id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2006-1661
|
Multiple cross-site scripting (XSS) vulnerabilities in SKForum 1.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) areaID parameter in area.View.action, (2) time parameter in planning.View.action, and (3) userID parameter in user.View.action.
|
[
"cpe:2.3:a:sk_soft:skforum:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-x4r8-6j7v-623j
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition component of Oracle Fusion Middleware (subcomponent: Analytics Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | 8.2 | null | null |
|
CVE-2022-20779
|
Cisco Enterprise NFV Infrastructure Software Vulnerabilities
|
Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the root level, or leak system data from the host to the VM. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null | null |
GHSA-q549-78m2-37w7
|
Stack-based buffer overflow in ESTsoft ALZip 8.51 and earlier allows remote attackers to execute arbitrary code via a crafted MS-DOS device file, as demonstrated by use of "AUX" as the initial substring of a filename.
|
[] | null | 7.8 | null | null | null |
|
GHSA-qxqw-pch2-xr57
|
Multiple unspecified vulnerabilities in the G/PGP (GPG) Plugin before 2.1 for Squirrelmail might allow "local authenticated users" to inject certain commands via unspecified vectors. NOTE: this might overlap CVE-2005-1924, CVE-2006-4169, or CVE-2007-3634.
|
[] | null | null | null | null | null |
|
GHSA-9393-hh9g-mwv8
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Peters All-in-one Like Widget allows Stored XSS.This issue affects All-in-one Like Widget: from n/a through 2.2.7.
|
[] | null | 5.9 | null | null | null |
|
GHSA-p5jc-rm9j-xw62
|
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
|
[] | null | null | null | null | null |
|
CVE-2020-22170
|
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\get_doctor.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
|
[
"cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2014:1011
|
Red Hat Security Advisory: resteasy-base security update
|
RESTEasy: XXE via parameter entities
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
CVE-2023-2700
|
A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.
|
[
"cpe:2.3:a:redhat:libvirt:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-j548-j2hv-85jg
|
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 1 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
|
[] | null | 6.9 | null | null | null |
|
CVE-2018-4249
|
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves pktmnglr_ipfilter_input in com.apple.packet-mangler in the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (integer overflow and stack-based buffer overflow) via a crafted app.
|
[
"cpe:2.3:a:apple:apple_tv:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2003-0394
|
objects.inc.php4 in BLNews 2.1.3 allows remote attackers to execute arbitrary PHP code via a Server[path] parameter that points to malicious code on an attacker-controlled web site.
|
[
"cpe:2.3:a:blnews:blnews:2.1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-vwqm-2h3p-mfwj
|
Passage Drive versions v1.4.0 to v1.5.1.0 and Passage Drive for Box version v1.0.0 contain an insufficient data verification vulnerability for interprocess communication. By running a malicious program, an arbitrary OS command may be executed with LocalSystem privilege of the Windows system where the product is running.
|
[] | null | 7.8 | null | null | null |
|
CVE-2010-3447
|
Cross-site scripting (XSS) vulnerability in view.php in the file viewer in Horde Gollem before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the file parameter in a view_file action.
|
[
"cpe:2.3:a:horde:gollem:*:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:gollem:1.1:rc1:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2025:15013
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL code execution in restore operation postgresql: PostgreSQL executes arbitrary code in restore operation
|
[
"cpe:/a:redhat:rhel_e4s:8.8::appstream",
"cpe:/a:redhat:rhel_tus:8.8::appstream"
] | null | 8.8 | null | null | null |
CVE-2020-17046
|
Windows Error Reporting Denial of Service Vulnerability
|
Windows Error Reporting Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-c8hq-rc43-979q
|
A vulnerability has been found in Scada-LTS 2.7.8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /Scada-LTS/app.shtm#/alarms/Scada of the component Message Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 3.5 | null | null | null |
|
GHSA-mq57-j34f-97hj
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
[] | null | 8 | null | null | null |
|
CVE-2024-1545
|
Fault Injection of RSA encryption in WolfCrypt
|
Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the RsaKey structure.
|
[
"cpe:2.3:a:wolfssl:wolfcrypt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wolfssl:wolfssl:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
GHSA-3xhg-f42j-mq9r
|
Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to port scan arbitrary hosts via URLs with modified targets and ports, then comparing the resulting error messages to determine open and closed ports.
|
[] | null | null | null | null | null |
|
RHSA-2020:1176
|
Red Hat Security Advisory: avahi security update
|
avahi: Multicast DNS responds to unicast queries outside of local network
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.8 | null | null |
GHSA-pg7r-qqvh-q4vw
|
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
|
[] | null | null | null | null | null |
|
CVE-2017-3912
|
McAfee Application Control and Change Control (MACC) - password management security feature bypass (SFB) leading to an authentication bypass
|
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
|
[
"cpe:2.3:a:mcafee:application_and_change_control:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:application_and_change_control:7.0.1:*:*:*:*:*:*:*"
] | null | null | 4.4 | null | null |
CVE-2025-1875
|
SQL injection vulnerability in 101news
|
SQL injection vulnerability have been found in 101news affecting version 1.0 through the "searchtitle" parameter in search.php.
|
[] | 9.3 | null | null | null | null |
GHSA-h9jq-pm5v-hr69
|
Multiple SQL injection vulnerabilities in BroadBoard Instant ASP Message Board allow remote attackers to run arbitrary SQL commands via the (1) keywords parameter to search.asp, (2) handle parameter to profile.asp, (3) txtUserHandle parameter to reg2.asp or (4) txtUserEmail parameter to forgot.asp.
|
[] | null | null | null | null | null |
|
ICSA-21-236-03
|
Delta Electronics TPEditor
|
A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code.CVE-2021-33007 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
RHSA-2020:0816
|
Red Hat Security Advisory: firefox security update
|
usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | 6.1 | null | null |
CVE-2024-4272
|
Support SVG < 1.1.0 - Stored XSS via SVG Upload
|
The Support SVG WordPress plugin before 1.1.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.
|
[
"cpe:2.3:a:support_svg:support_svg_wordpress:1.1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
GHSA-4c47-49qq-pq45
|
ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to obtain sensitive information about all managed devices, including their IP addresses and device names.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2023:1598
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null | null |
GHSA-6xq2-jg23-w9hh
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | null | null | null |
|
CVE-2024-24449
|
An uninitialized pointer dereference in the NasPdu::NasPdu component of OpenAirInterface CN5G AMF up to v2.0.0 allows attackers to cause a Denial of Service (DoS) via a crafted InitialUEMessage message sent to the AMF.
|
[
"cpe:2.3:a:openairinterface:cn5g_amf:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2008-3826
|
Unspecified vulnerability in Condor before 7.0.5 allows attackers to execute jobs as other users via unknown vectors.
|
[
"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
RHSA-2020:2404
|
Red Hat Security Advisory: bind security update
|
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.5 | null | null | null |
CVE-2019-12265
|
Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.
|
[
"cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*",
"cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicos:6.2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicos:6.2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicos:6.2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300",
"cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp200",
"cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:power_meter_9410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:power_meter_9410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:power_meter_9810_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:power_meter_9810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2015-1288
|
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2025-54879
|
Mastodon e‑mail throttle misconfiguration allows unlimited email confirmations against unconfirmed emails
|
Mastodon is a free, open-source social network server based on ActivityPub Mastodon which facilitates LDAP configuration for authentication. In versions 3.1.5 through 4.2.24, 4.3.0 through 4.3.11 and 4.4.0 through 4.4.3, Mastodon's rate-limiting system has a critical configuration error where the email-based throttle for confirmation emails incorrectly checks the password reset path instead of the confirmation path, effectively disabling per-email limits for confirmation requests. This allows attackers to bypass rate limits by rotating IP addresses and send unlimited confirmation emails to any email address, as only a weak IP-based throttle (25 requests per 5 minutes) remains active. The vulnerability enables denial-of-service attacks that can overwhelm mail queues and facilitate user harassment through confirmation email spam. This is fixed in versions 4.2.24, 4.3.11 and 4.4.3.
|
[] | null | 5.3 | null | null | null |
CVE-2021-40862
|
HashiCorp Terraform Enterprise up to v202108-1 contained an API endpoint that erroneously disclosed a sensitive URL to authenticated parties, which could be used for privilege escalation or unauthorized modification of a Terraform configuration. Fixed in v202109-1.
|
[
"cpe:2.3:a:hashicorp:terraform_enterprise:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-2wff-jj2f-98c4
|
A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate.
|
[] | null | 5.9 | null | null | null |
|
CVE-2025-54952
|
An integer overflow vulnerability in the loading of ExecuTorch models can cause smaller-than-expected memory regions to be allocated, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 8f062d3f661e20bb19b24b767b9a9a46e8359f2b.
|
[] | null | 9.8 | null | null | null |
|
GHSA-pr8p-6jwr-v79h
|
TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
|
[] | null | 8.8 | null | null | null |
|
CVE-2023-48730
|
A cross-site scripting (xss) vulnerability exists in the navbarMenuAndLogo.php user name functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
|
[
"cpe:2.3:a:wwbn:avideo:15fed957fb:*:*:*:*:*:*:*"
] | null | 8.5 | null | null | null |
|
GHSA-5hqf-7qhr-wqc3
|
Improper Restriction of XML External Entity Reference vulnerability in Jalios JPlatform allows XML Injection.This issue affects all versions of JPlatform 10 before 10.0.8 (SP8).
|
[] | null | 6.8 | null | null | null |
|
RHSA-2018:2669
|
Red Hat Security Advisory: Fuse 7.1 security update
|
1: Class Loader manipulation via request parameters thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data bouncycastle: Information leak in AESFastEngine class bouncycastle: Carry propagation bug in math.raw.Nat??? class bouncycastle: Information exposure in DSA signature generation via timing attack bouncycastle: ECDSA improper validation of ASN.1 encoding of signature bouncycastle: DSA key pair generator generates a weak private key by default bouncycastle: DHIES implementation allowed the use of ECB mode bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack bouncycastle: Other party DH public keys are not fully validated bouncycastle: ECIES implementation allowed the use of ECB mode async-http-client: Invalid URL parsing with '?' undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service spring-framework: Directory traversal vulnerability with static resources on Windows filesystems spring-framework: Multipart content pollution tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution jolokia: Cross site scripting in the HTTP servlet jolokia: JMX proxy mode vulnerable to remote code execution bouncycastle: flaw in the low-level interface to RSA key pair generator
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | null | 4.8 | null | null |
CVE-2016-1136
|
Cross-site scripting (XSS) vulnerability on KDDI HOME SPOT CUBE devices before 2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:o:kddi:home_spot_cube_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:kddi:home_spot_cube:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-2x4v-g8cx-jxrq
|
Login timing attack in ibexa/core
|
Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.
|
[] | null | null | null | null | null |
GHSA-36gq-4prj-vmxm
|
A vulnerability has been found in Tenda AC23 16.03.07.52 and classified as critical. Affected by this vulnerability is the function sub_46C940 of the file /goform/setMacFilterCfg of the component httpd. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 7.4 | 8.8 | null | null | null |
|
RHSA-2024:2720
|
Red Hat Security Advisory: bind and dhcp security update
|
bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance bind: flooding with UPDATE requests may lead to DoS bind9: Parsing large DNS messages may cause excessive CPU load bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null | null |
GHSA-6p5r-xqvf-22q2
|
Cisco IOS 15.2(4)M4 on Cisco Unified Border Element (CUBE) devices allows remote attackers to cause a denial of service (input-queue consumption and traffic-processing outage) via crafted RTCP packets, aka Bug ID CSCuj72215.
|
[] | null | null | null | null | null |
|
GHSA-q5fc-xw2f-m57c
|
Untrusted search path vulnerability in XacRett before 50 allows attackers to execute arbitrary code via a Trojan horse executable file, related to the explorer.exe filename and use of Windows Explorer.
|
[] | null | null | null | null | null |
|
PYSEC-2023-289
| null |
An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
|
[] | null | 8.8 | null | null | null |
GHSA-rqvx-rx9q-529r
|
In gatt_process_prep_write_rsp of gatt_cl.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258652631
|
[] | null | 9.8 | null | null | null |
|
GHSA-3gq8-8fwh-fc7q
|
When closed or sent to the background, Firefox for Android would not properly record and persist HSTS settings.<br>*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 100.
|
[] | null | 6.1 | null | null | null |
|
GHSA-r78f-4q2q-hvv4
|
CL-Signatures Revocation Scheme in Ursa has flaws that allow a holder to demonstrate non-revocation of a revoked credential
|
SummaryThe revocation schema that is part of the Ursa CL-Signatures implementations has a flaw that could impact the privacy guarantees defined by the AnonCreds verifiable credential model, allowing a malicious holder of a revoked credential to generate a valid Non-Revocation Proof for that credential as part of an AnonCreds presentation.DetailsThe revocation schema that is part of the Ursa CL-Signatures implementation has a flaw that could impact the privacy guarantees defined by the AnonCreds verifiable credential model, allowing a malicious holder of a revoked credential to generate a valid Non-Revocation Proof for that credential as part of an AnonCreds presentation.The flaw exists in all CL-Signature versions published from the [Hyperledger Ursa] repository to the [Ursa Rust Crate], and are fixed in all versions published from the [Hyperledger AnonCreds CL-Signatures] repository to the [AnonCreds CL-Signatures Rust Crate].To exploit the flaw, a holder must update their wallet (agent) software, replacing the Hyperledger Ursa or AnonCreds CL-Signatures library that generates the proof of non-revocation. This may involve, for example, altering an iOS or Android application published in the respective app stores. A mitigation for this flaw is to use the application attestation capabilities (such as the Android "[SafetyNet Attestation API]") offered by the app store vendors to (for example) "help determine whether your servers are interacting with your genuine app running on a genuine Android device."The problem is created in the generation of a revocation registry, prior to issuing any credentials. As such, to eliminate the impact of the flaw, the issued credentials must be re-issued based on a correct revocation registry, generated from a correct implementation, such as [Hyperledger AnonCreds CL-Signatures].ImpactThe potential impact is as follows:A verifier may verify a credential from a holder as being "not revoked" when in fact, the holder's credential has been revoked.MitigationUpgrade libraries/applications using the [Ursa Rust Crate] to any version of the [AnonCreds CL-Signatures Rust Crate]. If your application has issued revocable credentials, once the Issuer library has been upgraded, new revocation registries must be created, and credentials issued from revocation registries created with the the flawed software must be revoked and reissued.A verifier can detect if a holder presents a flawed revocable credential.
|
[] | null | 6.5 | null | null | null |
GHSA-9q4p-22w8-h32x
|
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow SQL Injection.
|
[] | null | 9.8 | null | null | null |
|
CVE-2013-1599
|
A Command Injection vulnerability exists in the /var/www/cgi-bin/rtpd.cgi script in D-Link IP Cameras DCS-3411/3430 firmware 1.02, DCS-5605/5635 1.01, DCS-1100L/1130L 1.04, DCS-1100/1130 1.03, DCS-1100/1130 1.04_US, DCS-2102/2121 1.05_RU, DCS-3410 1.02, DCS-5230 1.02, DCS-5230L 1.02, DCS-6410 1.00, DCS-7410 1.00, DCS-7510 1.00, and WCS-1100 1.02, which could let a remote malicious user execute arbitrary commands through the camera’s web interface.
|
[
"cpe:2.3:o:dlink:dcs-3411_firmware:1.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-3411:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-3430_firmware:1.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-3430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-5605_firmware:1.01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-5605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-5635_firmware:1.01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-5635:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-1100l_firmware:1.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-1100l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-1130l_firmware:1.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-1130l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-1100_firmware:1.03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-1100_firmware:1.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-1100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-1130_firmware:1.03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-1130_firmware:1.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-2102_firmware:1.05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-2102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-2121_firmware:1.05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-2121:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-3410_firmware:1.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-3410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-5230_firmware:1.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-5230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-5230l_firmware:1.02:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-5230l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-6410_firmware:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-6410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-7410_firmware:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-7410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-7510_firmware:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-7510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:wcs-1100_firmware:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:wcs-1100:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2021-33210
|
An issue was discovered in Fimer Aurora Vision before 2.97.10. An attacker can (in the WebUI) obtain plant information without authentication by reading the response of APIs from a kiosk view of a plant.
|
[
"cpe:2.3:a:fimer:aurora_vision:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2009-1350
|
Unspecified vulnerability in xtagent.exe in Novell NetIdentity Client before 1.2.4 allows remote attackers to execute arbitrary code by establishing an IPC$ connection to the XTIERRPCPIPE named pipe, and sending RPC messages that trigger a dereference of an arbitrary pointer.
|
[
"cpe:2.3:a:novell:netidentity_client1.2.3:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
ICSA-19-017-01
|
Omron CX-Supervisor (Update A)
|
The application can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.CVE-2018-19011 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). An attacker could inject commands to delete files and/or delete the contents of a file on the device through a specially crafted project file.CVE-2018-19013 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H). An attacker could inject commands to launch programs and create, write, and read files on the device through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application.CVE-2018-19015 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). Several use after free vulnerabilities have been identified. When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.CVE-2018-19017 has been assigned to these vulnerabilities. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). A type confusion vulnerability exists when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.CVE-2018-19019 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). An access of uninitialized pointer vulnerability could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.CVE-2018-19018 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). When processing project files and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.CVE-2018-19020 has been assigned to this vulnerability. A CVSS v3 base score of 2.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)
|
[] | null | null | 2.8 | null | null |
CVE-2015-4956
|
The Web UI in IBM Security QRadar SIEM 7.1.x before 7.1 MR2 Patch 12 allows remote authenticated users to execute unspecified OS commands via unknown vectors.
|
[
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*"
] | null | null | 7.4 | 6.5 | null |
|
GHSA-9x99-qq28-ff9g
|
DMitry (Deepmagic Information Gathering Tool) 1.3a has a format-string vulnerability, with a threat model similar to CVE-2017-7938.
|
[] | null | 8.4 | null | null | null |
|
CVE-2024-42133
|
Bluetooth: Ignore too large handle values in BIG
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: Ignore too large handle values in BIG
hci_le_big_sync_established_evt is necessary to filter out cases where the
handle value is belonging to ida id range, otherwise ida will be erroneously
released in hci_conn_cleanup.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-x59f-6gm6-9rr3
|
A vulnerability in the Local Packet Transport Services (LPTS) ingress frame-processing functionality of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause one of the LPTS processes on an affected system to restart unexpectedly, resulting in a brief denial of service (DoS) condition. The vulnerability is due to incomplete LPTS frame validation by the affected software. An attacker could exploit this vulnerability by sending crafted XML requests to the management interface of an affected system. A successful exploit could allow the attacker to cause one of the LPTS processes on the affected system to restart unexpectedly, which would impact LPTS traffic and cause a brief DoS condition while the process restarts. Cisco Bug IDs: CSCvf76332.
|
[] | null | null | 5.3 | null | null |
|
CVE-2002-1714
|
Microsoft Internet Explorer 5.0 through 6.0 allows remote attackers to cause a denial of service (crash) via an object of type "text/html" with the DATA field that identifies the HTML document that contains the object, which may cause infinite recursion.
|
[
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2007-5501
|
The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.
|
[
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-jqhm-3px3-gp6j
|
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0717.
|
[] | null | null | null | null | null |
|
GHSA-v554-w7jh-rvrh
|
Improper access control in KnoxService prior to SMR Aug-2024 Release 1 allows local attackers to get sensitive information.
|
[] | null | 5.1 | null | null | null |
|
CVE-2008-3001
|
The Aggregation module 5.x before 5.x-4.4 for Drupal allows remote attackers to upload files with arbitrary extensions, and possibly execute arbitrary code, via a crafted feed that allows upload of files with arbitrary extensions.
|
[
"cpe:2.3:a:drupal:aggregation_module:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:aggregation_module:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:aggregation_module:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:aggregation_module:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:aggregation_module:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:aggregation_module:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:aggregation_module:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:aggregation_module:5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-3874-c4vv-qxvf
|
Cross-site scripting (XSS) vulnerability in the PDF functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL in embedded PDF content.
|
[] | null | null | null | null | null |
|
GHSA-gv7m-f47c-w86q
|
A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol processing of Cisco Adaptive Security Appliance (ASA) Software, Cisco Firepower Threat Defense (FTD) Software, Cisco IOS Software, and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability is due to insufficient input validation when processing IKEv2 messages. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition on the affected device.
|
[] | null | 8.6 | null | null | null |
|
GHSA-rccf-5pfw-f89w
|
Multiple cross-site scripting (XSS) vulnerabilities in Maian Cart 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) msg_adminheader, (2) msg_adminheader2, (3) msg_adminheader3, (4) msg_adminheader4, and unspecified other parameters to admin/inc/header.php; the (5) msg_script3 and unspecified other parameters to admin/inc/footer.php; and the (6) keywords parameter to index.php in a search action.
|
[] | null | null | null | null | null |
|
CVE-2023-0264
|
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
|
[
"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*"
] | null | 5 | null | null | null |
|
CVE-2006-3725
|
Norton Personal Firewall 2006 9.1.0.33 allows local users to cause a denial of service (crash) via certain RegSaveKey, RegRestoreKey and RegDeleteKey operations on the (1) HKLM\SYSTEM\CurrentControlSet\Services\SNDSrvc and (2) HKLM\SYSTEM\CurrentControlSet\Services\SymEvent registry keys.
|
[
"cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2021-20608
|
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior allows a remote unauthenticated attacker to cause a DoS condition in GX Works2 by getting GX Works2 to read a tampered program file from a Mitsubishi Electric PLC by sending malicious crafted packets to tamper with the program file.
|
[
"cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2022-48756
|
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
|
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
The function performs a check on the "phy" input parameter, however, it
is used before the check.
Initialize the "dev" variable after the sanity check to avoid a possible
NULL pointer dereference.
Addresses-Coverity-ID: 1493860 ("Null pointer dereference")
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2024-29972
|
** UNSUPPORTED WHEN ASSIGNED **
The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
|
[
"cpe:2.3:o:zyxel:nas326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nas542_firmware:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-h5h9-9h34-qcgr
|
Unrestricted file upload vulnerability in index.php in the Twitter Clone (TClone) plugin for ReVou Micro Blogging allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in settings/my_photo.
|
[] | null | null | null | null | null |
|
GHSA-rg5g-h6w9-p8cj
|
In the Linux kernel, the following vulnerability has been resolved:perf/dwc_pcie: fix duplicate pci_dev devicesDuring platform_device_register, wrongly using struct device
pci_dev as platform_data caused a kmemdup copy of pci_dev. Worse
still, accessing the duplicated device leads to list corruption as its
mutex content (e.g., list, magic) remains the same as the original.
|
[] | null | null | null | null | null |
|
GHSA-ffrh-qjc2-38wm
|
A vulnerability was found in DPDK versions 18.11 and above. The vhost-crypto library code is missing validations for user-supplied values, potentially allowing an information leak through an out-of-bounds memory read.
|
[] | null | null | null | null | null |
|
RHSA-2020:1708
|
Red Hat Security Advisory: liblouis security and bug fix update
|
liblouis: Segmentation fault in logging.c:lou_logPrint() liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c liblouis: Stack-based buffer overflow in compileTranslationTable.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.3 | null | null |
GHSA-rxvw-fjr2-pcjp
|
The IBM Cloud Private Key Management Service (IBM Cloud Private 3.1.1 and 3.1.2) could allow a local user to obtain sensitive from the KMS plugin container log. IBM X-Force ID: 158348.
|
[] | null | null | 5.5 | null | null |
|
GHSA-2hcm-q3f4-fjgw
|
OSV-SCALIBR's Container Image Unpacking Vulnerable to Arbitrary File Write via Path Traversal
|
Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR's unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.
|
[] | 5.7 | null | null | null | null |
CVE-2023-25815
|
Git looks for localized messages in the wrong place
|
In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.
This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\`.
|
[
"cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
GHSA-gvvr-6rwc-2xqj
|
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36714882.
|
[] | null | null | 9.8 | null | null |
|
GHSA-c76g-wq5m-9vjw
|
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17735)
|
[] | null | 7.8 | null | null | null |
|
GHSA-h3j4-28cc-qhhh
|
IBM Sterling File Gateway 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 215889.
|
[] | null | 5.3 | null | null | null |
|
GHSA-qwm9-2pwv-w9mw
|
A blind SQL injection in /admin/?n=logs&c=index&a=dode of Metinfo 7.0 beta allows attackers to access sensitive database information.
|
[] | null | null | null | null | null |
|
GHSA-m24w-wg7m-x27h
|
In OpenEdge Authentication Gateway and AdminServer prior to 11.7.19, 12.2.14, 12.8.1 on all platforms supported by the OpenEdge product, an authentication bypass vulnerability has been identified. The
vulnerability is a bypass to authentication based on a failure to properly
handle username and password. Certain unexpected
content passed into the credentials can lead to unauthorized access without proper
authentication.
|
[] | null | 10 | null | null | null |
|
GHSA-2q5m-qpc5-76wp
|
The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 7.5 | null | null | null |
|
GHSA-3w9q-c44j-37jj
|
High severity vulnerability that affects Microsoft.ChakraCore
|
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783.
|
[] | null | null | 7.5 | null | null |
CVE-2018-11416
|
jpegoptim.c in jpegoptim 1.4.5 (fixed in 1.4.6) has an invalid use of realloc() and free(), which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
|
[
"cpe:2.3:a:jpegoptim_project:jpegoptim:1.4.5:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-c6vm-hjfm-ccrf
|
There is a heap-based buffer overflow in the getString function of util/decompile.c in libming 0.4.8 during a RegisterNumber sprintf. A Crafted input will lead to a denial of service attack.
|
[] | null | null | 6.5 | null | null |
|
GHSA-gc73-9mw9-ww3c
|
Buffer overflow in BankTown Client Control (aka BtCxCtl20Com) 1.4.2.51817, and possibly 1.5.2.50209, allows remote attackers to execute arbitrary code via a long string in the first argument to SetBannerUrl. NOTE: portions of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
RHSA-2024:2912
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.1 | null | null | null |
CVE-2020-12965
|
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.
|
[
"cpe:2.3:o:amd:ryzen_pro_5650g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_5650g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_5650ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_5650ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_5750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_5750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_5750ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_5750ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_5350g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_5350g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_5350ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_5350ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_4750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_4750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_4750ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_4750ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_4650g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_4650g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_4650ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_4650ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_4350g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_4350g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_4350ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_4350ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3400g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3400ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3350g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3350g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3200g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_3200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2400g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_2400g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2400ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_2400ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2200g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_2200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_2200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_pro_3125ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_pro_3125ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_pro_200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_pro_200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4700ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4600ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_4300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_4300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-rw67-g7qx-mx6h
|
Cross-site scripting (XSS) vulnerability in cpaint2.inc.php in the CPAINT library before 2.0.3, as used in multiple scripts, allows remote attackers to inject arbitrary web script or HTML via the cpaint_response_type parameter, which is displayed in a resulting error message, as demonstrated using a hex-encoded IFRAME tag.
|
[] | null | null | null | null | null |
|
GHSA-6w5m-wf37-jjpg
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
CVE-2002-1623
|
The design of the Internet Key Exchange (IKE) protocol, when using Aggressive Mode for shared secret authentication, does not encrypt initiator or responder identities during negotiation, which may allow remote attackers to determine valid usernames by (1) monitoring responses before the password is supplied or (2) sniffing, as originally reported for FireWall-1 SecuRemote.
|
[
"cpe:2.3:a:checkpoint:vpn-1_firewall-1:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:vpn-1_firewall-1:4.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-g2pg-xwqc-r429
|
The YunoHost 2.7.2 through 2.7.14 web application is affected by one HTTP Response Header Injection. This flaw allows an attacker to inject, into the response from the server, one or several HTTP Header. It requires an interaction with the user to send him the malicious link. It could be used to perform other attacks such as user redirection to a malicious website, HTTP response splitting, or HTTP cache poisoning.
|
[] | null | null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.