id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-j279-9hf3-534v
Hospital Management System in PHP with Source Code (HMS) 1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in room.php.
[]
null
9.8
null
null
RHSA-2021:3436
Red Hat Security Advisory: kpatch-patch security update
kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
GHSA-242h-9g3g-w3fx
GreenCMS 2.3.0603 has an arbitrary file download vulnerability via an index.php?m=admin&c=media&a=downfile URI.
[]
null
null
7.5
null
CVE-2024-11656
EnGenius ENH1350EXT/ENS500-AC/ENS620EXT diag_ping6 command injection
A vulnerability, which was classified as critical, has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This issue affects some unknown processing of the file /admin/network/diag_ping6. The manipulation of the argument diag_ping6 leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:engenius:enh1350ext:20241118:*:*:*:*:*:*:*", "cpe:2.3:a:engenius:ens500-ac:20241118:*:*:*:*:*:*:*", "cpe:2.3:a:engenius:ens620ext:20241118:*:*:*:*:*:*:*", "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*", "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*" ]
5.1
4.7
4.7
5.8
CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
[ "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:a:gnu:coreutils:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:5.91:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:5.92:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:5.93:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:5.94:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:5.95:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:5.96:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:5.97:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.8:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.9:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:coreutils:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" ]
null
null
null
4.4
CVE-2022-48199
SoftPerfect NetWorx 7.1.1 on Windows allows an attacker to execute a malicious binary with potentially higher privileges via a low-privileged user account that abuses the Notifications function. The Notifications function allows for arbitrary binary execution and can be modified by any user. The resulting binary execution will occur in the context of any user running NetWorx. If an attacker modifies the Notifications function to execute a malicious binary, the binary will be executed by every user running NetWorx on that system.
[ "cpe:2.3:a:softperfect:networx:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-47cw-xf65-434r
Memory leak in Cisco IOS 12.4, 15.0, and 15.1, and IOS XE 2.5.x through 3.2.x, allows remote attackers to cause a denial of service (memory consumption) via a crafted SIP message, aka Bug ID CSCti48504.
[]
null
null
null
null
CVE-2019-9536
Apple iPhone 3GS bootrom malloc implementation returns a non-NULL pointer when unable to allocate memory, aka 'alloc8'. An attacker with physical access to the device can install arbitrary firmware.
[ "cpe:2.3:h:apple:iphone_3gs:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2020-2924
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
null
4.9
null
GHSA-h459-7mrx-8pvc
rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable
[]
null
5.5
null
null
RHSA-2020:1344
Red Hat Security Advisory: virt:rhel security update
QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
5.6
null
null
RHBA-2024:2862
Red Hat Bug Fix Advisory: Multicluster Engine for Kubernetes 2.5.3 bug fixes and container updates
follow-redirects: Possible credential leak
[ "cpe:/a:redhat:multicluster_engine:2.5::el8" ]
null
6.5
null
null
GHSA-28q4-j765-rwrg
Cross-site scripting (XSS) vulnerability in the Terminal PHP Shell (terminal) extension 0.3.2 and earlier for TYPO3 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-7vmv-mpx6-985j
Baicells Nova436Q and Neutrino 430 devices with firmware through QRTB 2.7.8 have hardcoded credentials that are easily discovered, and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
[]
null
9.8
null
null
CVE-2019-6692
A malicious DLL preload vulnerability in Fortinet FortiClient for Windows 6.2.0 and below allows a privileged attacker to perform arbitrary code execution via forging that DLL.
[ "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*" ]
null
7.8
null
4.4
GHSA-wg55-v4qx-w8g3
In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.
[]
null
null
5.9
null
CVE-2022-32749
Apache Traffic Server: Improperly handled requests can cause crashes in specific plugins
Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.
[ "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-wrvj-wm63-g44c
The My Mobile Day (aka com.mymobileday) application 1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2007-6083
SQL injection vulnerability in admin/index.php in IceBB 1.0-rc6 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header.
[ "cpe:2.3:a:icebb:icebb:1.0-rc6:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-3p86-xgrq-m6p6
Improper Neutralization of Input During Web Page Generation in Apache Tomcat
Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
[]
null
null
null
null
GHSA-xg8v-4hxj-rcfg
String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
[]
null
null
null
null
GHSA-2m4h-74g6-655h
Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0330.
[]
null
null
null
null
CVE-2020-0247
In Threshold::getHistogram of ImageProcessHelper.java, there is a possible crash loop due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1Android ID: A-156087409
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
CVE-2003-1375
Buffer overflow in wall for HP-UX 10.20 through 11.11 may allow local users to execute arbitrary code by calling wall with a large file as an argument.
[ "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*" ]
null
null
null
7.2
RHSA-2021:2543
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.4 security update
libthrift: potential DoS when processing untrusted payloads golang: math/big: panic during recursive division of very large numbers nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions golang: crypto/elliptic: incorrect operations on the P-224 curve nodejs-lodash: command injection via template golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
[ "cpe:/a:redhat:jaeger:1.20::el8" ]
null
5.9
null
null
GHSA-gf92-cf44-4238
In the Linux kernel, the following vulnerability has been resolved:ocfs2: add bounds checking to ocfs2_check_dir_entry()This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don't stray beyond valid memory region.
[]
null
null
null
null
GHSA-9j36-jg73-vfcw
The d8s-domains for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0
[]
null
9.8
null
null
GHSA-r7fv-7h5m-jcwv
Multiple vulnerabilities in the API of Cisco DNA Center Software could allow an authenticated, remote attacker to read information from a restricted container, enumerate user information, or execute arbitrary commands in a restricted container as the root user. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
5.4
null
CVE-2017-8513
A remote code execution vulnerability exists in Microsoft PowerPoint when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability".
[ "cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-82mv-g2x6-p4mx
In the Linux kernel, the following vulnerability has been resolved:iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_clientof_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
[]
null
5.5
null
null
CVE-2023-27347
G DATA Total Security Link Following Local Privilege Escalation Vulnerability
G DATA Total Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the G DATA Backup Service. By creating a symbolic link, an attacker can abuse the service to create arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18749.
[ "cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2023-22243
Adobe Animate SVG file Stack-based Buffer Overflow Arbitrary code execution
Adobe Animate versions 22.0.8 (and earlier) and 23.0.0 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:animate:23.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
RHSA-2019:0544
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update for March 2019
dotnet: NuGet Tampering Vulnerability
[ "cpe:/a:redhat:rhel_dotnet:1.0::el7", "cpe:/a:redhat:rhel_dotnet:1.1::el7", "cpe:/a:redhat:rhel_dotnet:2.1::el7", "cpe:/a:redhat:rhel_dotnet:2.2::el7" ]
null
null
7.8
null
CVE-2015-8578
AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
[ "cpe:2.3:a:avg:internet_security:2015:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-5x58-gqg4-wfvq
SOGo 2.x before 2.4.1 and 3.x through 5.x before 5.1.1 does not validate the signatures of any SAML assertions it receives. Any actor with network access to the deployment could impersonate users when SAML is the authentication method. (Only versions after 2.0.5a are affected.)
[]
null
7.5
null
null
GHSA-r73h-f7r4-p3vq
Unspecified vulnerability in the AirPcap support in Wireshark (formerly Ethereal) 0.99.3 has unspecified attack vectors related to WEP key parsing.
[]
null
null
null
null
RHSA-2016:2039
Red Hat Security Advisory: python-django security update
python-django: CSRF protection bypass on a site with Google Analytics
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
6.1
null
GHSA-r24r-896x-hrvr
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Setting Changs in versions up to, and including, 5.5. This is due to lacking both a security nonce and a capabilities check. This makes it possible for low-authenticated attackers to change plugin settings even when they do not have the capabilities to do so.
[]
null
4.3
null
null
RHSA-2009:1426
Red Hat Security Advisory: openoffice.org security update
OpenOffice.org Word document Integer Underflow OpenOffice.org Word document buffer overflow
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
GHSA-9w28-c8g5-whmh
An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8 allowed an authenticated end-users to find meeting details, if they know the Meeting ID.
[]
null
4.3
null
null
CVE-2018-13902
Out of bounds memory read and access due to improper array index validation may lead to unexpected behavior while decoding XTRA file in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130
[ "cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qc_215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qc_215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-2m74-3m4w-28q3
Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."
[]
null
8.8
null
null
GHSA-vh65-4p7f-vw9q
SQL injection vulnerability in soporte_derecha_w.php in PHP Webquest 2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter.
[]
null
null
null
null
CVE-2023-6901
codelyfe Stupid Simple CMS HTTP POST Request handle-command.php os command injection
A vulnerability, which was classified as critical, was found in codelyfe Stupid Simple CMS up to 1.2.3. This affects an unknown part of the file /terminal/handle-command.php of the component HTTP POST Request Handler. The manipulation of the argument command with the input whoami leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248259.
[ "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
CVE-2021-23452
Prototype Pollution
This affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object.
[ "cpe:2.3:a:binaryops:x-assign:*:*:*:*:*:node.js:*:*" ]
null
8.6
null
null
GHSA-cjjr-h37f-5xw7
An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization.
[]
null
5
null
null
CVE-2016-4391
A remote code execution security vulnerability has been identified in all versions of the HP ArcSight WINC Connector prior to v7.3.0.
[ "cpe:2.3:a:hp:arcsight_winc_connector:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2008-0298
KHTML WebKit as used in Apple Safari 2.x allows remote attackers to cause a denial of service (browser crash) via a crafted web page, possibly involving a STYLE attribute of a DIV element.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2024:2696
Red Hat Security Advisory: unbound security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8
null
null
RHSA-2016:0176
Red Hat Security Advisory: glibc security and bug fix update
glibc: calloc may return non-zero memory glibc: getaddrinfo stack-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
CVE-2018-19993
A reflected cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote attackers to inject arbitrary web script or HTML via the transphrase parameter to public/notice.php.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-hjc4-wr6f-p7xr
Multiple buffer overflows in Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP GET request with a long major version number, (2) an HTTP GET request to the HTTP proxy on port 3128 with a long major version number, (3) a long OK reply from a POP3 server, and (4) a long SMTP server response.
[]
null
null
null
null
CVE-2008-7197
Multiple unspecified vulnerabilities in G15Daemon before 1.9.4 have unknown impact and attack vectors.
[ "cpe:2.3:a:g15tools:g15daemon:*:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.1-2:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.1-02:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.5-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.6a:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.6a-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.2.7-1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.9.0:pre2.0:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:g15tools:g15daemon:1.9.2:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2017-7016
An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "afclip" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted audio file.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2021-25421
Improper log management vulnerability in Galaxy Watch3 PlugIn prior to version 2.2.09.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log.
[ "cpe:2.3:a:samsung:galaxy_watch_3_plugin:*:*:*:*:*:android:*:*" ]
null
5.5
null
2.1
CVE-2024-32077
Apache Airflow: XSS vulnerability in Task Instance Log/Log Details
Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs.  Users are recommended to upgrade to version 2.9.1, which fixes this issue.
[ "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:airflow:2.9.0:-:*:*:*:*:*:*", "cpe:2.3:a:apache:airflow:2.9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:apache:airflow:2.9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:apache:airflow:2.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:apache:airflow:2.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:apache:airflow:2.9.0:rc3:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2019-12472
An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2021-33695
Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate.
[ "cpe:2.3:a:sap:cloud_connector:2.0:*:*:*:*:*:*:*" ]
null
null
6.8
null
CVE-2024-50508
WordPress Woocommerce Product Design plugin <= 1.0.0 - Arbitrary File Download vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Chetan Khandla Woocommerce Product Design allows Path Traversal.This issue affects Woocommerce Product Design: from n/a through 1.0.0.
[]
null
7.5
null
null
CVE-2024-24836
WordPress GDPR Data Request Form Plugin <= 1.6 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Audrasjb GDPR Data Request Form allows Stored XSS.This issue affects GDPR Data Request Form: from n/a through 1.6.
[ "cpe:2.3:a:whodunit:gdpr_data_request_form:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
GHSA-7mv3-28xx-x4w6
Unspecified vulnerability in EMC Avamar 4.1.x and 5.0 before SP1 allows remote attackers to cause a denial of service (gsan service hang) by sending a crafted message using TCP.
[]
null
null
null
null
CVE-2024-2696
Swift Framework < 2024.04.30 - Admin+ Stored XSS via Settings
The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:swift_ideas:socialdriver_framework:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
CVE-2023-28499
WordPress Slide Anything Plugin <= 2.4.9 is vulnerable to Cross Site Scripting (XSS)
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in simonpedge Slide Anything – Responsive Content / HTML Slider and Carousel plugin <= 2.4.9 versions.
[ "cpe:2.3:a:simonpedge:slide_anything-responsive_content\\/html_slider_and_carousel:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2008-1858
SQL injection vulnerability in index.php in 724Networks 724CMS 4.01 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter.
[ "cpe:2.3:a:724cms:724cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-25272
In SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php.
[ "cpe:2.3:a:online_bus_booking_system_project:online_bus_booking_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2023-28613
An issue was discovered in Samsung Exynos Mobile Processor and Baseband Modem Processor for Exynos 1280, Exynos 2200, and Exynos Modem 5300. An integer overflow in IPv4 fragment handling can occur due to insufficient parameter validation when reassembling these fragments.
[ "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*" ]
null
6.8
null
null
CVE-2024-56067
WordPress WP SuperBackup plugin <= 2.3.3 - Unauthenticated Backup File Download Vulnerability
Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3.
[]
null
7.5
null
null
GHSA-jxxr-3crv-vmgr
A sanitization vulnerability exists in Rocket.Chat server versions <3.13.2, <3.12.4, <3.11.4 that allowed queries to an endpoint which could result in a NoSQL injection, potentially leading to RCE.
[]
null
9.8
null
null
GHSA-fhp4-279c-9rhq
In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
[]
null
null
6.5
null
CVE-2023-45171
IBM AIX denial of service
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to cause a denial of service. IBM X-Force ID: 267969.
[ "cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*" ]
null
6.2
null
null
RHSA-2012:0387
Red Hat Security Advisory: firefox security and bug fix update
Mozilla: XSS with multiple Content Security Policy headers (MFSA 2012-15) Mozilla: XSS with Drag and Drop and Javascript: URL (MFSA 2012-13) Mozilla: SVG issues found with Address Sanitizer (MFSA 2012-14) Mozilla: SVG issues found with Address Sanitizer (MFSA 2012-14) Mozilla: Escalation of privilege with Javascript: URL as home page (MFSA 2012-16) Mozilla: Crash when accessing keyframe cssText after dynamic modification (MFSA 2012-17) Mozilla: window.fullScreen writeable by untrusted content (MFSA 2012-18) Mozilla: Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28) (MFSA 2012-19) Mozilla: Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28) (MFSA 2012-19) Mozilla: Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28) (MFSA 2012-19)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
PYSEC-2021-745
null
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
GHSA-58c5-9mqc-q73p
Apport can be tricked into connecting to arbitrary sockets as the root user
[]
null
null
null
null
CVE-2019-16467
Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
[ "cpe:2.3:a:adobe:experience_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.5:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2021-21642
Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[ "cpe:2.3:a:jenkins:config_file_provider:*:*:*:*:*:jenkins:*:*" ]
null
8.1
null
5.5
CVE-2021-22948
Vulnerability in the generation of session IDs in revive-adserver < 5.3.0, based on the cryptographically insecure uniqid() PHP function. Under some circumstances, an attacker could theoretically be able to brute force session IDs in order to take over a specific account.
[ "cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*", "cpe:2.3:a:revive-adserver:revive_adserver:5.3.0:rc1:*:*:*:*:*:*" ]
null
7.1
null
4.3
RHSA-2014:1939
Red Hat Security Advisory: openstack-trove security update
Trove: potential leak of passwords into log files Trove: potential leak of passwords into log files
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
GHSA-fwrg-m5rp-3q8j
A Command Injection issue was discovered in Nortek Linear eMerge E3 series Versions V0.32-07e and prior. A remote attacker may be able to execute arbitrary code on a target machine with elevated privileges.
[]
null
null
9.8
null
GHSA-r58g-p5fc-5h6w
Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810.
[]
null
null
null
null
RHSA-2023:0625
Red Hat Security Advisory: libksba security update
libksba: integer overflow to code execution
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.6
null
null
GHSA-4j35-7cr4-3mc8
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
[]
null
7.4
null
null
CVE-2019-0765
A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory, aka 'Comctl32 Remote Code Execution Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
GHSA-r4vw-x7gf-4r43
Integer overflow in Layout in Google Chrome prior to 129.0.6668.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
CVE-2015-8077
Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the start_octet variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
[ "cpe:2.3:a:cyrus:imap:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cyrus:imap:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cw35-p78f-2qfc
Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow.
[]
null
null
null
null
GHSA-9gf3-h693-qh48
Buffer overflow in asnsp.dll in Aventail Connect 4.1.2.13 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a malformed DNS query.
[]
null
null
null
null
CVE-2023-0096
Happyforms < 1.22.0 - Contributor+ Stored XSS
The Happyforms WordPress plugin before 1.22.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[ "cpe:2.3:a:happyforms:happyforms:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-p2qq-c693-q53w
Restarting a run with revoked script approval allowed by Jenkins Pipeline: Declarative Plugin
Jenkins Pipeline: Declarative Plugin 2.2214.vb_b_34b_2ea_9b_83 and earlier does not check whether the main (Jenkinsfile) script used to restart a build from a specific stage is approved, allowing attackers with Item/Build permission to restart a previous build whose (Jenkinsfile) script is no longer approved. This allows attackers with Item/Build permission to restart a previous build whose (Jenkinsfile) script is no longer approved. Pipeline: Declarative Plugin 2.2218.v56d0cda_37c72 refuses to restart a build whose main (Jenkinsfile) script is unapproved.
[]
null
8
null
null
CVE-2020-11545
Project Worlds Official Car Rental System 1 is vulnerable to multiple SQL injection issues, as demonstrated by the email and parameters (account.php), uname and pass parameters (login.php), and id parameter (book_car.php) This allows an attacker to dump the MySQL database and to bypass the login authentication prompt.
[ "cpe:2.3:a:projectworlds:official_car_rental_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2013-6141
Unspecified vulnerability in op5 Monitor before 6.1.3 allows attackers to read arbitrary files via unknown vectors related to lack of authorization.
[ "cpe:2.3:a:op5:monitor:*:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.7.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:5.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.1.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.1.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:op5:monitor:6.1.2:beta4:*:*:*:*:*:*" ]
null
null
null
5
GHSA-c9w2-52x6-j7c4
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
[]
null
null
7.6
null
CVE-2011-2593
Integer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a crafted Content-Length HTTP header, which triggers a heap-based buffer overflow.
[ "cpe:2.3:a:citrix:access_gateway_plug-in:*:49-5:*:*:enterprise:windows:*:*", "cpe:2.3:a:citrix:access_gateway_plug-in:10.0:*:*:*:enterprise:windows:*:*" ]
null
null
null
6.8
GHSA-8m82-fhxc-h2fw
Grand MA 300 allows retrieval of the access PIN from sniffed data.
[]
null
null
null
null
CVE-2024-45416
The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root.
[ "cpe:2.3:o:zte:zxhn_z500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_e500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_h108n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_e2615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_e2603_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_e2618_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_e1600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_h338a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_h168n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_h168a_firmware:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2024-37047
QTS, QuTS hero
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute code. We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
[]
5.1
null
null
null
CVE-2018-2854
Vulnerability in the Oracle Financial Services Basel Regulatory Capital Basic component of Oracle Financial Services Applications (subcomponent: Portfolio, Attribution). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Basel Regulatory Capital Basic. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Basel Regulatory Capital Basic, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Basel Regulatory Capital Basic accessible data as well as unauthorized read access to a subset of Oracle Financial Services Basel Regulatory Capital Basic accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.2.0.0:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
GHSA-6hjr-885q-f58r
An exploitable buffer overflow vulnerability exists in the Samsung WifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy overflows the destination buffer, which has a size of 40 bytes. An attacker can send an arbitrarily long "cameraIp" value in order to exploit this vulnerability.
[]
null
null
8.8
null
GHSA-vfxp-4fv7-7wjm
Heap-based buffer overflow in BOM BOMArchiveHelper 10.4 (6.3) Build 312, as used in Mac OS X 10.4.6 and earlier, allows user-assisted attackers to execute arbitrary code via a crafted archive (such as ZIP) that contains long path names, which triggers an error in the BOMStackPop function.
[]
null
null
null
null
CVE-2005-4797
Directory traversal vulnerability in printd line printer daemon (lpd) in Solaris 7 through 10 allows remote attackers to delete arbitrary files via ".." sequences in an "Unlink data file" command.
[ "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-5v6r-89x9-4q6j
Cross-site scripting (XSS) vulnerability in search.php in phpInv 0.8.0 allows remote attackers to inject arbitrary web script or HTML via the keyword parameter.
[]
null
null
null
null