id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-49086
|
net: openvswitch: fix leak of nested actions
|
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: fix leak of nested actions
While parsing user-provided actions, openvswitch module may dynamically
allocate memory and store pointers in the internal copy of the actions.
So this memory has to be freed while destroying the actions.
Currently there are only two such actions: ct() and set(). However,
there are many actions that can hold nested lists of actions and
ovs_nla_free_flow_actions() just jumps over them leaking the memory.
For example, removal of the flow with the following actions will lead
to a leak of the memory allocated by nf_ct_tmpl_alloc():
actions:clone(ct(commit),0)
Non-freed set() action may also leak the 'dst' structure for the
tunnel info including device references.
Under certain conditions with a high rate of flow rotation that may
cause significant memory leak problem (2MB per second in reporter's
case). The problem is also hard to mitigate, because the user doesn't
have direct control over the datapath flows generated by OVS.
Fix that by iterating over all the nested actions and freeing
everything that needs to be freed recursively.
New build time assertion should protect us from this problem if new
actions will be added in the future.
Unfortunately, openvswitch module doesn't use NLA_F_NESTED, so all
attributes has to be explicitly checked. sample() and clone() actions
are mixing extra attributes into the user-provided action list. That
prevents some code generalization too.
|
[] | null | null | null | null | null |
CVE-2011-3718
|
CMS Made Simple (CMSMS) 1.9.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/TinyMCE/TinyMCE.module.php and certain other files. NOTE: this might overlap CVE-2007-5444.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:1.9.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-7mvm-mjfh-j28w
|
NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the user mode video driver trace logger component. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges.
|
[] | null | null | null | null | null |
|
CVE-2017-8703
|
The Microsoft Windows Subsystem for Linux on Microsoft Windows 10 1703 allows a denial of service vulnerability when it improperly handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability".
|
[
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 | null |
|
CVE-2013-3322
|
NetApp OnCommand System Manager 2.1 and earlier allows remote attackers to inject arbitrary commands in the Halt/Reboot interface.
|
[
"cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 9 | null |
|
CVE-2016-9130
|
Revive Adserver before 3.2.3 suffers from Persistent XSS. A vector for persistent XSS attacks via the Revive Adserver user interface exists, requiring a trusted (non-admin) account. The website name wasn't properly escaped when displayed in the campaign-zone.php script.
|
[
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2019-8218
|
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-47767
|
Tuleap lists trackers in the quick add actions of the backlog without any permissions check
|
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, users might see tracker names they should not have access to. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue.
|
[
"cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:enalean:tuleap_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-xpmp-pq5g-mgh6
|
In the Linux kernel, the following vulnerability has been resolved:tracing/eprobes: Have event probes be consistent with kprobes and uprobesCurrently, if a symbol "@" is attempted to be used with an event probe
(eprobes), it will cause a NULL pointer dereference crash.Both kprobes and uprobes can reference data other than the main registers.
Such as immediate address, symbols and the current task name. Have eprobes
do the same thing.For "comm", if "comm" is used and the event being attached to does not
have the "comm" field, then make it the "$comm" that kprobes has. This is
consistent to the way histograms and filters work.
|
[] | null | null | null | null | null |
|
GHSA-69gg-pwq5-49j3
|
Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
|
[] | null | 7.8 | null | null | null |
|
GHSA-wpg3-8f74-f6m5
|
AIX piodmgrsu command allows local users to gain additional group privileges.
|
[] | null | null | null | null | null |
|
GHSA-89mq-5fqm-7w3m
|
Product: AndroidVersions: Android kernelAndroid ID: A-234657153References: N/A
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-12194
|
A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable.
|
[
"cpe:2.3:a:spice-gtk_project:spice-gtk:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
ICSA-22-034-01
|
Sensormatic PowerManage (Update A)
|
The affected product does not properly validate user input, allowing an attacker to enter malicious input and potentially gain remote code execution.CVE-2021-44228 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | 10 | null | null |
CVE-2015-3949
|
Sinapsi eSolar Light with firmware before 2.0.3970_schsl_2.2.85 allows attackers to discover cleartext passwords by reading the HTML source code of the mail-configuration page.
|
[
"cpe:2.3:o:sinapsi:esolar_light_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sinapsi:esolar_light:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-g553-6vg2-rpm6
|
fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
|
[] | null | null | null | null | null |
|
CVE-2025-47587
|
WordPress YaySMTP <= 2.6.4 - SQL Injection Vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP allows Blind SQL Injection. This issue affects YaySMTP: from n/a through 2.6.4.
|
[] | null | 7.6 | null | null | null |
CVE-2017-16408
|
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is a part of the WebCapture module. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
CVE-2022-2308
|
A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-q4jg-vc8f-32x5
|
In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, certain tag syntax could be used for XSS, such as via a SCRIPT element.
|
[] | null | null | null | null | null |
|
CVE-2023-1572
|
DataGear Plugin cross site scripting
|
A vulnerability has been found in DataGear up to 1.11.1 and classified as problematic. This vulnerability affects unknown code of the component Plugin Handler. The manipulation leads to cross site scripting. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223564.
|
[
"cpe:2.3:a:datagear:datagear:*:*:*:*:*:*:*:*"
] | null | 2 | 2 | 1.4 |
https://github.com/datageartech/datagear/releases/tag/v1.12.0
|
CVE-2024-40541
|
my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept/build.
|
[
"cpe:2.3:a:witmy:my-springsecurity-plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codermy:my-springsecurity-plus:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null | null |
|
GHSA-2c36-wq4v-5v3h
|
A CORS misconfiguration in danswer-ai/danswer v1.4.1 allows attackers to steal sensitive information such as chat contents, API keys, and other data. This vulnerability occurs due to improper validation of the origin header, enabling malicious web pages to make unauthorized requests to the application's API.
|
[] | null | null | 7.4 | null | null |
|
GHSA-m47c-jf7w-67w3
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
|
[] | null | null | null | null | null |
|
GHSA-cxwh-9cmm-77cp
|
Mattermost fails to honor the ShowEmailAddress setting when constructing a response to the /api/v4/users/me/teams API endpoint, allowing an attacker with team admin privileges to learn the team owner's email address in the response.
|
[] | null | 2.7 | null | null | null |
|
RHSA-2023:4066
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null | null |
CVE-2017-12855
|
Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances, Xen will clear the status bits too early, incorrectly informing the guest that the grant is no longer in use. A guest may prematurely believe that a granted frame is safely private again, and reuse it in a way which contains sensitive information, while the domain on the far end of the grant is still using the grant. Xen 4.9, 4.8, 4.7, 4.6, and 4.5 are affected.
|
[
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 2.1 | null |
|
CVE-2024-11318
|
IDOR vulnerability in AbsysNet
|
An IDOR (Insecure Direct Object Reference) vulnerability has been discovered in AbsysNet, affecting version 2.3.1. This vulnerability could allow a remote attacker to obtain the session of an unauthenticated user by brute-force attacking the session identifier on the "/cgi-bin/ocap/" endpoint.
|
[
"cpe:2.3:a:baratz_innovacion:absysnet:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-g5m4-7273-9563
|
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: View Reports). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Applications Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | null | null | null | null |
|
RHSA-2014:0922
|
Red Hat Security Advisory: httpd24-httpd security update
|
httpd: mod_cache NULL pointer dereference crash httpd: mod_proxy denial of service httpd: mod_deflate denial of service httpd: mod_status heap-based buffer overflow httpd: mod_cgid denial of service
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null | null |
GHSA-5rmx-h57x-xq29
|
In the Linux kernel, the following vulnerability has been resolved:gpiolib: fix memory leak in gpiochip_setup_dev()Here is a backtrace report about memory leak detected in
gpiochip_setup_dev():unreferenced object 0xffff88810b406400 (size 512):
comm "python3", pid 1682, jiffies 4295346908 (age 24.090s)
backtrace:
kmalloc_trace
device_add device_private_init at drivers/base/core.c:3361
(inlined by) device_add at drivers/base/core.c:3411
cdev_device_add
gpiolib_cdev_register
gpiochip_setup_dev
gpiochip_add_data_with_keygcdev_register() & gcdev_unregister() would call device_add() &
device_del() (no matter CONFIG_GPIO_CDEV is enabled or not) to
register/unregister device.However, if device_add() succeeds, some resource (like
struct device_private allocated by device_private_init())
is not released by device_del().Therefore, after device_add() succeeds by gcdev_register(), it
needs to call put_device() to release resource in the error handle
path.Here we move forward the register of release function, and let it
release every piece of resource by put_device() instead of kfree().While at it, fix another subtle issue, i.e. when gc->ngpio is equal
to 0, we still call kcalloc() and, in case of further error, kfree()
on the ZERO_PTR pointer, which is not NULL. It's not a bug per se,
but rather waste of the resources and potentially wrong expectation
about contents of the gdev->descs variable.
|
[] | null | 5.5 | null | null | null |
|
GHSA-ccgc-crp4-f2mf
|
utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument.
|
[] | null | null | null | null | null |
|
CVE-2017-18397
|
cPanel before 68.0.15 does not preserve permissions for local backup transport (SEC-330).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 | null |
|
GHSA-v8qq-whm6-fxjh
|
In Emerson Ovation OCR400 Controller 3.3.1 and earlier, a heap-based buffer overflow vulnerability in the embedded third-party FTP server involves improper handling of a long command to the FTP service, which may cause memory corruption that halts the controller or leads to remote code execution and escalation of privileges.
|
[] | null | 8.8 | null | null | null |
|
GHSA-j4x8-g57h-h9h2
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-4931
|
projectworlds Online Lawyer Management System user_registation.php sql injection
|
A vulnerability classified as critical was found in projectworlds Online Lawyer Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /user_registation.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2024-42947
|
An issue in the handler function in /goform/telnet of Tenda FH1201 v1.2.0.14 (408) allows attackers to execute arbitrary commands via a crafted HTTP request.
|
[
"cpe:2.3:o:tenda:fh1201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:fh1201:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-vvq5-3w2j-xf85
|
The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file.
|
[] | null | null | 7.1 | null | null |
|
CVE-2021-20420
|
IBM Security Guardium 11.2 could disclose sensitive information due to reliance on untrusted inputs that could aid in further attacks against the system. IBM X-Force ID: 196281.
|
[
"cpe:2.3:a:ibm:security_guardium:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
|
GHSA-3hgw-75v6-8742
|
An issue in mmzdev KnowledgeGPT V.0.0.5 allows a remote attacker to execute arbitrary code via the Document Display Component.
|
[] | null | 9.8 | null | null | null |
|
GHSA-x68c-22h5-cx6j
|
Kile before 1.9.3 does not assign a backup file the same permissions as the original file, which might allow local users to obtain sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-vcwg-qg38-hv98
|
statsconfig.pl in OmniHTTPd 2.07 allows remote attackers to execute arbitrary commands via the mostbrowsers parameter, whose value is used as part of a generated Perl script.
|
[] | null | null | null | null | null |
|
CVE-2025-3344
|
codeprojects Online Restaurant Management System assign_save.php sql injection
|
A vulnerability was found in codeprojects Online Restaurant Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/assign_save.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-wj9q-g984-cx8g
|
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.
|
[] | null | 7.8 | null | null | null |
|
GHSA-cv2w-7jmr-4jgp
|
Buffer overflow in Dispatch() routine for XFS font server (fs.auto) on Solaris 2.5.1 through 9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a certain XFS query.
|
[] | null | null | null | null | null |
|
CVE-2014-6121
|
Cross-site scripting (XSS) vulnerability in IBM Security AppScan Enterprise 8.5 before 8.5 IFix 002, 8.6 before 8.6 IFix 004, 8.7 before 8.7 IFix 004, 8.8 before 8.8 iFix 003, 9.0 before 9.0.0.1 iFix 003, and 9.0.1 before 9.0.1 iFix 001 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:security_appscan:8.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:8.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan:9.0.0.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:security_appscan_source:9.0.1:*:*:*:enterprise:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-7939-9gq4-g76m
|
SQL injection vulnerability in default.asp in enVivo!CMS allows remote attackers to execute arbitrary SQL commands via the ID parameter in an article action. NOTE: this is probably different from CVE-2005-1413.4.
|
[] | null | null | null | null | null |
|
CVE-2010-4455
|
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.2 and 11.1.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Apache Plugin.
|
[
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2021-33642
|
When a file is processed, an infinite loop occurs in next_inline() of the more_curly() function.
|
[
"cpe:2.3:a:openeuler:byacc:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-rggc-jp5c-hpwc
|
The NVIDIA camera driver in Android before 2016-07-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28026625.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2022:1539
|
Red Hat Security Advisory: xmlrpc-c security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 9.8 | null | null | null |
RHSA-2014:0819
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.2 update
|
Xalan-Java: insufficient constraints in secure processing feature smack: incorrect X.509 certificate validation smack: IQ response spoofing
|
[
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | null | null | null |
CVE-2004-1504
|
The displaycontent function in config.php for Just Another Flat file (JAF) CMS 3.0RC allows remote attackers to gain sensitive information via a blank show parameter, which reveals the installation path in an error message, as demonstrated using index.php.
|
[
"cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2016-7873
|
Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-x4cx-jvhv-54ww
|
The SMB dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service via a malformed SMB packet that triggers a segmentation fault during processing of Selected packets.
|
[] | null | null | null | null | null |
|
GHSA-fvcx-grrr-x536
|
A race condition was addressed with additional validation. This issue affected versions prior toiVersions prior to: OS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
|
[] | null | null | 5.9 | null | null |
|
GHSA-6677-fgc8-98h4
|
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.
|
[] | null | 5.5 | null | null | null |
|
GHSA-368f-29c3-4f2r
|
Data race in conqueue
|
Affected versions of this crate unconditionally implemented `Send`/`Sync` for `QueueSender<T>`, allowing to send non-Send `T` to other threads by invoking `(&QueueSender<T>).send()`.This fails to prevent users from creating data races by sending types like `Rc<T>` or `Arc<Cell<T>>` to other threads, which can lead to memory corruption. The flaw was corrected in commit `1e462c3` by imposing `T: Send` to both `Send`/`Sync` impls for `QueueSender<T>`/`QueueReceiver<T>`.
|
[] | null | 8.1 | null | null | null |
GHSA-7638-p5r3-r7hq
|
Cross-site request forgery (CSRF) vulnerability in the Aggregator module in Drupal 6.x before 6.23 and 7.x before 7.11 allows remote attackers to hijack the authentication of unspecified victims for requests that update feeds and possibly cause a denial of service (loss of updates due to rate limit) via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-jfpv-3cc9-x9c2
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Qode Interactive Qi Blocks.This issue affects Qi Blocks: from n/a through 1.3.2.
|
[] | null | 7.5 | null | null | null |
|
GHSA-76jr-v8fv-fq4w
|
The bfd_make_section_with_flags function in section.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a NULL dereference via a crafted file.
|
[] | null | null | 7.8 | null | null |
|
CVE-2019-16404
|
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
|
[
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
RHSA-2014:0025
|
Red Hat Security Advisory: cfme security, bug fix, and enhancement update
|
CFME: GET request CSRF vulnerability
|
[
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null | null |
GHSA-45mh-qx52-cv3c
|
** DISPUTED ** SQL injection vulnerability in index.php in TYPO3 4.0 allows remote attackers to execute arbitrary SQL commands via the showUid parameter. NOTE: the TYPO3 Security Team disputes this report, stating that "there is no such vulnerability... The showUid parameter is generally used in third-party TYPO3 extensions - not in TYPO3 Core."
|
[] | null | null | null | null | null |
|
RHSA-2024:1409
|
Red Hat Security Advisory: cups security update
|
cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.1 | null | null | null |
CVE-2023-30586
|
A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
|
[
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-9w2h-8g3g-r892
|
PHP remote file inclusion vulnerability in wamp_dir/setup/yesno.phtml in VAMP Webmail 2.0beta1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the no_url parameter.
|
[] | null | null | null | null | null |
|
GHSA-f8q3-43c9-8534
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-29981
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
[
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2007-5096
|
PHP remote file inclusion vulnerability in modules/webmail2/inc/rfc822.php in guanxiCRM Business Solution 0.9.1 allows remote attackers to execute arbitrary PHP code via a URL in the webmail2_inc_dir parameter.
|
[
"cpe:2.3:a:guanxicrm:guanxicrm_business_solution:0.9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2023:3581
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.3 | null | null | null |
CVE-2010-0964
|
SQL injection vulnerability in start.php in Eros Webkatalog allows remote attackers to execute arbitrary SQL commands via the id parameter in a rubrik action.
|
[
"cpe:2.3:a:media-products:eros_webkatalog:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-5q72-4whc-c2w5
|
PingID integration for Windows login prior to 2.9 does not handle duplicate usernames, which can lead to a username collision when two people with the same username are provisioned onto the same machine at different times.
|
[] | null | 3.8 | null | null | null |
|
GHSA-844j-7gfh-gg89
|
Vulnerability in the Hyperion BI+ component of Oracle Hyperion (subcomponent: Foundation UI & Servlets). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion BI+ accessible data as well as unauthorized read access to a subset of Hyperion BI+ accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Hyperion BI+. CVSS 3.0 Base Score 4.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L).
|
[] | null | null | 4.3 | null | null |
|
GHSA-5m99-vrgq-m3ph
|
Open redirect vulnerability in WebPlatform / AppFramework 6.0 through 7.2 in NTT DATA INTRAMART intra-mart allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-gprr-m8wv-39v4
|
In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix potential circular locking issue in smb2_set_ea()smb2_set_ea() can be called in parent inode lock range.
So add get_write argument to smb2_set_ea() not to call nested
mnt_want_write().
|
[] | null | null | null | null | null |
|
ICSA-19-227-01
|
Johnson Controls Metasys
|
Metasys ADS/ADX servers and NAE/NIE/NCE engines make use of a shared RSA key pair for certain encryption operations involving the Site Management Portal (SMP). An attacker with access to the shared RSA key pair could decrypt captured network traffic between the Metasys ADS/ADX servers or NAE/NIE/NCE engines and the connecting SMP user client.CVE-2019-7593 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). Metasys ADS/ADX servers and NAE/NIE/NCE engines make use of a hardcoded RC2 key for certain encryption operations involving the Site Management Portal (SMP). An attacker with access to the hardcoded RC2 key could decrypt captured network traffic between the Metasys ADS/ADX servers or NAE/NIE/NCE engines and the connecting SMP user client.CVE-2019-7594 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
|
[] | null | null | 6.8 | null | null |
CVE-2010-2843
|
Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-3033.
|
[
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
CVE-2025-20637
|
In network HW, there is a possible system hang due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00399035; Issue ID: MSV-2380.
|
[] | null | 7.5 | null | null | null |
|
GHSA-33xw-247w-6hmc
|
BentoML Allows Remote Code Execution (RCE) via Insecure Deserialization
|
SummaryA Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version(v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server.DetailsIt exists an unsafe code segment in `serde.py`:Through data flow analysis, it is confirmed that the `payload `content is sourced from an HTTP request, which can be fully manipulated by the attack. Due to the lack of validation in the code, maliciously crafted serialized data can execute harmful actions during deserialization.PoCEnvironment:Server host:IP: 10.98.36.123OS: UbuntuAttack host:IP: 10.98.36.121OS: UbuntuFollow the instructions on the BentoML official README(https://github.com/bentoml/BentoML) to set up the environment.1.1 Install BentoML (Server host: 10.98.36.123) :
` pip install -U bentoml`1.2 Define APIs in a `service.py` file (Server host: 10.98.36.123) :1.3 Run the service code (Server host: 10.98.36.123) :Start nc listening on the attacking host (Attack host: 10.98.36.121) :
`nc -lvvp 1234`Send maliciously crafted request (Attack host: 10.98.36.121) :Attack success (Attack host: 10.98.36.121) :
The server host(10.98.36.123) has connected to the attacker's host(10.98.36.121) listening on port 1234.
ImpactRemote Code Execution (RCE).
|
[] | null | 9.8 | null | null | null |
CVE-2023-34753
|
bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the tid parameter at admin/index.php?mode=settings&page=tmpl&action=edit.
|
[
"cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-945p-45hq-35x9
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.4 | null | null | null |
|
GHSA-4hwj-mwvm-vc26
|
Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability.This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor.
|
[] | null | 7.1 | null | null | null |
|
CVE-2013-4599
|
The Misery module 6.x-2.x before 6.x-2.5 and 7.x-2.x before 7.x-2.2 for Drupal, when the "delay misery" configuration is set to a high value, allows remote attackers to cause a denial of service (process consumption) via multiple requests.
|
[
"cpe:2.3:a:misery_project:misery:6.x-2.0:-:-:*:-:drupal:*:*",
"cpe:2.3:a:misery_project:misery:6.x-2.1:-:-:*:-:drupal:*:*",
"cpe:2.3:a:misery_project:misery:6.x-2.2:-:-:*:-:drupal:*:*",
"cpe:2.3:a:misery_project:misery:6.x-2.3:-:-:*:-:drupal:*:*",
"cpe:2.3:a:misery_project:misery:6.x-2.4:-:-:*:-:drupal:*:*",
"cpe:2.3:a:misery_project:misery:7.x-2.0:-:-:*:-:drupal:*:*",
"cpe:2.3:a:misery_project:misery:7.x-2.1:-:-:*:-:drupal:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-24mf-qj78-vm87
|
In the Linux kernel, the following vulnerability has been resolved:nfs/localio: must clear res.replen in nfs_local_read_doneOtherwise memory corruption can occur due to NFSv3 LOCALIO reads
leaving garbage in res.replen:nfs3_read_done() copies that into server->read_hdrsize; from there
nfs3_proc_read_setup() copies it to args.replen in new requests.nfs3_xdr_enc_read3args() passes that to rpc_prepare_reply_pages()
which includes it in hdrsize for xdr_init_pages, so that rq_rcv_buf
contains a ridiculous len.This is copied to rq_private_buf and xs_read_stream_request()
eventually passes the kvec to sock_recvmsg() which receives incoming
data into entirely the wrong place.This is easily reproduced with NFSv3 LOCALIO that is servicing reads
when it is made to pivot back to using normal RPC. This switch back
to using normal NFSv3 with RPC can occur for a few reasons but this
issue was exposed with a test that stops and then restarts the NFSv3
server while LOCALIO is performing heavy read IO.
|
[] | null | 7.8 | null | null | null |
|
GHSA-gcwm-ghw7-8j7v
|
phpgurukul Hospital Management System 4.0 is vulnerable to SQL Injection in contact.php via the pagetitle parameter.
|
[] | null | 6.5 | null | null | null |
|
GHSA-pgj4-m7wx-hrhh
|
slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-3w6w-q6rh-xhgj
|
The MW WP Form plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the '_single_file_upload' function in versions up to, and including, 5.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 9.8 | null | null | null |
|
GHSA-v27r-gv4w-5j8g
|
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 7.8 | null | null |
|
GHSA-cjf6-94c6-7rc2
|
Internet Explorer 4.01 allows remote attackers to read arbitrary files by pasting a file name into the file upload control, aka untrusted scripted paste.
|
[] | null | null | null | null | null |
|
CVE-2022-44956
|
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /projects/listprojects.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
|
[
"cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-7756-gjcm-wcwg
|
Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could cause an integer overflow and might reset a process.
|
[] | null | null | 4.3 | null | null |
|
GHSA-h4h6-rmf6-5r65
|
Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request.
|
[] | null | null | null | null | null |
|
GHSA-v7pp-3vgx-6vjw
|
NextGEN Gallery Plugin for WordPress 1.9.10 and 1.9.11 has a Path Disclosure Vulnerability
|
[] | null | null | null | null | null |
|
RHSA-2013:0839
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update
|
Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks tomcat: Session fixation in form authenticator
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null | null |
CVE-2014-8084
|
Directory traversal vulnerability in oc-includes/osclass/controller/ajax.php in OSClass before 3.4.3 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ajaxfile parameter in a custom action.
|
[
"cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-6w4h-8r4c-vp7w
|
Illustrator versions 28.6, 27.9.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2004-0563
|
The tspc.conf configuration file in freenet6 before 0.9.6 and before 1.0 on Debian Linux has world readable permissions, which could allow local users to gain sensitive information, such as a username and password.
|
[
"cpe:2.3:a:freenet6:freenet6:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freenet6:freenet6:1.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2024-12308
|
Logo Slider < 4.6.0 - Contributor+ Stored XSS
|
The Logo Slider WordPress plugin before 4.6.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[] | null | 5.4 | null | null | null |
GHSA-7wv9-64j8-g396
|
In the Linux kernel, the following vulnerability has been resolved:rdma/cxgb4: Prevent potential integer overflow on 32bitThe "gl->tot_len" variable is controlled by the user. It comes from
process_responses(). On 32bit systems, the "gl->tot_len + sizeof(struct
cpl_pass_accept_req) + sizeof(struct rss_header)" addition could have an
integer wrapping bug. Use size_add() to prevent this.
|
[] | null | 5.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.