc62
Improper Verification of Cryptographic Signature in PySAML2
ImpactAll users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not ensure that a signed SAML document is correctly signed. The default `CryptoBackendXmlSec1` backend is using the `xmlsec1` binary to verify the signature of signed SAML documents, but by default, `xmlsec1` accepts any type of key found within the given document. `xmlsec1` needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature.PatchesUsers should upgrade to pysaml2 `v6.5.0`.WorkaroundsNo workaround provided at this point.ReferencesThis issue has been reported in the past at the xmlsec1 mailing list: https://www.aleksey.com/pipermail/xmlsec/2013/009717.htmlCreditsBrian WolffFor more informationIf you have any questions or comments about this advisory:Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2)Email us at [the incident-response address](mailto:[email protected])
[]
6.9
6.5
null
null
null
GHSA-8wp6-p535-q4m3
The Visual Composer VC70RUNTIME component in SAP NetWeaver AS JAVA 7.5 allows remote authenticated users to conduct XML External Entity (XXE) attacks via a crafted XML document in a request to irj/servlet/prt/portal/prtroot/com.sap.visualcomposer.BIKit.default, aka SAP Security Note 2386873.
[]
null
8.8
null
null
null
GHSA-x5jr-fr4j-vx89
Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27059.
[]
null
7.8
null
null
null
CVE-2022-21621
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
6
null
null
null
CVE-2023-37036
A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Uplink NAS Transport` packet missing an expected `ENB_UE_S1AP_ID` field.
[]
null
6.5
null
null
null
GHSA-hjp3-5g2q-7jww
Race Condition leading to logging errors
In certain setups with threaded web servers, Audited's use of `Thread.current` can incorrectly attributed audits to the wrong user.Fixed in 5.3.3.In March, @convisoappsec noticed that the library in question had a Race Condition problem, which caused logs to be registered at times with different users than those who performed the genuine actions.The first issue we identified was from November 2021: https://github.com/collectiveidea/audited/issues/601So the solution was implemented in the following Pull Request: https://github.com/collectiveidea/audited/pull/669And the feature was published in version 5.3.3: RELEASE: https://github.com/collectiveidea/audited/pull/671
[]
null
3.1
null
null
null
RHSA-2022:0728
Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.2.8)
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception origin-aggregated-logging/elasticsearch: Incomplete fix for netty-codec-http CVE-2021-21409
[ "cpe:/a:redhat:logging:5.2::el8" ]
null
5.9
null
null
null
RHSA-2022:0540
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.4.10-1]
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL aide: heap-based buffer overflow on outputs larger than B64_BUF kernel: fs_context: heap overflow in legacy parameter handling
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
null
CVE-2013-7379
The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.
[ "cpe:2.3:a:ucdok:tomato:*:*:*:*:*:node.js:*:*" ]
null
null
null
6.8
null
CVE-2020-1513
Windows CSC Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CSC Service handles memory.
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
RHSA-2025:8337
Red Hat Security Advisory: varnish security update
varnish: request smuggling attacks
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.1
null
null
null
CVE-2020-18455
Cross Site Scripting (XSS) vulnerability exists in bycms v3.0.4 via the title parameter in the edit function in Document.php.
[ "cpe:2.3:a:bycms_project:bycms:1.3.0:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
GHSA-cqgr-82mv-j79r
An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.
[]
null
7.8
null
null
null
GHSA-7rfw-vg62-m5wc
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088.
[]
null
null
null
null
null
CVE-2023-45628
WordPress QR Twitter Widget Plugin <= 0.2.3 is vulnerable to Cross Site Scripting (XSS)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in QROkes QR Twitter Widget plugin <= 0.2.3 versions.
[ "cpe:2.3:a:qrokes:qr_twitter_widget:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
CVE-2021-28875
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
[ "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-42v8-4p4g-32vh
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
[]
null
6.1
null
null
null
GHSA-vr26-5f5w-r829
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
[]
null
3.7
null
null
null
RHSA-2011:1386
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: usb: buffer overflow in auerswald_probe() kernel: tpm infoleaks kernel: cifs session reuse kernel: ecryptfs: mount source TOCTOU race kernel: taskstats: duplicate entries in listener mode can lead to DoS kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions kernel: ext4: kernel panic when writing data to the last block of sparse file kernel: ipv6: make fragment identifications less predictable kernel: gro: only reset frag0 when skb can be pulled kernel: bridge: null pointer dereference in __br_deliver kernel: xen: IOMMU fault livelock kernel: net: improve sequence number generation kernel: cifs: signedness issue in CIFSFindNext() kernel: panic occurs when clock_gettime() is called kernel: be2net: promiscuous mode and non-member VLAN packets DoS
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
RHSA-2020:3817
Red Hat Security Advisory: AMQ Clients 2.8.0 Release
log4j: improper validation of certificate with host mismatch in SMTP appender jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:a_mq_clients:2::el6", "cpe:/a:redhat:a_mq_clients:2::el7", "cpe:/a:redhat:a_mq_clients:2::el8" ]
null
6.5
null
null
null
RHSA-2024:8830
Red Hat Security Advisory: bpftrace security update
bpftrace: unprivileged users can force loading of compromised linux headers
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
2.8
null
null
null
CVE-2010-4380
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, and RealPlayer Enterprise 2.1.2 allows remote attackers to have an unspecified impact via a crafted SOUND file.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-c44h-4g88-mw48
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
[]
null
5.5
null
null
null
CVE-2015-0348
Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_workstation_extension:12.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2017-7701
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
[ "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2024-4752
EventON < 2.2.15 - Admin+ Stored Cross-Site Scripting via event subtitle
The EventON WordPress plugin before 2.2.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:myeventon:eventon:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
GHSA-rh9r-xpf4-gh2j
The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.
[]
null
null
null
null
null
CVE-2001-0514
SNMP service in Atmel 802.11b VNET-B Access Point 1.3 and earlier, as used in Netgear ME102 and Linksys WAP11, accepts arbitrary community strings with requested MIB modifications, which allows remote attackers to obtain sensitive information such as WEP keys, cause a denial of service, or gain access to the network.
[ "cpe:2.3:h:atmel:802.11b_vnet-b_access_point:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wap11:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:me102:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2007-2713
ifdate 2.x sends a redirect to the web browser but does not exit when administrative credentials are missing, which allows remote attackers to obtain administrative access via a direct request for the admin/ URI.
[ "cpe:2.3:a:ifusionservices:ifdate:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ifusionservices:ifdate:2.0.3:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-qghg-p6j3-w7j7
Cybozu Dezie 8.0.0 to 8.1.1 allows remote attackers to bypass access restrictions to delete an arbitrary DBM (Cybozu Dezie proprietary format) file via unspecified vectors.
[]
null
null
7.5
null
null
GHSA-fp3p-pvfr-vqww
Unrestricted Upload of File with Dangerous Type vulnerability in An-Themes Pin WP allows Upload a Web Shell to a Web Server.This issue affects Pin WP: from n/a through 6.9.
[]
null
9.9
null
null
null
GHSA-m79f-wx75-8h2j
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
[]
null
null
null
null
null
CVE-2023-38176
Azure Arc-Enabled Servers Elevation of Privilege Vulnerability
Azure Arc-Enabled Servers Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_arc-enabled_servers:*:*:*:*:*:*:*:*" ]
null
7
null
null
null
GHSA-fvcj-2mgp-5x33
A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.
[]
null
null
5.5
null
null
CVE-2019-9454
In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
null
GHSA-jr3g-5m6v-p5rw
ovtopmd in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allows remote attackers to cause a denial of service (crash) via a crafted TCP request that triggers an out-of-bounds memory access.
[]
null
null
null
null
null
CVE-2025-37975
riscv: module: Fix out-of-bounds relocation access
In the Linux kernel, the following vulnerability has been resolved: riscv: module: Fix out-of-bounds relocation access The current code allows rel[j] to access one element past the end of the relocation section. Simplify to num_relocations which is equivalent to the existing size expression.
[]
null
null
null
null
null
CVE-2018-15006
The ZTE ZMAX Champ Android device with a build fingerprint of ZTE/Z917VL/fortune:6.0.1/MMB29M/20170327.120922:user/release-keys contains a pre-installed platform app with a package name of com.android.zte.hiddenmenu (versionCode=23, versionName=6.0.1) that contains an exported broadcast receiver app component named com.android.zte.hiddenmenu.CommandReceiver that is accessible to any app co-located on the device. This app component, when it receives a broadcast intent with a certain action string, will write a non-standard (i.e., not defined in Android Open Source Project (AOSP) code) command to the /cache/recovery/command file to be executed in recovery mode. Once the device boots into recovery mode, it will crash, boot into recovery mode, and crash again. This crash loop will keep repeating, which makes the device unusable. There is no way to boot into an alternate mode once the crash loop starts.
[ "cpe:2.3:o:zteusa:zte_zmax_champ_firmware:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:zteusa:zte_zmax_champ:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
null
CVE-2015-8772
McPvDrv.sys 4.6.111.0 in McAfee File Lock 5.x in McAfee Total Protection allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a large VERIFY_INFORMATION.Length value in an IOCTL_DISK_VERIFY ioctl call.
[ "cpe:2.3:a:mcafee:file_lock:5.0:*:*:*:*:*:*:*" ]
null
null
9.1
8.5
null
RHSA-2019:2978
Red Hat Security Advisory: polkit security update
polkit: Temporary auth hijacking via PID reuse and non-atomic fork
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.3
null
null
CVE-2023-34941
A stored cross-site scripting (XSS) vulnerability in the urlFilterList function of Asus RT-N10LX Router v2.0.0.39 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL Keyword List text field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ "cpe:2.3:o:asus:rt-n10lx_firmware:2.0.0.39:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-n10lx:-:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-hc33-32vw-rpp9
Remote Code Execution Vulnerability in Session Storage
ImpactA malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store.If your application does not use Ratpack's session mechanism, it is not vulnerable.DetailsAttackers with the ability to write to session data, can potentially craft payloads that deserialize unsafe objects, leading to the ability to remotely execute arbitrary code. This is known as an “[insecure deserialization](https://portswigger.net/web-security/deserialization)” vulnerability, or “gadget vulnerability”.Ratpack allows session data to be stored server side in an external system such as a relational database, or client side via user cookies. When using server side storage, the attacker would need to obtain the ability to write to the session data store. When using client side storage, the attacker would need to obtain the secrets used to encrypt and/or sign the session data stored in user cookies.Ratpack's session mechanism allows storing serialized objects, of arbitrary types. The type must be specified when writing the data and when reading, with data only deserialized when there is an exact type match. However, in the process of deserializing an object of a known/trusted/deserialization-safe type, it may attempt to deserialize unsafe types.By default Ratpack uses Java's built-in serialization mechanism, though other serialization providers can be used. The exact types of payloads required to enable an exploit depend on the exact serialization mechanism used.To mitigate this vulnerability, Ratpack now employs a “strict allow-list” when deserializing (and serializing) objects to session data. All concrete types of objects serialized must be explicitly declared as safe. Some standard well known JDK types are registered by default.Serialization is provided by implementations of [`SessionSerializer`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html). Its existing methods have been deprecated, and replaced with a [new methods](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html#deserialize(java.lang.Class,java.io.InputStream,ratpack.session.SessionTypeFilter)) that accept a [`SessionTypeFilter`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionTypeFilter.html) that can be used to assert whether a type is allowed when serializing and deserializing.The default serializer implementation has been updated to use this mechanism. Any proprietary implementations should also be updated to consult the type filter _before_ serializing or deserializing data. Warnings will be logged any time an implementation that does not implement the new methods is used.Upon upgrading to Ratpack 1.9, users of the built-in serialization mechanism will need to change their application to declare all types currently being serialized as being safe. This can be done using the new [`SessionModule.allowTypes()`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionModule.html#allowTypes(com.google.inject.Binder,java.lang.Class...)) method. Please see its documentation for details...))PatchesRatpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used.WorkaroundsThe simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store.Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list.Referenceshttps://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data
[]
null
9.9
null
null
null
CVE-2018-19793
jiacrontab 1.4.5 allows remote attackers to execute arbitrary commands via the crontab/task/edit?addr=localhost%3a20001 command and args parameters, as demonstrated by command=cat&args=/etc/passwd in the POST data.
[ "cpe:2.3:a:jiacrontab_project:jiacrontab:1.4.5:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null
GHSA-7q25-89mc-hp7w
A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls, aka 'Microsoft SharePoint Server Remote Code Execution Vulnerability'.
[]
null
null
null
null
null
GHSA-2vxg-v3f5-p55m
Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
[]
null
null
null
null
null
CVE-2025-53739
Microsoft Excel Remote Code Execution Vulnerability
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
[]
null
7.8
null
null
null
CVE-1999-1069
Directory traversal vulnerability in carbo.dll in iCat Carbo Server 3.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the icatcommand parameter.
[ "cpe:2.3:a:icat:electronic_commerce_suite:3.0.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-vc54-vp3p-v68c
Heap out-of-bounds write vulnerability in dec_mono_audb of libsavsac.so prior to SMR Dec-2023 Release 1 allows an attacker to execute arbitrary code.
[]
null
7.4
null
null
null
GHSA-gjf8-8943-8w6v
The iwgif_record_pixel function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
[]
null
null
5.5
null
null
GHSA-wmr8-r292-jvcc
Cross-site scripting (XSS) vulnerability in acpmoderate.php in PHP-Quick-Arcade (PHPQA) 3.0.21 allows remote attackers to inject arbitrary web script or HTML via the serv parameter.
[]
null
null
null
null
null
GHSA-9g63-289c-8mr7
In ProtocolMiscBuilder::BuildSetLinkCapaReportCriteria of protocolmiscbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241231983References: N/A
[]
null
6.7
null
null
null
CVE-2024-3044
Graphic on-click binding allows unchecked script execution
Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.
[]
null
6.5
null
null
null
CVE-2023-42047
PDF-XChange Editor JP2 File Parsing Memory Corruption Remote Code Execution Vulnerability
PDF-XChange Editor JP2 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20908.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.0.1.371:*:*:*:*:*:*:*", "cpe:2.3:a:pdf-xchange:pdf-tools:10.0.1.371:*:*:*:*:*:*:*", "cpe:2.3:a:pdf-xchange:pdf-xchange_pro:10.0.1.371:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-9324-p9hx-8h9m
A vulnerability was found in XINJE XDPPro up to 3.7.17a. It has been rated as critical. Affected by this issue is some unknown functionality in the library cfgmgr32.dll. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-241586 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
7.8
null
null
RHSA-2024:8327
Red Hat Security Advisory: grafana security update
golang-fips: Golang FIPS zeroed buffer dompurify: nesting-based mutation XSS vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
null
GHSA-xwrx-6pgq-qmcj
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'id' in '/AttendanceMonitoring/department/index.php' parameter.
[]
null
9.8
null
null
null
GHSA-g4m9-9h4j-22xx
Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.
[]
null
7.2
null
null
null
CVE-2019-14602
Improper permissions in the installer for the Nuvoton* CIR Driver versions 1.02.1002 and before may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:nuvoton_consumer_infrared:*:*:*:*:*:*:nuc:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null