id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-pjwm-cr36-mwv3 | ReDoS in giskard's transformation.py (GHSL-2024-324) | ReDoS in Giskard text perturbation detectorA Remote Code Execution (ReDoS) vulnerability was discovered in Giskard component by the [GitHub Security Lab](https://securitylab.github.com) team. When processing datasets with specific text patterns with Giskard detectors, this vulnerability could trigger exponential regex evaluation times, potentially leading to denial of service.DetailsThe vulnerability affects Giskard's punctuation removal transformation used in the text perturbation detection. A regex used to detect URLs and links was vulnerable to catastrophic backtracking that could be triggered by specific patterns in the text.Affected versionGiskard versions prior to 2.15.5 are affected. Users should upgrade to version 2.15.5 or later, which includes a fix for this vulnerability.ImpactThis vulnerability can cause extended computation times or crashes in Giskard when processing text containing certain patterns.CreditThis issue was discovered and reported by GHSL team member [@kevinbackhouse (Kevin Backhouse)](https://github.com/kevinbackhouse). | [] | 6.9 | null | null | null |
GHSA-qpw7-9frf-qxmc | An out-of-bounds write issue exists in the DXF file-recovering procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the context of the current process. | [] | null | 7.8 | null | null |
|
GHSA-3fjc-xv2v-jr9v | Vulnerability in administration server for HP VirtualVault 4.5 on HP-UX 11.04 allows remote web servers or privileged external processes to bypass access restrictions and establish connections to the server. | [] | null | null | null | null |
|
GHSA-g28x-287m-pqv9 | A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. | [] | null | null | 7.8 | null |
|
CVE-2021-45051 | Adobe Bridge JPEG2000 Parsing Use-After-Free Information Disclosure Vulnerability | Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an use-after-free vulnerability in the processing of Format event actions that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
GHSA-fpwq-w33p-2825 | Cross-site scripting (XSS) vulnerability in admin/pages/modify.php in WebsiteBaker 2.8.3 SP3 allows remote attackers to inject arbitrary web script or HTML via the page_id parameter. | [] | null | null | null | null |
|
GHSA-wj32-cjwh-22mg | Missing Authorization vulnerability in Yoast Yoast SEO Premium.This issue affects Yoast SEO Premium: from n/a through 20.4. | [] | null | 5.3 | null | null |
|
RHSA-2021:0436 | Red Hat Security Advisory: OpenShift Container Platform 4.6 compliance-operator security and bug fix update | golang: math/big: panic during recursive division of very large numbers | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
GHSA-gqv4-jgmq-rfxp | Eval injection vulnerability in zp-core/zp-extensions/viewer_size_image.php in ZENphoto 1.4.2, when the viewer_size_image plugin is enabled, allows remote attackers to execute arbitrary PHP code via the viewer_size_image_saved cookie. | [] | null | null | null | null |
|
CVE-2016-9362 | An issue was discovered in WAGO 750-8202/PFC200 prior to FW04 (released August 2015), WAGO 750-881 prior to FW09 (released August 2016), and WAGO 0758-0874-0000-0111. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to edit and to view settings without authenticating. | [
"cpe:2.3:o:wago:pfc200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-xxxx_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:758-xxxx_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:758-874-0000-0111:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | 6.4 |
|
GHSA-h48w-gwfx-2299 | An exploitable denial-of-service vulnerability exists in the lookup entry functionality of KeyTrees in Natus Xltek NeuroWorks 8. A specially crafted network packet can cause an out-of-bounds read, resulting in a denial of service. An attacker can send a malicious packet to trigger this vulnerability. | [] | null | null | 7.5 | null |
|
GHSA-7237-f5g9-xg2m | Directory traversal vulnerability in cgi-bin/sddownload.cgi in D-link IP camera DCS-2103 with firmware 1.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [] | null | null | null | null |
|
GHSA-xvp9-87cv-m4fv | Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 8.8 | null | null |
|
CVE-2010-4858 | Directory traversal vulnerability in team.rc5-72.php in DNET Live-Stats 0.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the showlang parameter. | [
"cpe:2.3:a:joerg_risse:dnet_live-stats:0.8:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-6r6p-3jh3-qx75 | libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site. | [] | null | null | 8.8 | null |
|
GHSA-3896-rgxr-mxjp | An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code. | [] | null | null | 9.8 | null |
|
CVE-2023-29197 | Improper header name validation in guzzlehttp/psr7 | guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade. | [
"cpe:2.3:a:guzzlephp:psr-7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2008-6335 | Directory traversal vulnerability in download.php in eMetrix Online Keyword Research Tool allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter. | [
"cpe:2.3:a:emetrix:online_keyword_research_tool:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-cjp4-93x5-3ww7 | Multiple SQL injection vulnerabilities in Community CMS 0.5 allow remote attackers to execute arbitrary SQL commands via the (1) article_id parameter to view.php and the (2) a parameter in an event action to calendar.php, reachable through index.php. | [] | null | null | null | null |
|
CVE-2024-49897 | drm/amd/display: Check phantom_stream before it is used | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Check phantom_stream before it is used
dcn32_enable_phantom_stream can return null, so returned value
must be checked before used.
This fixes 1 NULL_RETURNS issue reported by Coverity. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2006-2140 | Multiple cross-site scripting (XSS) vulnerabilities in OrbitHYIP 2.0 and earlier allow remote attackers to inject arbitrary web script via the (1) referral parameter to signup.php or (2) id parameter to members.php. | [
"cpe:2.3:a:orbitscripts:orbithyip:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-gvj9-vj2f-wxrh | An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8121. | [] | null | null | 4.7 | null |
|
RHSA-2024:4831 | Red Hat Security Advisory: kernel-rt security update | kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context kernel: net: amd-xgbe: Fix skb data length underflow kernel: vmwgfx: reference count issue leads to use-after-free in surface handling kernel: vmwgfx: race condition leading to information disclosure vulnerability kernel: vmwgfx: double free within the handling of vmw_buffer_object objects kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: uio: Fix use-after-free in uio_open kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() kernel: Bluetooth: hci_codec: Fix leaking content of local_codecs kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue() kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: stack overflow problem in Open vSwitch kernel module leading to DoS kernel: nftables: nft_set_rbtree skip end interval element from gc kernel: netfilter: nft_limit: reject configurations that cause integer overflow kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: net/sched: act_mirred: don't override retval if we already lost the skb kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain kernel: vfio/pci: Lock external INTx masking ops kernel: dm: call the resume method on internal suspend kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path kernel: scsi: qla2xxx: Fix double free of fcport kernel: scsi: qla2xxx: Fix command flush on cable pull kernel: Squashfs: check the inode number is not the invalid value of zero kernel: netfilter: flowtable: validate pppoe header kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: netfilter: nf_tables: do not compare internal table flags on updates kernel: ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion kernel: netfilter: nf_tables: flush pending destroy work before exit_net release kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: tls: fix missing memory barrier in tls_init kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 4.7 | null | null |
GHSA-9qr7-4qc6-v5xg | In the MobileFrontend extension 1.31 through 1.33 for MediaWiki, XSS exists within the edit summary field in includes/specials/MobileSpecialPageFeed.php. | [] | null | 6.1 | null | null |
|
GHSA-2v97-g8xf-h43c | shadow package in SuSE 8.0 allows local users to destroy the /etc/passwd and /etc/shadow files or assign extra group privileges to some users by changing filesize limits before calling programs that modify the files. | [] | null | null | null | null |
|
GHSA-3wf6-qrm5-g4cj | Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets. | [] | null | null | null | null |
|
CVE-2017-15976 | ZeeBuddy 2x allows SQL Injection via the admin/editadgroup.php groupid parameter, a different vulnerability than CVE-2008-3604. | [
"cpe:2.3:a:zeescripts:zeebuddy:2x:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-67xq-pgrv-jjfv | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LogicHunt OWL Carousel – WordPress Owl Carousel Slider allows Stored XSS.This issue affects OWL Carousel – WordPress Owl Carousel Slider: from n/a through 1.4.0. | [] | null | 6.5 | null | null |
|
GHSA-q6vc-g4j4-ccm3 | vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 8 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." | [] | null | null | null | null |
|
ICSA-22-041-04 | Siemens SINEMA Remote Connect Server | Affected products contain an open redirect vulnerability.
An attacker could trick a valid authenticated user to the device into clicking a malicious link there by leading to phishing attacks. | [] | null | 5.4 | null | null |
CVE-2006-4036 | PHP remote file inclusion vulnerability in includes/usercp_register.php in ZoneMetrics ZoneX Publishers Gold Edition 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:zonemetrics:zonex_publishers_gold_edition:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-48871 | Planet Technology Planet WGS-804HPT Stack-based Buffer Overflow | The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution. | [
"cpe:2.3:o:planet_technology_corp:wgs-804hpt_firmware:1.305b210531:*:*:*:*:*:*:*"
] | 9.3 | 9.8 | null | null |
CVE-2024-2565 | PandaXGO PandaX File Extension upload.go unrestricted upload | A vulnerability was found in PandaXGO PandaX up to 20240310. It has been classified as critical. Affected is an unknown function of the file /apps/system/router/upload.go of the component File Extension Handler. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257064. | [
"cpe:2.3:a:panda_xgo:pandax:*:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-jf24-4c4m-c845 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
CVE-2023-38399 | WordPress Phlox Portfolio plugin <= 2.3.1 - Unauthenticated Local File Inclusion vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Averta Phlox Portfolio allows PHP Local File Inclusion.This issue affects Phlox Portfolio: from n/a through 2.3.1. | [] | null | 8.6 | null | null |
CVE-2024-32993 | Out-of-bounds access vulnerability in the memory module
Impact: Successful exploitation of this vulnerability will affect availability. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] | null | 5.6 | null | null |
|
CVE-2024-34802 | WordPress AdFoxly plugin <= 1.8.5 - Broken Access Control vulnerability | Missing Authorization vulnerability in AdFoxly AdFoxly – Ad Manager, AdSense Ads & Ads.Txt.This issue affects AdFoxly – Ad Manager, AdSense Ads & Ads.Txt: from n/a through 1.8.5. | [
"cpe:2.3:a:adfoxly:adfoxly:0:*:*:*:*:*:*:*",
"cpe:2.3:a:wpfoxly:adfoxly:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
GHSA-r7r9-8x8h-443r | Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from hash_questions and fuzz_util.c). | [] | null | 9.8 | null | null |
|
CVE-2018-14707 | Directory traversal in the Drobo Pix web application on Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to upload files to arbitrary locations. | [
"cpe:2.3:o:drobo:5n2_firmware:4.0.5-13.28.96115:*:*:*:*:*:*:*",
"cpe:2.3:h:drobo:5n2:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2020-0977 | A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-0972, CVE-2020-0975, CVE-2020-0976. | [
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2017-14041 | A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution. | [
"cpe:2.3:a:uclouvain:openjpeg:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-764x-99q3-75x3 | The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'import_settings' function in versions 2.7.1 to 2.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator. | [] | null | 8.8 | null | null |
|
CVE-2023-23594 | An authentication bypass vulnerability in the web client interface for the CL4NX printer before firmware version 1.13.3-u724_r2 provides remote unauthenticated attackers with access to execute commands intended only for valid/authenticated users, such as file uploads and configuration changes. | [
"cpe:2.3:o:sato-global:cl4nx_plus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sato-global:cl4nx_plus:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-rxf3-4j6q-q549 | PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17764. | [] | null | null | 7.8 | null |
|
GHSA-r4p4-fgjp-qxm7 | Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech Logi Tune on MacOS allows Local Code Inclusion. | [] | null | 4.4 | null | null |
|
CVE-2014-0747 | The Certificate Authority Proxy Function (CAPF) CLI implementation in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows local users to inject commands via unspecified CAPF programs, aka Bug ID CSCum95493. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2020-27946 | An information disclosure issue was addressed with improved state management. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font may result in the disclosure of process memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-pxp9-4fx7-v479 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6, Safari 16.6. Processing web content may lead to arbitrary code execution. | [] | null | 8.8 | null | null |
|
CVE-2021-3243 | Wfilter ICF 5.0.117 contains a cross-site scripting (XSS) vulnerability. An attacker in the same LAN can craft a packet with a malicious User-Agent header to inject a payload in its logs, where an attacker can take over the system by through its plugin-running function. | [
"cpe:2.3:a:wfiltericf:wfilter_internet_content_filter:5.0.117:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2017-14134 | A Reflected XSS Vulnerability affects the forgotten password page of Maplesoft Maple T.A. 2016.0.6 (Customer Hosted) via the emailAddress parameter to passwordreset/PasswordReset.do, aka Open Bug Bounty ID OBB-286688. | [
"cpe:2.3:a:maplesoft:maple_t.a.:2016.0.6:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2017-12990 | The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions. | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-cmxc-9ghj-jp87 | Insufficient Session Expiration in snipe/snipe-it | Session Fixation in GitHub repository snipe/snipe-it prior to version 6.0.10. The session is not invalidated after a password change. | [] | null | null | 4.6 | null |
CVE-2018-7289 | An issue was discovered in armadito-windows-driver/src/communication.c in Armadito 0.12.7.2. Malware with filenames containing pure UTF-16 characters can bypass detection. The user-mode service will fail to open the file for scanning after the conversion is done from Unicode to ANSI. This happens because characters that cannot be converted from Unicode are replaced with '?' characters. | [
"cpe:2.3:a:teclib-edition:armadito_antivirus:0.12.7.2:*:*:*:*:*:*:*"
] | null | null | 3.3 | 4.3 |
|
CVE-2010-3348 | Microsoft Internet Explorer 6, 7, and 8 does not prevent rendering of cached content as HTML, which allows remote attackers to access content from a different (1) domain or (2) zone via unspecified script code, aka "Cross-Domain Information Disclosure Vulnerability," a different vulnerability than CVE-2010-3342. | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-jqm9-j7qh-gxhh | Missing Authorization vulnerability in Noah Hearle, Design Extreme We’re Open! allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects We’re Open!: from n/a through 1.45. | [] | null | 4.3 | null | null |
|
GHSA-2h8q-72g3-hhfv | The vulnerability is an intent redirection in LG ThinQ Service ("com.lge.lms2") in the "com/lge/lms/things/ui/notification/NotificationManager.java" file. This vulnerability could be exploited by a third-party app installed on an LG device by sending a broadcast with the action "com.lge.lms.things.notification.ACTION". Additionally, this vulnerability is very dangerous because LG ThinQ Service is a system app (having android:sharedUserId="android.uid.system" setting). Intent redirection in this app leads to accessing arbitrary not exported activities of absolutely all apps. | [] | null | 5 | null | null |
|
GHSA-rwvw-fh44-w2r2 | A vulnerability has been found in CodeAstro Hospital Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /backend/admin/his_admin_register_patient.php of the component Add Patient Details Page. The manipulation of the argument pat_fname/pat_ailment/pat_lname/pat_age/pat_dob/pat_number/pat_phone/pat_type/pat_addr leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 3.5 | null | null |
|
GHSA-gjv7-29q4-h4w2 | PHP remote file inclusion vulnerability in myevent.php in myWebland myEvent 1.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter. | [] | null | null | null | null |
|
GHSA-5jfp-rwp9-vrwx | Sensitive Information Disclosure vulnerability discovered by Quiz And Survey Master plugin <= 7.3.10 on WordPress. | [] | null | 7.5 | null | null |
|
RHSA-2022:5641 | Red Hat Security Advisory: kpatch-patch security update | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
CVE-2017-2921 | An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause an integer overflow, leading to a heap buffer overflow and resulting in denial of service and potential remote code execution. An attacker needs to send a specially crafted websocket packet over network to trigger this vulnerability. | [
"cpe:2.3:a:cesanta:mongoose:6.8:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
|
CVE-2016-4218 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2006-6019 | Cross-site scripting (XSS) vulnerability in extensions/googiespell/googlespell_proxy.php in Bill Roberts Bloo 1.0 allows remote attackers to inject arbitrary web script or HTML via the lang parameter. | [
"cpe:2.3:a:bloo:bloo:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-mgpv-2w6f-2v7h | The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message. | [] | null | null | null | null |
|
CVE-2007-5999 | SQL injection vulnerability in product_desc.php in Softbiz Auctions Script allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:softbizscripts:softbiz_auctions_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-3575 | Cross-site Scripting (XSS) - Stored in mindsdb/mindsdb | Cross-site Scripting (XSS) - Stored in mindsdb/mindsdb | [
"cpe:2.3:a:mindsdb:mindsdb:-:*:*:*:*:*:*:*"
] | null | null | 5.8 | null |
CVE-2017-1000369 | Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time. | [
"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.88:rc1:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.88:rc2:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.88:rc3:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.88:rc4:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.88:rc5:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.88:rc6:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:rc1:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:rc2:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:rc3:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:rc4:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:rc5:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:rc6:*:*:*:*:*:*",
"cpe:2.3:a:exim:exim:4.89:rc7:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 4 | null | 2.1 |
|
GHSA-h7fv-hhvw-364h | Directory Traversal vulnerability found in Cryptoprof WCMS v.0.3.2 allows a remote attacker to execute arbitrary code via the wex/cssjs.php parameter. | [] | null | 9.8 | null | null |
|
GHSA-626r-cj47-p49g | Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulnerability | Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.The specific flaw exists within the insertGraphTemplate function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22339. | [] | null | null | 8.8 | null |
GHSA-23px-mw2p-46qm | Cosmos-SDK Cosmovisor component may be vulnerable to denial of service | **Component**: Cosmovisor
**Criticality**: Medium
**Affected Versions**: Cosmovisor < v1.0.0 (distributed with Cosmos-SDK < 0.46)
**Affected Users**: Validators and Node operators utilizing unsupported versions of Cosmovisor
**Impact**: DOS, potential RCE on node depending on configurationAn issue has been identified on unsupported versions of Cosmovisor which may result in a Denial of Service or Remote Code Execution path depending on configuration for a node or validator using the vulnerable version to manage their node.If a validator is utilizing an affected version of Cosmovisor with `DAEMON_ALLOW_DOWNLOAD_BINARIES` set to true, a non-default configuration, it may be possible for an attacker to trigger a Remote Code Execution path as well on the host. In this configuration it is recommended to immediately stop use of the `DAEMON_ALLOW_DOWNLOAD_BINARIES` feature, and then proceed with an upgrade of Cosmovisor.It is recommended that all validators utilizing unsupported versions of Cosmovisor to upgrade to the latest supported versions immediately. If you are utilizing a forked version of Cosmos-SDK, it is recommended to stop use of Cosmovisor until it is possible to update to a supported version of Cosmovisor, whether through your project’s fork, or directly compiled from the Cosmos-SDK. At the time of this advisory, the latest version of Cosmovisor is v1.5.0.Additionally, the Amulet team recommends that developers building chains powered by Cosmos-SDK share this advisory with validators and node operators to ensure this information is available to all impacted parties within their ecosystems.For more information about Cosmovisor, see https://docs.cosmos.network/main/tooling/cosmovisorThis issue was discovered by [Maxwell Dulin](https://maxwelldulin.com) and Nathan Kirkland, who reported it to the Cosmos Bug Bounty Program. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see [https://hackerone.com/cosmos](https://hackerone.com/cosmos).How to tell if I am affected?Running the following command will output whether your cosmovisor version is vulnerable to this issue or not.Vulnerable to this issue:NOT vulnerable to this issue:A Note from Amulet on the Security Advisory ProcessIn the interest of timely resolution of this issue for validators and node operators, the Amulet team has chosen to use existing processes and resources for distributing security advisories within the Cosmos and Interchain Ecosystems. Stay tuned as we implement an improved, more robust security advisory distribution system that will provide equitable access to information about security issues in the Interchain Stack. | [] | null | null | null | null |
CVE-2023-36439 | Microsoft Exchange Server Remote Code Execution Vulnerability | Microsoft Exchange Server Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_13:*:*:*:*:*:*"
] | null | 8 | null | null |
CVE-2000-0429 | A backdoor password in Cart32 3.0 and earlier allows remote attackers to execute arbitrary commands. | [
"cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2012-6709 | ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation. | [
"cpe:2.3:a:elinks:elinks:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.3:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-w2h8-f75c-6252 | MyWebFTP, possibly 5.3.2, stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain an MD5 password hash via a direct request for pass/pass.txt. | [] | null | null | null | null |
|
CVE-2024-11788 | StreamWeasels YouTube Integration <= 1.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting | The StreamWeasels YouTube Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sw-youtube-embed' shortcode in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
CVE-2017-18850 | Certain NETGEAR devices are affected by authentication bypass. This affects D6220 before 1.0.0.26, D6400 before 1.0.0.60, D8500 before 1.0.3.29, R6250 before 1.0.4.12, R6400 before 1.01.24, R6400v2 before 1.0.2.30, R6700 before 1.0.1.22, R6900 before 1.0.1.22, R6900P before 1.0.0.56, R7000 before 1.0.9.4, R7000P before 1.0.0.56, R7100LG before 1.0.0.32, R7300DST before 1.0.0.54, R7900 before 1.0.1.18, R8000 before 1.0.3.44, R8300 before 1.0.2.100_1.0.82, and R8500 before 1.0.2.100_1.0.82. | [
"cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*"
] | null | null | 8.4 | null |
|
GHSA-fhhx-r983-44xc | SSL/TLS certificate validation globally disabled by Jenkins Proxmox Plugin | Jenkins Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation globally for the Jenkins controller JVM when configured to ignore SSL/TLS issues. | [] | null | 4.8 | null | null |
CVE-2006-2098 | PHP remote file inclusion vulnerability in Thumbnail AutoIndex before 2.0 allows remote attackers to execute arbitrary PHP code via (1) README.html or (2) HEADER.html. | [
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php_thumbnail_autoindex:php_thumbnail_autoindex:1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pmp7-xx3c-wr9q | In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: reject QUEUE/DROP verdict parametersThis reverts commit e0abdadcc6e1.core.c:nf_hook_slow assumes that the upper 16 bits of NF_DROP
verdicts contain a valid errno, i.e. -EPERM, -EHOSTUNREACH or similar,
or 0.Due to the reverted commit, its possible to provide a positive
value, e.g. NF_ACCEPT (1), which results in use-after-free.Its not clear to me why this commit was made.NF_QUEUE is not used by nftables; "queue" rules in nftables
will result in use of "nft_queue" expression.If we later need to allow specifiying errno values from userspace
(do not know why), this has to call NF_DROP_GETERR and check that
"err <= 0" holds true. | [] | null | null | null | null |
|
CVE-2022-47714 | Last Yard 22.09.8-1 does not enforce HSTS headers | [
"cpe:2.3:a:lastyard:last_yard:22.09.8-1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-6w57-2xj7-cvqj | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VillaTheme Email Template Customizer for WooCommerce allows Stored XSS.This issue affects Email Template Customizer for WooCommerce: from n/a through 1.2.5. | [] | null | 5.9 | null | null |
|
GHSA-fr5f-66rh-432p | HP has identified a potential vulnerability in BIOS firmware of some Workstation products. Firmware updates are being released to mitigate these potential vulnerabilities. | [] | null | 7.8 | null | null |
|
GHSA-q9qj-gqmf-73c2 | Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | [] | null | 5.5 | null | null |
|
CVE-2018-10093 | AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution. | [
"cpe:2.3:o:audiocodes:420hd_ip_phone_firmware:2.2.12.126:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:420hd_ip_phone:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
GHSA-fccf-p8fx-vjj4 | Moodle vulnerable to PHP object injection attacks | The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on. | [] | null | null | null | null |
GHSA-mjhj-9f4w-v2vv | Disclosure of information - the system allows you to view usernames and passwords without permissions, thus it will be possible to enter the system. Path access: http://api/sys_username_passwd.cmd - The server loads the request clearly by default. Disclosure of hard-coded credit information within the JS code sent to the customer within the Login.js file is a strong user (which is not documented) and also the password, which allow for super-user access. Username: chcadmin, Password: chcpassword. | [] | null | 7.3 | null | null |
|
GHSA-4vhf-2hv7-8mrx | Improper Restriction of XML External Entity Reference in Apache ActiveMQ | XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages. | [] | null | null | 9.8 | null |
GHSA-qhfg-3j7q-77q7 | EXFO - BV-10 Performance Endpoint Unit Undocumented privileged user. Unit has an undocumented hard-coded privileged user. | [] | null | 9.8 | null | null |
|
GHSA-wgrj-cv6h-8597 | Omission of user-controlled key authorization in the IDMSistemas platform, affecting the QSige product. This vulnerability allows an attacker to extract sensitive information from the API by making a request to the parameter '/qsige.locator/quotePrevious/centers/X', where X supports values 1,2,3, etc. | [] | null | 6.5 | null | null |
|
cisco-sa-wbx-linkinj-WWZpVqu9 | Cisco Webex Meetings and Cisco Webex Meetings Server Software Hyperlink Injection Vulnerability | A vulnerability in the user interface of Cisco Webex Meetings and Cisco Webex Meetings Server Software could allow an authenticated, remote attacker to inject a hyperlink into a meeting invitation email.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by entering a URL into a field in the user interface. A successful exploit could allow the attacker to generate a Webex Meetings invitation email that contains a link to a destination of their choosing. Because this email is sent from a trusted source, the recipient may be more likely to click the link.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-linkinj-WWZpVqu9 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-linkinj-WWZpVqu9"] | [] | null | 4.1 | null | null |
GHSA-g2v4-8532-c83r | Win32k Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2025-1001 | Medixant RadiAnt DICOM Viewer Improper Certificate Validation | Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicious update to the user. | [] | 5.7 | 5.7 | null | null |
GHSA-3fw4-4h3m-892h | OS Command Injection in serial-number | serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation. | [] | null | 9.8 | null | null |
GHSA-mx26-62xm-2p83 | Moodle vulnerable to site administration SQL injection via XMLDB editor | A SQL injection risk flaw was found in the XMLDB editor tool available to site administrators. | [] | 6.1 | 7.2 | null | null |
GHSA-mpvr-2998-4q8g | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Tiff_Loader.dll is vulnerable to an out of bounds read past the end of an allocated buffer when parsing TIFF files. An attacker could leverage this vulnerability to leak information in the context of the current process. | [] | null | null | null | null |
|
CVE-2021-38562 | Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm. | [
"cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-j2v3-wwrj-4h89 | Johnson & Johnson Animas OneTouch Ping devices do not use encryption for certain data, which might allow remote attackers to obtain sensitive information by sniffing the network. | [] | null | null | 7.5 | null |
|
CVE-2023-35019 | IBM Security Verify Governance command execution | IBM Security Verify Governance, Identity Manager 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 257873. | [
"cpe:2.3:a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
CVE-2012-2418 | Heap-based buffer overflow in the intu-help-qb (aka Intuit Help System Async Pluggable Protocol) handlers in HelpAsyncPluggableProtocol.dll in Intuit QuickBooks 2009 through 2012, when Internet Explorer is used, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a URI with a % (percent) character as its (1) last or (2) second-to-last character. | [
"cpe:2.3:a:intuit:quickbooks:2009:*:*:*:*:*:*:*",
"cpe:2.3:a:intuit:quickbooks:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:intuit:quickbooks:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:intuit:quickbooks:2012:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-41441 | Multiple cross-site scripting (XSS) vulnerabilities in ReQlogic v11.3 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the POBatch and WaitDuration parameters. | [
"cpe:2.3:a:reqlogic:reqlogic:11.3:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
Subsets and Splits