id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-mpj3-4vv5-g8qc
|
Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, PerformanceBridge Focal Point Version A.01, IntelliVue patient monitors MX100, MX400-MX850, and MP2-MP90 Versions N and prior, IntelliVue X3 and X2 Versions N and prior. The software parses a formatted message or structure but does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data, causing the application on the surveillance station to restart.
|
[] | null | 6.5 | null | null | null |
|
GHSA-vx9h-7frf-374v
|
A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software trusts a certificate issued by an entity that isn't authorized to issue certificates. This occurs when the "Basic Constraints" extension in the certificate indicates that it is meant to be an "End Entity”. This flaw could allow an attacker to perform a Man-in-the-Middle (MITM) attack, intercepting and potentially altering communications between the user and the website.
|
[] | 8.6 | 7.4 | null | null | null |
|
CVE-2021-24404
|
WP-Board <= 1.1 (beta) - Unauthenticated SQL Injection
|
The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.
|
[
"cpe:2.3:a:wp-board_project:wp-board:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 | null |
CVE-2020-16102
|
Improper Authentication vulnerability in Gallagher Command Centre Server allows an unauthenticated remote attacker to create items with invalid configuration, potentially causing the server to crash and fail to restart. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1299(MR2); 8.20 versions prior to 8.20.1218(MR4); 8.10 versions prior to 8.10.1253(MR6); 8.00 versions prior to 8.00.1252(MR7); version 7.90 and prior versions.
|
[
"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.00.1252:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.00.1252:maintenance_release7:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.10.1253:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.10.1253:maintenance_release6:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.20.1218:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.20.1218:maintenance_release4:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.30.1299:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.30.1299:maintenance_release2:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2006-2730
|
PHP remote file inclusion vulnerability in admin/lib_action_step.php in Hot Open Tickets (HOT) 11012004_ver2f, when register_globals is enabled, allows remote attackers to include arbitrary files via the GLOBALS[CLASS_PATH] parameter. NOTE: this issue might be resultant from a global overwrite vulnerability.
|
[
"cpe:2.3:a:hot_open_tickets:hot_open_tickets:2f_2004-11-01:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
GHSA-j65j-7f2j-mh39
|
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the entrys parameter from fromAddressNat function.
|
[] | null | 8 | null | null | null |
|
GHSA-9q39-8jrg-38mq
|
A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been rated as critical. This issue affects some unknown processing of the file view_employee.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271457 was assigned to this vulnerability.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-2w2m-vwp5-22c5
|
A Buffer Overflow and Information Disclosure issue exists in HP OfficeJet Pro Printers before 001.1937C, and HP PageWide Managed Printers and HP PageWide Pro Printers before 001.1937D exists; A maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
|
[] | null | null | null | null | null |
|
GHSA-cxfc-q5xx-wr6x
|
Ultrafunk Popcorn 1.20 allows remote attackers to cause a denial of service (crash) via a malformed Date field that is converted into a year greater than 2037.
|
[] | null | null | null | null | null |
|
CVE-2013-1527
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote authenticated users to affect confidentiality via unknown vectors related to Report Distribution.
|
[
"cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2013-2162
|
Race condition in the post-installation script (mysql-server-5.5.postinst) for MySQL Server 5.5 for Debian GNU/Linux and Ubuntu Linux creates a configuration file with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as credentials.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
GHSA-6hxv-6w4p-6pv3
|
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5 allows remote attackers to inject arbitrary web script or HTML via the reportType parameter to an unspecified component.
|
[] | null | null | null | null | null |
|
GHSA-7p87-3v89-xjw3
|
Multiple SQL injection vulnerabilities in eNdonesia 8.4 allow remote attackers to execute arbitrary SQL commands via the (1) artid parameter to mod.php in a viewarticle action (publisher mod) and the (2) bid parameter to banners.php in a click action. NOTE: the mod.php viewdisk and viewlink vectors are already covered by CVE-2006-6873.
|
[] | null | null | null | null | null |
|
CVE-2015-3111
|
Heap-based buffer overflow in Adobe Photoshop CC before 16.0 (aka 2015.0.0) and Adobe Bridge CC before 6.11 allows attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-wcvw-xvmj-6fw7
|
RG-EW1200G PRO Wireless Routers EW_3.0(1)B11P204, RG-EW1800GX PRO Wireless Routers EW_3.0(1)B11P204, and RG-EW3200GX PRO Wireless Routers EW_3.0(1)B11P204 were discovered to contain multiple command injection vulnerabilities via the data.ip, data.protocal, data.iface and data.package parameters in the runPackDiagnose function of diagnose.lua.
|
[] | null | 8.8 | null | null | null |
|
GHSA-cxjg-wpgh-jhh5
|
SQL injection vulnerability found in PrestaShop themevolty v.4.0.8 and before allow a remote attacker to gain privileges via the tvcmsblog, tvcmsvideotab, tvcmswishlist, tvcmsbrandlist, tvcmscategorychainslider, tvcmscategoryproduct, tvcmscategoryslider, tvcmspaymenticon, tvcmstestimonial components.
|
[] | null | 9.8 | null | null | null |
|
CVE-2008-1376
|
A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrappers support, which might allow remote attackers to bypass intended access restrictions.
|
[
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:client:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*",
"cpe:2.3:a:redhat:nfs_utils:1.0.9:35z.el5_2:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-33rm-jrgq-qgx9
|
In Progress MOVEit Transfer before 2021.0 (13.0), a SQL injection vulnerability has been found in the MOVEit Transfer web app that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or destroy database elements. This is in MOVEit.DMZ.WebApp in SILHuman.vb.
|
[] | null | null | null | null | null |
|
CVE-2022-22785
|
Improperly constrained session cookies in Zoom Client for Meetings
|
The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.
|
[
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*"
] | null | 5.9 | null | null | null |
GHSA-x834-53jc-rjr9
|
Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.
|
[] | null | 6.7 | null | null | null |
|
CVE-2020-10495
|
CSRF in admin/edit-template.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit an article template, given the id, via a crafted request.
|
[
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2025-52789
|
WordPress Lewe ChordPress plugin <= 3.9.7 - Cross Site Request Forgery (CSRF) to Stored XSS Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in George Lewe Lewe ChordPress allows Stored XSS. This issue affects Lewe ChordPress: from n/a through 3.9.7.
|
[] | null | 7.1 | null | null | null |
GHSA-68c3-2f9v-prp3
|
Pointer corruption in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unauthenticated remote user to potentially execute arbitrary WebGL code via local access.
|
[] | null | null | 7.8 | null | null |
|
CVE-2023-0943
|
SourceCodester Best POS Management System Image save_settings unrestricted upload
|
A vulnerability, which was classified as problematic, has been found in SourceCodester Best POS Management System 1.0. This issue affects the function save_settings of the file index.php?page=site_settings of the component Image Handler. The manipulation of the argument img with the input ../../shell.php leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221591.
|
[
"cpe:2.3:a:best_pos_management_system_project:best_pos_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 | null |
CVE-2021-0646
|
In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process's SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2023-40663
|
WordPress WP VR Plugin <= 8.3.4 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rextheme WP VR plugin <= 8.3.4 versions.
|
[
"cpe:2.3:a:rextheme:wp_vr:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
CVE-2013-3372
|
Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 allows remote attackers to inject multiple Content-Disposition HTTP headers and possibly conduct cross-site scripting (XSS) attacks via unspecified vectors.
|
[
"cpe:2.3:a:bestpractical:rt:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:preflight1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:preflight0:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.11:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.11:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.13:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.16:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-34446
|
iTop XSS vulnerability on pages/preferences.php
|
iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, when displaying `pages/preferences.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.
|
[
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2024-43412
|
Xibo CMS XSS vulnerability when previewing files uploaded to the library containing HTML/JS
|
Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute arbitrary JavaScript via the file preview function. Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser. This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality. This behavior has been changed in 4.1.0 to preview previewing of generic files. There are no workarounds for this issue.
|
[
"cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
CVE-2017-9970
|
A remote code execution vulnerability exists in Schneider Electric's StruxureOn Gateway versions 1.1.3 and prior. Uploading a zip which contains carefully crafted metadata allows for the file to be uploaded to any directory on the host machine information which could lead to remote code execution.
|
[
"cpe:2.3:a:schneider-electric:struxureon_gateway:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 | null |
|
CVE-2019-18259
|
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.
|
[
"cpe:2.3:o:omron:plc_cj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:plc_cs_firmware:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2007-2443
|
Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
|
[
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
] | null | null | null | 8.3 | null |
|
CVE-2025-28242
|
Improper session management in the /login_ok.htm endpoint of DAEnetIP4 METO v1.25 allows attackers to execute a session hijacking attack.
|
[] | null | 9.8 | null | null | null |
|
CVE-2008-5914
|
An unspecified function in the JavaScript implementation in Apple Safari creates and exposes a "temporary footprint" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an "in-session phishing attack." NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
RHSA-2023:0450
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.1 security update
|
aws-efs-utils: Race condition during concurrent TLS mounts in efs-utils and aws-efs-csi-driver
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 5.6 | null | null | null |
GHSA-882p-jqgm-f45g
|
Uncontrolled resource consumption in nokogiri
|
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
|
[] | null | null | 6.5 | null | null |
GHSA-wp6c-p3vm-q9jm
|
An insecurity temporary file vulnerability exists in RHQ Mongo DB Drift Server through 2013-09-25 when unpacking zipped files.
|
[] | null | 7.1 | null | null | null |
|
GHSA-67fv-9r7g-432h
|
Rhai stack overflow vulenrability
|
A stack overflow vulnerability was found in version 1.18.0 of rhai. The flaw position is: (/ SRC/rhai/SRC/eval/STMT. Rs in rhai: : eval: : STMT: : _ $LT $impl $u20 $rhai.. engine.. Engine$GT$::eval_stmt::h3f1d68ce37fc6e96). Due to the stack overflow is a recursive call/SRC/rhai/SRC/eval/STMT. Rs file eval_stmt_block function.
|
[] | 8.7 | 7.5 | null | null | null |
GHSA-m7q8-8fgq-qmc2
|
Directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
[] | null | null | null | null | null |
|
CVE-2015-6606
|
The Secure Element Evaluation Kit (aka SEEK or SmartCard API) plugin in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22301786.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2023-1539
|
Improper Restriction of Excessive Authentication Attempts in answerdev/answer
|
Improper Restriction of Excessive Authentication Attempts in GitHub repository answerdev/answer prior to 1.0.6.
|
[
"cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
CVE-2021-22479
|
The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 | null |
|
CVE-2021-41872
|
Skyworth Digital Technology Penguin Aurora Box 41502 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
|
[
"cpe:2.3:o:skyworthdigital:penguin_aurora_box_41502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:skyworthdigital:penguin_aurora_box_41502:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-qm4q-xhjm-67jr
|
Microsoft Outlook Remote Code Execution Vulnerability
|
[] | null | 8 | null | null | null |
|
GHSA-j49g-wx52-cq2p
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PickPlugins Wishlist allows SQL Injection. This issue affects Wishlist: from n/a through 1.0.43.
|
[] | null | 8.5 | null | null | null |
|
GHSA-hm57-4qpx-f734
|
Credentials transmitted in plain text by Jenkins DeployHub Plugin
|
DeployHub Plugin stores credentials in job `config.xml` files as part of its configuration.While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by DeployHub Plugin 8.0.14 and earlier. These credentials could be viewed by users with Extended Read permission.
|
[] | null | 3.1 | null | null | null |
CVE-2023-3898
|
SQLi in mAyaNets E-Commerce Software
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mAyaNet E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: before 1.1.
|
[
"cpe:2.3:a:mayanets:e-commerce:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2022-21805
|
Reflected cross-site scripting vulnerability in the attached file name of php_mailform versions prior to Version 1.40 allows a remote unauthenticated attacker to inject an arbitrary script via unspecified vectors.
|
[
"cpe:2.3:a:econosys-system:php_mailform:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-h498-88jq-wh8m
|
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access information about a user's contacts.
|
[] | null | 3.3 | null | null | null |
|
CVE-2022-39351
|
Dependency-Track vulnerable to logging of API keys in clear text when handling API requests using keys with insufficient permissions
|
Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.6.0, performing an API request using a valid API key with insufficient permissions causes the API key to be written to Dependency-Track's audit log in clear text. Actors with access to the audit log can exploit this flaw to gain access to valid API keys. The issue has been fixed in Dependency-Track 4.6.0. Instead of logging the entire API key, only the last 4 characters of the key will be logged. It is strongly recommended to check historic logs for occurrences of this behavior, and re-generating API keys in case of leakage.
|
[
"cpe:2.3:a:owasp:dependency-track:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
CVE-2017-7023
|
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-jxq3-2hwh-v5qg
|
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
[] | null | 7.2 | null | null | null |
|
GHSA-j5xq-963p-r9mj
|
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, on TZ cold boot the CNOC_QDSS RG0 locked by xBL_SEC is cleared by TZ.
|
[] | null | null | 9.8 | null | null |
|
GHSA-5hf4-4qjp-q973
|
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2024-35898
|
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
|
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
nft_unregister_flowtable_type() within nf_flow_inet_module_exit() can
concurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().
And thhere is not any protection when iterate over nf_tables_flowtables
list in __nft_flowtable_type_get(). Therefore, there is pertential
data-race of nf_tables_flowtables list entry.
Use list_for_each_entry_rcu() to iterate over nf_tables_flowtables list
in __nft_flowtable_type_get(), and use rcu_read_lock() in the caller
nft_flowtable_type_get() to protect the entire type query process.
|
[] | null | 5.5 | null | null | null |
GHSA-w3m7-pqwv-79w9
|
Unspecified vulnerability in GlobalSCAPE Secure FTP Server before 3.1.4 Build 01.10.2006 allows attackers to cause a denial of service (application crash) via a "custom command" with a long argument.
|
[] | null | null | null | null | null |
|
CVE-2025-32870
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetTraces' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
|
[] | 8.7 | 8.8 | null | null | null |
|
CVE-2021-22710
|
A CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior, which could cause remote code execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition.
|
[
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-vgvv-hj3p-69r2
|
An issue was discovered in Aviatrix Controller before R5.3.1151. Encrypted key values are stored in a readable file.
|
[] | null | null | null | null | null |
|
CVE-2024-48270
|
An issue in the component /logins of oasys v1.1 allows attackers to access sensitive information via a burst attack.
|
[
"cpe:2.3:a:misstt123:oasys:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-28110
|
Go SDK for CloudEvents's use of WithRoundTripper to create a Client leaks credentials
|
Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue.
|
[
"cpe:2.3:a:cloudevents:sdk_go:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2024-2673
|
Campcodes Online Job Finder System login.php sql injection
|
A vulnerability classified as critical has been found in Campcodes Online Job Finder System 1.0. This affects an unknown part of the file /admin/login.php. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257373 was assigned to this vulnerability.
|
[
"cpe:2.3:a:campcodes:online_job_finder_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
CVE-2023-0067
|
Timed Content < 2.73 - Contributor+ Stored XSS
|
The Timed Content WordPress plugin before 2.73 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[
"cpe:2.3:a:timed_content_project:timed_content:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-x4xp-x564-qcw8
|
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. Affected by this issue is the function mysqli_query of the file sexit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-238154 is the identifier assigned to this vulnerability.
|
[] | null | null | 6.3 | null | null |
|
CVE-2025-54129
|
HAXiam allows for User Enumeration
|
HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5.
|
[] | null | 4.3 | null | null | null |
RHSA-2025:1875
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.9
|
dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling
|
[
"cpe:/a:redhat:service_mesh:2.5::el8"
] | null | 4.5 | null | null | null |
GHSA-p74p-fmvr-r6wf
|
The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the broken preg_replace expression in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2023-3584
|
Member can create team with team override scheme
|
Mattermost fails to properly check the authorization of POST /api/v4/teams when passing a team override scheme ID in the request, allowing an authenticated attacker with knowledge of a Team Override Scheme ID to create a new team with said team override scheme.
|
[
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
CVE-2024-11210
|
EyouCMS FilemanagerLogic.php editFile path traversal
|
A vulnerability was found in EyouCMS 1.51. It has been rated as critical. This issue affects the function editFile of the file application/admin/logic/FilemanagerLogic.php. The manipulation of the argument activepath leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:eyoucms:eyoucms:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:eyoucms:eyoucms:1.5.1:*:*:*:*:*:*:*"
] | 5.3 | 5.4 | 5.4 | 5.5 | null |
CVE-2025-3994
|
TOTOLINK N150RT IP Port Filtering home.htm cross site scripting
|
A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been classified as problematic. Affected is an unknown function of the file /home.htm of the component IP Port Filtering. The manipulation of the argument Comment leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 4.8 | 2.4 | 2.4 | 3.3 | null |
GHSA-3p2f-6gxq-2j9p
|
Microsoft Windows 10 1511, Windows 10 1607, and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0215, CVE-2017-0218, and CVE-2017-0219.
|
[] | null | null | 5.3 | null | null |
|
CVE-2025-38302
|
block: don't use submit_bio_noacct_nocheck in blk_zone_wplug_bio_work
|
In the Linux kernel, the following vulnerability has been resolved:
block: don't use submit_bio_noacct_nocheck in blk_zone_wplug_bio_work
Bios queued up in the zone write plug have already gone through all all
preparation in the submit_bio path, including the freeze protection.
Submitting them through submit_bio_noacct_nocheck duplicates the work
and can can cause deadlocks when freezing a queue with pending bio
write plugs.
Go straight to ->submit_bio or blk_mq_submit_bio to bypass the
superfluous extra freeze protection and checks.
|
[] | null | null | null | null | null |
CVE-2022-47648
|
An Improper Access Control vulnerability allows an attacker to access the control panel of the B420 without requiring any sort of authorization or authentication due to the IP based authorization. If an authorized user has accessed a publicly available B420 product using valid credentials, an insider attacker can gain access to the same panel without requiring any sort of authorization. The B420 module was already obsolete at the time this vulnerability was found (The End of Life announcement was made in 2013).
|
[
"cpe:2.3:o:bosch:b420_firmware:02.02.0001:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:b420:-:*:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
|
GHSA-3749-62f5-h6xh
|
Missing Authorization vulnerability in Fatcat Apps Landing Page Cat.This issue affects Landing Page Cat: from n/a through 1.7.4.
|
[] | null | 5.4 | null | null | null |
|
GHSA-m2h9-c2v8-hj79
|
Mikrotik RouterOs before 6.44.6 (long-term tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/cerm process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
|
[] | null | 6.5 | null | null | null |
|
CVE-2006-4580
|
register.php in The Address Book 1.04e allows remote attackers to bypass the "Allow User Self-Registration" setting and create arbitrary users by setting the mode parameter to "confirm".
|
[
"cpe:2.3:a:the_address_book:the_address_book:1.04e:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-2mff-f6qm-822q
|
A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for UBI_IOCATT, because kobj->name is not released.
|
[] | null | 5.5 | null | null | null |
|
GHSA-j49f-932x-4prx
|
Netscape Navigator 7.1 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
|
[] | null | null | null | null | null |
|
GHSA-f2gv-fw5f-xgjx
|
The Server Service (SRV.SYS driver) in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 up to SP1, and other products, allows remote attackers to obtain sensitive information via crafted requests that leak information in SMB buffers, which are not properly initialized, aka "SMB Information Disclosure Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2016-0542
|
Unspecified vulnerability in the Oracle Field Service component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via unknown vectors related to Field Service Map.
|
[
"cpe:2.3:a:oracle:field_service:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:field_service:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:field_service:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:field_service:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:field_service:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:field_service:12.2.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2018:0521
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null | null |
GHSA-7mmm-q9r4-mm4v
|
Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
|
[] | null | null | null | null | null |
|
RHSA-2023:5731
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null | null |
GHSA-ww5v-8cqx-53r8
|
NVIDIA GPU Display Driver for Windows contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll), where an unauthorized attacker on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution to cause denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components.
|
[] | null | 8.5 | null | null | null |
|
CVE-2017-9306
|
inc/SP/Html/Html.class.php in sysPass 2.1.9 allows remote attackers to bypass the XSS filter, as demonstrated by use of an "<svg/onload=" substring instead of an "<svg onload=" substring.
|
[
"cpe:2.3:a:syspass:syspass:2.1.9:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2024-5245
|
NETGEAR ProSAFE Network Management System Default Credentials Local Privilege Escalation Vulnerability
|
NETGEAR ProSAFE Network Management System Default Credentials Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the product installer. The issue results from the use of default MySQL credentials. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22755.
|
[
"cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.34:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2010-0391
|
Multiple stack-based buffer overflows in Embarcadero Technologies InterBase SMP 2009 9.0.3.437 allow remote attackers to execute arbitrary code via unknown vectors involving crafted packets. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:embarcadero:interbase_smp_2009:9.0.3.437:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-43274
|
A privacy issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.6. A sandboxed process may be able to circumvent sandbox restrictions.
|
[] | null | 4.4 | null | null | null |
|
RHSA-2013:1850
|
Red Hat Security Advisory: openjpeg security update
|
openjpeg: multiple denial of service flaws openjpeg: heap-based buffer overflows openjpeg: out-of-bounds memory read flaws openjpeg: heap-based buffer overflows in version 1.3
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null | null |
CVE-2020-8638
|
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
|
[
"cpe:2.3:a:testlink:testlink:1.9.20:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-5rp3-9frh-m3wx
|
A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.
|
[] | null | 6.7 | null | null | null |
|
GHSA-w94h-9p28-g2v3
|
Tenda AC6 V15.03.06.23_multi is vulnerable to Buffer Overflow in the formSetCfm function.
|
[] | null | 7.5 | null | null | null |
|
GHSA-hjvr-v7mw-6f2j
|
Server-Side Request Forgery vulnerability in SLims version 9.6.0. This vulnerability could allow an authenticated attacker to send requests to internal services or upload the contents of relevant files via the "scrape_image.php" file in the imageURL parameter.
|
[] | null | 9.9 | null | null | null |
|
GHSA-w42f-mvfv-2f9r
|
Ananta Gazelle 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/template.php and certain other files.
|
[] | null | null | null | null | null |
|
GHSA-fhx9-p329-4x23
|
The iframe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `iframe` shortcode in versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permission and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This was partially patched in version 4.6 and fully patched in version 4.7.
|
[] | null | 6.4 | null | null | null |
|
GHSA-g826-ww3p-93hh
|
Stack-based buffer overflow in the reader in CoolPDF 3.0.2.256 allows remote attackers to execute arbitrary code via a PDF document with a crafted stream.
|
[] | null | null | null | null | null |
|
GHSA-282v-8gf3-6m78
|
Cross-site request forgery (CSRF) vulnerability in phpMyAdmin 2.7.0 allows remote attackers to perform unauthorized actions as a logged-in user via a link or IMG tag to server_privileges.php, as demonstrated using the dbname and checkprivs parameters. NOTE: the provenance of this issue is unknown, although third parties imply that it is related to the disclosure of CVE-2005-4349, which was labeled as SQL injection but disputed.
|
[] | null | null | null | null | null |
|
CVE-2024-22080
|
An issue was discovered in Elspec G5 digital fault recorder versions 1.1.4.15 and before. Unauthenticated memory corruption can occur during XML body parsing.
|
[
"cpe:2.3:a:elspec:g5_digital_fault_recorder:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-68jf-xfpm-34w7
|
In the Linux kernel, the following vulnerability has been resolved:crypto: qat - add param check for DHReject requests with a source buffer that is bigger than the size of the
key. This is to prevent a possible integer underflow that might happen
when copying the source scatterlist into a linear buffer.
|
[] | null | 5.5 | null | null | null |
|
GHSA-6g5w-7qx6-q4pr
|
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.