id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-50157
|
PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains()
|
In the Linux kernel, the following vulnerability has been resolved:
PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains()
of_get_next_child() returns a node pointer with refcount incremented, so we
should use of_node_put() on it when we don't need it anymore.
mc_pcie_init_irq_domains() only calls of_node_put() in the normal path,
missing it in some error paths. Add missing of_node_put() to avoid
refcount leak.
|
[] | null | null | null | null | null |
CVE-2017-17901
|
ZyXEL P-660HW v3 devices allow remote attackers to cause a denial of service (CPU consumption) via a flood of IP packets with a TTL of 1.
|
[
"cpe:2.3:o:zyxel:p-660hw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:p-660hw:v3:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2011-4001
|
Directory traversal vulnerability in HP no Mawashimono Nikki 6.6 and earlier allows remote attackers to read and modify arbitrary files via unspecified vectors.
|
[
"cpe:2.3:a:mawashimono:nikki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.71:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.42:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.71:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.72:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.73:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.74:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.43:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.53:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.54:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.56:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.57:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.58:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.59:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.111:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.141:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.142:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.143:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.144:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.145:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.146:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.147:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.148:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.149:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.151:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.152:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.153:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.154:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.155:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.156:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.157:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.158:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.159:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.161:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.162:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.163:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.231:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.07:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.08:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.09:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.32:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.33:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.34:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.53:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.54:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8pv4-crm6-j87c
|
IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26413.
|
[] | null | null | 7.8 | null | null |
|
CVE-2015-4817
|
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via vectors related to Kernel Zones virtualized NIC driver.
|
[
"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null |
|
GHSA-mmxq-hfwc-p6xp
|
An exploitable buffer overflow vulnerability exists in the samsungWifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. The strcpy at [8] overflows the destination buffer, which has a size of 40 bytes. An attacker can send an arbitrarily long 'callbackUrl' value in order to exploit this vulnerability.
|
[] | null | null | 9.9 | null | null |
|
GHSA-gc7r-mcv2-9fm9
|
Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk.
|
[] | null | 8.6 | null | null | null |
|
GHSA-4vh5-9j7r-fhh8
|
The ABUS Secvest FUMO50110 hybrid module does not have any security mechanism that ensures confidentiality or integrity of RF packets that are exchanged with an alarm panel. This makes it easier to conduct wAppLoxx authentication-bypass attacks.
|
[] | null | null | null | null | null |
|
CVE-2024-38097
|
Azure Monitor Agent Elevation of Privilege Vulnerability
|
Azure Monitor Agent Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_monitor_agent:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
CVE-2021-38496
|
During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2025-9577
|
TOTOLINK X2000R Administrative shadow.sample default credentials
|
A security flaw has been discovered in TOTOLINK X2000R up to 2.0.0. The affected element is an unknown function of the file /etc/shadow.sample of the component Administrative Interface. The manipulation results in use of default credentials. Attacking locally is a requirement. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been released to the public and may be exploited.
|
[] | 2 | 2.5 | 2.5 | 1 | null |
GHSA-p63v-jvxj-6r27
|
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1476.
|
[] | null | 7.8 | null | null | null |
|
GHSA-735q-mc2p-r2jc
|
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.74, R8900 before 1.0.4.28, R9000 before 1.0.4.28, XR500 before 2.3.2.56, XR700 before 1.0.1.10, and RAX120 before 1.0.0.78.
|
[] | null | null | null | null | null |
|
CVE-2025-46834
|
Alchemy's Modular Account can use executeUserOp to bypass allowlist prevalidation hook
|
Alchemy's Modular Account is a smart contract account that is compatible with ERC-4337 and ERC-6900. In versions on the 2.x branch prior to commit 5e6f540d249afcaeaf76ab95517d0359fde883b0, owners of Modular Accounts can grant session keys (scoped external keys) to external parties and would use the allowlist module to restrict which external contracts can be accessed by the session key. There is a bug in the allowlist module in that we don't check for the `executeUserOp` -> `execute` or `executeBatch` path, effectively allowing any session key to bypass any access control restrictions set on the session key. Session keys are able to access ERC20 and ERC721 token contracts amongst others, transferring all tokens from the account out andonfigure the permissions on external modules on session keys. They would be able to remove all restrictions set on themselves this way, or rotate the keys of other keys with higher privileges into keys that they control. Commit 5e6f540d249afcaeaf76ab95517d0359fde883b0 fixes this issue.
|
[] | 6.6 | null | null | null | null |
GHSA-3h7v-p5q7-mcrq
|
SQL injection vulnerability in detail.php in DeltaScripts PHP Classifieds 7.5 and earlier allows remote attackers to execute arbitrary SQL commands via the siteid parameter, a different vector than CVE-2006-5828.
|
[] | null | null | null | null | null |
|
CVE-2008-5407
|
Multiple unspecified vulnerabilities in the Backup Exec remote-agent logon process in Symantec Backup Exec for Windows Servers 11.0 (aka 11d) builds 6235 and 7170, 12.0 build 1364, and 12.5 build 2213 allow remote attackers to bypass authentication, and read or delete files, via unknown vectors.
|
[
"cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:*",
"cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:*",
"cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:*",
"cpe:2.3:a:symantec:backup_exec_for_windows_server:12.5:12.5.2213:*:*:*:*:*:*"
] | null | null | null | 9.4 | null |
|
CVE-2023-51689
|
WordPress Easy Video Player Plugin <= 1.2.2.10 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in naa986 Easy Video Player allows Stored XSS.This issue affects Easy Video Player: from n/a through 1.2.2.10.
|
[
"cpe:2.3:a:noorsplugin:easy_video_player:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
RHSA-2024:7484
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null | null |
CVE-2022-41880
|
ThreadUnsafeUnigramCandidateSampler Heap out of bounds in Tensorflow
|
TensorFlow is an open source platform for machine learning. When the `BaseCandidateSamplerOp` function receives a value in `true_classes` larger than `range_max`, a heap oob read occurs. We have patched the issue in GitHub commit b389f5c944cadfdfe599b3f1e4026e036f30d2d4. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10.0:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
CVE-2024-2344
|
The Avada theme for WordPress is vulnerable to SQL Injection via the 'entry' parameter in all versions up to, and including, 7.11.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticted attackers, with editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[
"cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-79jw-6wg7-r9g4
|
Use of Potentially Dangerous Function in mixme
|
ImpactIn Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).PatchesThe problem is corrected starting with version 0.5.1.ReferencesIssue: https://github.com/adaltas/node-mixme/issues/1
Commit: https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
|
[] | null | 7.1 | null | null | null |
GHSA-8vrv-ffgq-gr22
|
Nukium nkmgls before version 3.0.2 is vulnerable to Cross Site Scripting (XSS) via NkmGlsCheckoutModuleFrontController::displayAjaxSavePhoneMobile.
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-56328
|
HTMLi(XSS without CSP) via Onebox urls in Discourse
|
Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by posting a maliciously crafted onebox url. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should enable CSP, disable inline Oneboxes globally, or allow specific domains for Oneboxing.
|
[] | null | 6.5 | null | null | null |
CVE-2018-5271
|
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e008. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).
|
[
"cpe:2.3:a:malwarebytes:malwarebytes:3.3.1.2183:*:*:*:premium:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
GHSA-836c-6hqw-q9ff
|
The mintToken function of a smart contract implementation for BIGCAdvancedToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | null | 7.5 | null | null |
|
GHSA-h2qc-jgf2-v58v
|
Google Chrome before 9.0.597.107 does not properly perform SVG rendering, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
|
[] | null | null | null | null | null |
|
RHSA-2024:3837
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null | null |
GHSA-4hpf-jm2h-cpfw
|
The WordPress Mega Menu – QuadMenu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the ajax_dismiss_notice() function. This makes it possible for unauthenticated attackers to update any user meta to a value of one, including wp_capabilities which could result in a privilege deescalation of an administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2018:2868
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 1 security and bug fix update
|
tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up tomcat: Open redirect in default servlet
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.0::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:5.0::el7"
] | null | null | 5.3 | null | null |
GHSA-jqjg-937f-3m8h
|
An issue was discovered in LG Bridge before April 2019 on Windows. DLL Hijacking can occur.
|
[] | null | null | null | null | null |
|
CVE-2020-1241
|
A security feature bypass vulnerability exists when Windows Kernel fails to properly sanitize certain parameters.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system.The update addresses the vulnerability by correcting how Windows Kernel handles parameter sanitization., aka 'Windows Kernel Security Feature Bypass Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2023-48369
|
Log Flooding due to specially crafted requests in different endpoints
|
Mattermost fails to limit the log size of server logs allowing an attacker sending specially crafted requests to different endpoints to potentially overflow the log.
|
[
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost:9.1.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2022-2310
|
Skyhigh SWG Authentication bypass vulnerability
|
An authentication bypass vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.12, 9.x prior to 9.2.23, 8.x prior to 8.2.28, and controlled release 11.x prior to 11.2.1 allows a remote attacker to bypass authentication into the administration User Interface. This is possible because of SWG incorrectly whitelisting authentication bypass methods and using a weak crypto password. This can lead to the attacker logging into the SWG admin interface, without valid credentials, as the super user with complete control over the SWG.
|
[
"cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
RHSA-2025:3844
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 5.6 | null | null | null |
GHSA-xx9p-x7xg-8hpx
|
A elevation of privilege vulnerability in the MediaTek networking driver. Product: Android. Versions: Android kernel. Android ID: A-36099953. References: M-ALPS03206781.
|
[] | null | null | 7.8 | null | null |
|
CVE-2007-0659
|
download.php in the MuddyDogPaws FileDownload snippet before 2.5 for MODx allows remote attackers to download arbitrary files, as demonstrated by downloading config.inc.php to obtain database credentials.
|
[
"cpe:2.3:a:modxcms:filedownload:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:modxcms:filedownload:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-mj5m-hchj-w87j
|
PopojiCMS version 2.0.1 is vulnerable to remote command execution in the Meta Social field.
|
[] | null | 7.2 | null | null | null |
|
RHSA-2025:2484
|
Red Hat Security Advisory: firefox security update
|
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null | null |
CVE-2023-33270
|
An issue was discovered in DTS Monitoring 3.57.0. The parameter url within the Curl check function is vulnerable to OS command injection (blind).
|
[
"cpe:2.3:a:dts:monitoring:3.57.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-7mgj-x3mc-f2xq
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15453.
|
[] | null | null | null | null | null |
|
GHSA-5732-h43f-839f
|
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to obtain the devices serial number if physically adjacent and sniffing the RAW WIFI signal.
|
[] | 7.1 | 6.5 | null | null | null |
|
GHSA-j24c-9hrq-7956
|
The AN_GradeBook WordPress plugin through 5.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null | null |
|
CVE-2025-53744
|
An incorrect privilege assignment vulnerability [CWE-266] in FortiOS Security Fabric version 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.0 all versions, 6.4 all versions, may allow a remote authenticated attacker with high privileges to escalate their privileges to super-admin via registering the device to a malicious FortiManager.
|
[
"cpe:2.3:o:fortinet:fortios:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
GHSA-qr6c-xfwp-c8rr
|
Windows Print Spooler Elevation of Privilege Vulnerability
|
[] | null | 7.3 | null | null | null |
|
CVE-2024-35925
|
block: prevent division by zero in blk_rq_stat_sum()
|
In the Linux kernel, the following vulnerability has been resolved:
block: prevent division by zero in blk_rq_stat_sum()
The expression dst->nr_samples + src->nr_samples may
have zero value on overflow. It is necessary to add
a check to avoid division by zero.
Found by Linux Verification Center (linuxtesting.org) with Svace.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2014-2331
|
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
|
[
"cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
CVE-2024-10705
|
Multiple Page Generator Plugin – MPG <= 4.0.5 - Authenticated (Editor+) Server-Side Request Forgery via fileUrl
|
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.5 via the 'mpg_download_file_by_link' function. This makes it possible for authenticated attackers, with editor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
|
[] | null | 5.4 | null | null | null |
GHSA-9772-cwx9-r4cj
|
simplejson before 2.6.1 vulnerable to array index error
|
Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
|
[] | null | null | 5.9 | null | null |
GHSA-qxhm-5fg4-r976
|
Multiple PHP remote file inclusion vulnerabilities in ClanLite 1.23.01.2005 allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) modules/serveur_jeux.php or (2) conf/conf-php.php. NOTE: vector 1 is disputed by CVE because the require_once is only reached when a certain constant has already been defined.
|
[] | null | null | null | null | null |
|
GHSA-2rhf-mvhm-8hfp
|
An unvalidated redirect vulnerability exists in Esri Portal for ArcGIS Quick Capture Web Designer versions 10.8.1 to 10.9.1. A remote, unauthenticated attacker can potentially induce an unsuspecting authenticated user to access an an attacker controlled domain.
|
[] | null | 6.1 | null | null | null |
|
GHSA-33pr-m977-5w97
|
Soft Serve vulnerable to arbitrary file writing through SSH API
|
Attackers can create/override arbitrary files with uncontrolled data.For a PoC, spin up an instance of soft-serve as explained in the README, and execute the following command:It should have created a file in `/tmp/pwned`.
|
[] | null | 7.7 | null | null | null |
CVE-2019-1154
|
Windows Graphics Component Information Disclosure Vulnerability
|
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage.
The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*"
] | null | 5.5 | null | null | null |
CVE-2018-10973
|
An integer overflow in the transferMulti function of a smart contract implementation for KoreaShow, an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets via crafted _value parameters.
|
[
"cpe:2.3:a:koreashow_project:koreashow:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2020-0541
|
Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined",
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:converged_security_management_engine_firmware:14.5.11:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
CVE-2023-27324
|
Parallels Desktop Updater Improper Initialization Local Privilege Escalation Vulnerability
|
Parallels Desktop Updater Improper Initialization Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.
The specific flaw exists within the Updater service. The issue results from the lack of proper initialization of environment variables. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
. Was ZDI-CAN-18229.
|
[
"cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2024-46413
|
Rebuild v3.7.7 was discovered to contain a Server-Side Request Forgery (SSRF) via the type parameter in the com.rebuild.web.admin.rbstore.RBStoreController#loadDataIndex method.
|
[] | null | 5.1 | null | null | null |
|
GHSA-xf8q-6qq2-4pq3
|
A post-authentication buffer overflow vulnerability in the parameter "action" of the CGI program in Zyxel VMG3625-T50B firmware versions through V5.50(ABPM.9.2)C0 could allow an authenticated attacker with administrator privileges to cause a temporary denial of service (DoS) condition against the web management interface by sending a crafted HTTP GET request to a vulnerable device if the function ZyEE is enabled.
|
[] | null | 4.9 | null | null | null |
|
CVE-2020-19950
|
A cross-site scripting (XSS) vulnerability in the /banner/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML.
|
[
"cpe:2.3:a:yzmcms:yzmcms:5.3:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-jgv7-f85p-m95j
|
An authenticated attacker can bypass Server-Side Request Forgery (SSRF) protection in Microsoft Copilot Studio to leak sensitive information over a network.
|
[] | null | 8.5 | null | null | null |
|
GHSA-jvgp-vh46-72jc
|
Unspecified vulnerability in the BI Publisher component in Oracle Application Server 5.6.2, 10.1.3.2.1, and 10.1.3.3.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2009-0990.
|
[] | null | null | null | null | null |
|
cisco-sa-expressway-filewrite-bsFVwueV
|
Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities
|
Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
|
[] | null | 4.9 | null | null | null |
RHSA-2022:0993
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-oslo-utils) security update
|
python-oslo-utils: incorrect password masking in debug output
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 6 | null | null | null |
PYSEC-2021-33
| null |
LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
|
[] | null | null | null | null | null |
CVE-2006-3799
|
DeluxeBB 1.07 and earlier allows remote attackers to bypass SQL injection protection mechanisms via the login variable and certain other variables, by using lowercase "union select" or possibly other statements that do not match the uppercase "UNION SELECT."
|
[
"cpe:2.3:a:deluxebb:deluxebb:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.06:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.07:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-35788
|
Azure Site Recovery Elevation of Privilege Vulnerability
|
Azure Site Recovery Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_site_recovery_vmware_to_azure:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2010-4818
|
The GLX extension in X.Org xserver 1.7.7 allows remote authenticated users to cause a denial of service (server crash) and possibly execute arbitrary code via (1) a crafted request that triggers a client swap in glx/glxcmdsswap.c; or (2) a crafted length or (3) a negative value in the screen field in a request to glx/glxcmds.c.
|
[
"cpe:2.3:a:x.org:x.org:1.7.7:*:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
RHSA-2013:0629
|
Red Hat Security Advisory: jbossweb security update
|
tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null | null |
RHSA-2018:2693
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null | null |
GHSA-r5rv-8pm6-w5ch
|
A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable.
|
[] | null | null | 9.8 | null | null |
|
GHSA-48p4-hjrh-5j5v
|
Cross-site scripting (XSS) vulnerability in Scriptme SmE GB Host 1.21 and SmE Blog Host allows remote attackers to inject arbitrary web script or HTML via the BBcode url tag.
|
[] | null | null | null | null | null |
|
RHSA-2023:3318
|
Red Hat Security Advisory: go-toolset and golang security update
|
golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.3 | null | null | null |
GHSA-cw4g-8v8v-8pww
|
Multiple cross-site scripting (XSS) vulnerabilities in ASPPortal 3.00 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-52974
|
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
If during iscsi_sw_tcp_session_create() iscsi_tcp_r2tpool_alloc() fails,
userspace could be accessing the host's ipaddress attr. If we then free the
session via iscsi_session_teardown() while userspace is still accessing the
session we will hit a use after free bug.
Set the tcp_sw_host->session after we have completed session creation and
can no longer fail.
|
[] | null | 7.8 | null | null | null |
CVE-2025-48391
|
In JetBrains YouTrack before 2025.1.76253 deletion of issues was possible due to missing permission checks in API
|
[] | null | 7.7 | null | null | null |
|
RHSA-2022:5806
|
Red Hat Security Advisory: kernel security update
|
kernel: race condition in perf_event_open leads to privilege escalation kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8 | null | null | null |
CVE-2017-15640
|
app/sections/user-menu.php in phpIPAM before 1.3.1 has XSS via the ip parameter.
|
[
"cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-3c9p-hxf7-xpc6
|
SQL injection vulnerability in spip_acces_doc.php3 in SPIP 1.8.2g and earlier allows remote attackers to execute arbitrary SQL commands via the file parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-38370
|
No authorization of DatabaseConnectController in grafana-connector.
|
Apache IoTDB grafana-connector version 0.13.0 contains an interface without authorization, which may expose the internal structure of database. Users should upgrade to version 0.13.1 which addresses this issue.
|
[
"cpe:2.3:a:apache:iotdb:0.13.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-4fr9-73w7-j6w3
|
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 allows remote attackers to bypass GlobalBlocking extension IP address blocking and create an account via unspecified vectors.
|
[] | null | null | 7.5 | null | null |
|
GHSA-gp9r-j3mw-3g9f
|
A vulnerability in Viber before 10.7.0 for Desktop (Windows) could allow an attacker to execute arbitrary commands on a targeted system. This vulnerability is due to unsafe search paths used by the application URI. An attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. Successful exploitation could cause the application to load libraries from the directory targeted by the URI link. The attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user, if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.
|
[] | null | null | null | null | null |
|
CVE-2016-1000219
|
Kibana before 4.5.4 and 4.1.11 when a custom output is configured for logging in, cookies and authorization headers could be written to the log files. This information could be used to hijack sessions of other users when using Kibana behind some form of authentication such as Shield.
|
[
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-xpg3-c2hf-x9vf
|
A lack of cascading deletes in GitLab CE/EE affecting all versions starting from 13.0 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious Group Owner to retain a usable Group Access Token even after the Group is deleted, though the APIs usable by that token are limited.
|
[] | null | 3.8 | null | null | null |
|
CVE-2020-28010
|
Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
|
[
"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-6wjw-qf87-fv5v
|
Laravel Encrypter Failure to decryption vulnerability
|
A potential exploit of the Laravel Encrypter component that may cause the Encrypter to fail on decryption and unexpectedly return false.To exploit this, the attacker must be able to modify the encrypted payload before it is decrypted. Depending on the code within your application, this could lead to unexpected behavior when combined with weak type comparisons, for example:
|
[] | null | null | null | null | null |
CVE-2013-20001
|
An issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and access is allowed to everyone. IPv6 restrictions from the configuration are not applied.
|
[
"cpe:2.3:a:openzfs:openzfs:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-vf6j-9rv2-rvqj
|
D-Link DIR-2150 GetFirmwareStatus Target Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20561.
|
[] | null | null | 6.8 | null | null |
|
GHSA-6g65-wv5p-gc7r
|
In SonarQube 8.4.2.36762, an external attacker can achieve authentication bypass through SonarScanner. With an empty value for the -D sonar.login option, anonymous authentication is forced. This allows creating and overwriting public and private projects via the /api/ce/submit endpoint.
|
[] | null | null | null | null | null |
|
GHSA-92jh-43m5-5hp6
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-48836
|
Car Rental Script 3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) issues via the name, plugin_sms_api_key, plugin_sms_country_code, calendar_id, title, country name, or customer_name parameter.
|
[
"cpe:2.3:a:phpjabbers:car_rental_script:3.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2022-49239
|
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
|
In the Linux kernel, the following vulnerability has been resolved:
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
The device_node pointer is returned by of_parse_phandle() with refcount
incremented. We should use of_node_put() on it when done.
This is similar to commit 64b92de9603f
("ASoC: wcd9335: fix a leaked reference by adding missing of_node_put")
|
[] | null | 5.5 | null | null | null |
CVE-2020-27351
|
Various memory and file descriptor leaks in apt-python
|
Various memory and file descriptor leaks were found in apt-python files python/arfile.cc, python/tag.cc, python/tarfile.cc, aka GHSL-2020-170. This issue affects: python-apt 1.1.0~beta1 versions prior to 1.1.0~beta1ubuntu0.16.04.10; 1.6.5ubuntu0 versions prior to 1.6.5ubuntu0.4; 2.0.0ubuntu0 versions prior to 2.0.0ubuntu0.20.04.2; 2.1.3ubuntu1 versions prior to 2.1.3ubuntu1.1;
|
[
"cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 2 | null | null | null |
GHSA-67v4-4jpx-67vq
|
The AdView.AdViewer.1 ActiveX control in Autodesk Design Review (ADR) before 2013 Hotfix 1 allows remote attackers to execute arbitrary code via a crafted DWF file.
|
[] | null | null | null | null | null |
|
CVE-2024-3385
|
PAN-OS: Firewall Denial of Service (DoS) when GTP Security is Disabled
|
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
This affects the following hardware firewall models:
- PA-5400 Series firewalls
- PA-7000 Series firewalls
|
[
"cpe:2.3:a:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paloaltonetworks:cloud_ngfw:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paloaltonetworks:prisma_access:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-4r4m-qw57-chr8
|
Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
|
SummaryThe contents of arbitrary files can be returned to the browser.ImpactOnly apps explicitly exposing the Vite dev server to the network (using `--host` or [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host)) are affected.Detailsbase64 encoded content of non-allowed files is exposed using `?inline&import` (originally reported as `?import&?inline=1.wasm?init`)content of non-allowed files is exposed using `?raw?import``/@fs/` isn't needed to reproduce the issue for files inside the project root.PoCOriginal report (check details above for simplified cases):The ?import&?inline=1.wasm?init ending allows attackers to read arbitrary files and returns the file content if it exists. Base64 decoding needs to be performed twiceExample full URL `http://localhost:5173/@fs/C:/windows/win.ini?import&?inline=1.wasm?init`
|
[] | null | 5.3 | null | null | null |
CVE-2013-0353
|
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.1 allows remote attackers to affect integrity via unknown vectors related to Enterprise Configuration Management.
|
[
"cpe:2.3:a:oracle:enterprise_manager_grid_control:10.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_grid_control:11.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_database_control:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_database_control:11.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_database_control:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_plugin_for_database_control:12.1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-6943-qr24-82vx
|
sftpgo vulnerable to brute force takeover of OpenID Connect session cookies
|
ImpactThe OpenID Connect implementation, in the affected SFTPGo versions, allows authenticated users to brute force session cookies and thereby gain access to other users' data, since the cookies are generated predictably using the [xid](https://github.com/rs/xid) library and are therefore unique but not cryptographically secure.PatchesThis issue was fixed in version v2.6.4, where cookies are opaque and cryptographically secure strings.Referenceshttps://github.com/drakkan/sftpgo/commit/f30a9a2095bf90c0661b04fe038e3b7efc788bc6
|
[] | 5.3 | null | null | null | null |
GHSA-9qr4-p2f6-jrj7
|
Cross-site scripting (XSS) vulnerability in Schneider Electric PowerChute Business Edition before 8.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-rvqc-v6vj-m9pw
|
The web container in IBM WebSphere Application Server (WAS) before 6.0.2.21, and 6.1.x before 6.1.0.9, sends response data intended for a different request in certain circumstances after a closed connection error, which might allow remote attackers to obtain sensitive information.
|
[] | null | null | null | null | null |
|
CVE-2015-3681
|
Apple Type Services (ATS) in Apple OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3679, CVE-2015-3680, and CVE-2015-3682.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-32226
|
An improper access control vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to input data in the getUsersOfRoom Meteor server method is not type validated, so that MongoDB query operator objects are accepted by the server, so that instead of a matching rid String a$regex query can be executed, bypassing the room access permission check for every but the first matching room.
|
[
"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.