id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2018-13024 | Metinfo v6.0.0 allows remote attackers to write code into a .php file, and execute that code, via the module parameter to admin/column/save.php in an editor upload action. | [
"cpe:2.3:a:metinfo:metinfo:6.0.0:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 |
|
GHSA-q2x3-46w3-r77p | An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "WindowServer" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] | null | null | 7.8 | null |
|
GHSA-c947-wh56-7wqm | IBM Jazz Foundation is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [] | null | null | 5.4 | null |
|
RHSA-2021:1343 | Red Hat Security Advisory: Ansible security update (2.9.20) | ansible: multiple modules expose secured values | [
"cpe:/a:redhat:ansible_engine:2.9::el7",
"cpe:/a:redhat:ansible_engine:2.9::el8"
] | null | 5 | null | null |
GHSA-2gj9-8rm6-pv54 | A insertion of sensitive information into log file in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.9 may allow an authenticated attacker with at least read-only admin permissions to view encrypted secrets via the FortiPortal System Log. | [] | null | 2.3 | null | null |
|
GHSA-785g-rp7v-287f | jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.article.kit.ArticleNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | [] | null | null | null | null |
|
CVE-2024-38114 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-mjww-934m-h4jw | Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua.Core | A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates. | [] | null | 4.4 | null | null |
CVE-2005-0759 | ImageMagick before 6.0 allows remote attackers to cause a denial of service (application crash) via a TIFF image with an invalid tag. | [
"cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-0066 | Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | [
"cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*",
"cpe:2.3:o:axis:axis_os_2022:-:*:*:*:lts:*:*:*",
"cpe:2.3:o:axis:axis_os:5.51:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-7436-qp9j-h84q | The Javascript engine in Opera 7.23 allows remote attackers to cause a denial of service (crash) by creating a new Array object with a large size value, then writing into that array. | [] | null | null | null | null |
|
CVE-2021-39994 | There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2021-34382 | Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel. | [
"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2009-2611 | Directory traversal vulnerability in infusions/last_seen_users_panel/last_seen_users_panel.php in MyFusion (aka MyF) 6 Beta, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the settings[locale] parameter. | [
"cpe:2.3:a:gander:myfusion:6:beta:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2017-8723 | Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8754. | [
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 |
|
GHSA-fgxx-cm7r-ghp7 | The Anviz Management System for access control has insufficient logging for device events such as door open requests. | [] | null | null | null | null |
|
GHSA-7622-r9xj-6gwh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maxim Glazunov XML for Avito allows Reflected XSS. This issue affects XML for Avito: from n/a through 2.5.2. | [] | null | 7.1 | null | null |
|
GHSA-vx97-8q8q-qgq5 | Mattermost's detailed error messages reveal the full file path | Mattermost versions 9.6.x <= 9.6.0, 9.5.x <= 9.5.2, 9.4.x <= 9.4.4 and 8.1.x <= 8.1.11 fail to remove detailed error messages in API requests even if the developer mode is off which allows an attacker to get information about the server such as the full path were files are stored | [] | null | 4.3 | null | null |
RHSA-2024:0725 | Red Hat Security Advisory: kernel-rt security update | kernel: sctp: fail if no bound addresses can be used for a given scope kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: drivers/usb/storage/ene_ub6250.c kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7 | null | null |
RHBA-2019:2715 | Red Hat Bug Fix Advisory: virt:rhel bug fix update | QEMU: slirp: heap buffer overflow during packet reassembly | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 7 | null |
GHSA-jpc9-rmm6-c6xg | RiSearch 1.0.01 and RiSearch Pro 3.2.06 allows remote attackers to use the show.pl script as an open proxy, or read arbitrary local files, by setting the url parameter to a (1) http://, (2) ftp://, or (3) file:// URL. | [] | null | 9.8 | null | null |
|
GHSA-8889-9g3f-73rj | Pimcore Discloses Usernames In Use | Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users. | [] | null | 7.5 | null | null |
GHSA-gcgj-rj3h-jxpp | SeaCMS 6.64 and 7.2 allows remote attackers to delete arbitrary files via the filedir parameter. | [] | null | 7.5 | null | null |
|
CVE-2025-31575 | WordPress Flag Icons plugin <= 2.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vasilis Triantafyllou Flag Icons allows Stored XSS. This issue affects Flag Icons: from n/a through 2.2. | [] | null | 5.9 | null | null |
CVE-2024-38310 | Improper access control in some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 5.4 | 8.2 | null | null |
|
GHSA-wjcq-p2hh-4gr7 | Toshiba printers will display the password of the admin user in clear-text and additional passwords when sending 2 specific HTTP requests to the internal API. An attacker stealing the cookie of an admin or abusing a XSS vulnerability can recover this password in clear-text and compromise the printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL. | [] | null | 6.5 | null | null |
|
CVE-2023-2533 | PaperCut MF/NG 22.0.10 (Build 65996 2023-03-27) - Remote code execution via CSRF | A Cross-Site Request Forgery (CSRF) vulnerability has been identified in
PaperCut NG/MF, which, under specific conditions, could potentially enable
an attacker to alter security settings or execute arbitrary code. This could
be exploited if the target is an admin with a current login session. Exploiting
this would typically involve the possibility of deceiving an admin into clicking
a specially crafted malicious link, potentially leading to unauthorized changes.
| [
"cpe:2.3:a:papercut:papercut_mf:22.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:papercut:papercut_ng:22.0.10:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
CVE-2023-1074 | A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2024-21512 | Versions of the package mysql2 before 3.9.8 are vulnerable to Prototype Pollution due to improper user input sanitization passed to fields and tables when using nestTables. | [
"cpe:2.3:a:mysql2:mysql2:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
GHSA-pvv9-p2gj-w426 | A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. | [] | null | null | 5.5 | null |
|
GHSA-c2wq-m25g-5c8w | In the Linux kernel, the following vulnerability has been resolved:tracing/probes: fix error check in parse_btf_field()btf_find_struct_member() might return NULL or an error via the
ERR_PTR() macro. However, its caller in parse_btf_field() only checks
for the NULL condition. Fix this by using IS_ERR() and returning the
error up the stack. | [] | null | 5.5 | null | null |
|
GHSA-fc3r-7v33-7x96 | Cross-Site Request Forgery (CSRF) vulnerability in Ciprian Popescu W3P SEO allows Stored XSS.This issue affects W3P SEO: from n/a before 1.8.6. | [] | null | 7.1 | null | null |
|
GHSA-wm46-fj3j-35j9 | In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Absence of length sanity check may lead to possible stack overflow resulting in memory corruption in trustzone region. | [] | null | null | 7.8 | null |
|
CVE-2002-2154 | Directory traversal vulnerability in Monkey HTTP Daemon 0.1.4 allows remote attackers to read arbitrary files via .. (dot dot) sequences. | [
"cpe:2.3:a:monkey-project:monkey:0.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vgr2-h473-jfqv | The RenderTable::simplifiedNormalFlowLayout function in core/rendering/RenderTable.cpp in Blink, as used in Google Chrome before 40.0.2214.91, skips captions during table layout in certain situations, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors related to the Fonts implementation. | [] | null | null | null | null |
|
GHSA-9pwx-6j3h-ffxq | Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access). Supported versions that are affected are 16.2 and 17.1 - 17.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. While the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 7.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). | [] | null | null | 7.7 | null |
|
GHSA-vrc8-63q3-rgq3 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [] | null | null | null | null |
|
CVE-2016-1000155 | Reflected XSS in wordpress plugin wpsolr-search-engine v7.6 | [
"cpe:2.3:a:wpsolr:wpsolr-search-engine:7.6:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2010-4540 | Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS > LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-w66m-7qj6-9pv2 | In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter. | [] | null | null | null | null |
|
CVE-2024-52367 | IBM Concert Software information disclosure | IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system. | [
"cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.3:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2021-21167 | Use after free in bookmarks in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-5jgj-h9wp-53fr | Known vulnerable to code execution via SVG file in v1.3.1 | An issue in the isSVG() function of Known v1.3.1 allows attackers to execute arbitrary code via a crafted SVG file.The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently on the `dev` branch of the idno/known repository. | [] | null | 6.1 | null | null |
RHSA-2025:4797 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Privilege escalation in Firefox Updater firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames firefox: thunderbird: Unsafe attribute access during XPath parsing firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
CVE-2015-8814 | Umbraco before 7.4.0 allows remote attackers to bypass anti-forgery security measures and conduct cross-site request forgery (CSRF) attacks as demonstrated by editing user account information in the templates.asmx.cs file. | [
"cpe:2.3:a:umbraco:umbraco:7.3.8:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2024-11971 | Guizhou Xiaoma Technology jpress Avatar upload cross site scripting | A vulnerability classified as problematic was found in Guizhou Xiaoma Technology jpress 5.1.2. Affected by this vulnerability is an unknown functionality of the file /commons/attachment/upload of the component Avatar Handler. The manipulation of the argument files leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:jpress:jpress:5.1.2:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 |
GHSA-hvfh-qhgx-vqxm | The Contact Form Builder by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2022-23320 | XMPie uStore 12.3.7244.0 allows for administrators to generate reports based on raw SQL queries. Since the application ships with default administrative credentials, an attacker may authenticate into the application and exfiltrate sensitive information from the database. | [
"cpe:2.3:a:xerox:xmpie_ustore:12.3.7244.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-cvxv-rh32-gj86 | On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system. | [] | null | 7.5 | null | null |
|
CVE-2018-13338 | System command injection in ajaxdata.php in TerraMaster TOS version 3.1.03 allows attackers to execute system commands via the "username" parameter during user creation. | [
"cpe:2.3:o:terra-master:terramaster_operating_system:3.1.03:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-w6pj-h54r-cg97 | The DeviceManager in Huawei OceanStor UDS devices with software before V100R002C01SPC102 might allow remote attackers to obtain sensitive information via a crafted UDS patch with JavaScript. | [] | null | null | 7.5 | null |
|
GHSA-6427-rmfx-x2xr | Multiple stack-based buffer overflows in the AVCC reassembly implementation in Utils.cpp in libstagefright in MediaMuxer in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allow remote attackers to execute arbitrary code via a crafted media file, aka internal bug 29161888. | [] | null | null | 7.8 | null |
|
CVE-2023-38022 | An issue was discovered in Fortanix EnclaveOS Confidential Computing Manager (CCM) Platform before 3.29 for Intel SGX. Insufficient pointer validation allows a local attacker to access unauthorized information. This relates to strlen and sgx_is_within_user. | [
"cpe:2.3:a:fortanix:confidential_computing_manager:*:*:*:*:*:intel_software_guard_extensions:*:*"
] | null | 5.5 | null | null |
|
CVE-2008-4297 | Mercurial before 1.0.2 does not enforce the allowpull permission setting for a pull operation from hgweb, which allows remote attackers to read arbitrary files from a repository via an "hg pull" request. | [
"cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2024:1492 | Red Hat Security Advisory: thunderbird security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
CVE-2022-20109 | In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915. | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2007-6102 | Cross-site scripting (XSS) vulnerability in Feed to JavaScript (Feed2JS) 1.91 allows remote attackers to inject arbitrary web script or HTML via a URL in a feed. | [
"cpe:2.3:a:feed2js:feed2js:1.91:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-x6f6-fmwf-4mpg | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.58, R7500v2 before 1.0.3.48, R7800 before 1.0.2.68, R8900 before 1.0.5.2, R9000 before 1.0.5.2, RAX120 before 1.0.1.108, and XR700 before 1.0.1.20. | [] | null | null | null | null |
|
RHSA-2011:1304 | Red Hat Security Advisory: jbossws-common security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.1"
] | null | null | null | null |
CVE-2001-1146 | AllCommerce with debugging enabled in EnGarde Secure Linux 1.0.1 creates temporary files with predictable names, which allows local users to modify files via a symlink attack. | [
"cpe:2.3:a:lee_herron:allcommerce:1.2.3:*:*:*:*:*:*:*"
] | null | null | null | 1.2 |
|
GHSA-vwr7-42j6-c6wm | Symantec pcAnywhere 12.5 uses weak default permissions for the "Symantec\pcAnywhere\Hosts" folder, which allows local users to gain privileges by inserting a superuser .cif (aka caller or CallerID) file into the folder, and then using a pcAnywhere client to login as a local administrator. | [] | null | null | null | null |
|
GHSA-h5j7-7wgr-m2hf | mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information. | [] | null | 6.5 | null | null |
|
GHSA-2wwv-3g3g-h8w3 | In the Linux kernel, the following vulnerability has been resolved:ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned valuedevm_kasprintf() can return a NULL pointer on failure but this returned
value is not checked.Fix this lack and check the returned value. | [] | null | 5.5 | null | null |
|
GHSA-c6fp-j53m-qjjq | The Organic Groups (OG) Vocabulary module 6.x-1.x before 6.x-1.2 for Drupal allows remote authenticated users with certain administrator permissions to modify the vocabularies of other groups via unspecified vectors. | [] | null | null | null | null |
|
CVE-2023-34924 | H3C Magic B1STW B1STV100R012 was discovered to contain a stack overflow via the function SetAPInfoById. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | [
"cpe:2.3:h:h3c:magic_b1stw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:magic_b1stw_firmware:b1stv100r012:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-qwph-q65f-w8rg | A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8512, CVE-2017-0260, and CVE-2017-8506. | [] | null | null | 7.8 | null |
|
CVE-2010-1653 | Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlcoderhelper:com_graphics:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-0563 | Cross-site request forgery (CSRF) vulnerability in service/impl/UserLocalServiceImpl.java in Liferay Portal 4.3.6 allows remote attackers to perform unspecified actions as unspecified authenticated users via the User-Agent HTTP header, which is used when composing Forgot Password e-mail messages in HTML format. | [
"cpe:2.3:a:liferay:liferay_enterprise_portal:4.3.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2016-9449 | The taxonomy module in Drupal 7.x before 7.52 and 8.x before 8.2.3 might allow remote authenticated users to obtain sensitive information about taxonomy terms by leveraging inconsistent naming of access query tags. | [
"cpe:2.3:a:drupal:drupal:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha10:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha11:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha12:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha13:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha14:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha15:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha7:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha8:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:alpha9:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta13:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta14:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta15:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta16:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.32:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.41:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.42:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.43:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.44:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.51:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 |
|
GHSA-4p6f-m4f9-ch88 | Binary vulnerable to Slice Memory Allocation with Excessive Size Value | Impact_What kind of vulnerability is it? Who is impacted?_The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program.When using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it's possible to allocate memory with excessive size.When `dec.Decode(&val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value.Example:Patches_Has the problem been patched? What versions should users upgrade to?_The vulnerability has been patched in `github.com/gagliardetto/binary` `v0.7.1`Users should upgrade to `v0.7.1` or higher.To upgrade to `v0.7.1` or higher, run:Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_A workaround is not to rely on the `dec.Decode(&val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice.References_Are there any links users can visit to find out more?_For more informationIf you have any questions or comments about this advisory:Open an issue in [github.com/gagliardetto/binary](https://github.com/gagliardetto/binary)DM me on [twitter](https://twitter.com/immaterial_ink) | [] | null | 8.8 | null | null |
CVE-2013-4396 | Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure. | [
"cpe:2.3:a:x:x.org_x11:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:6.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:x:x.org_x11:7.7:rc1:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-4rjg-w3c9-89p9 | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Logo Widget in all versions up to, and including, 1.3.91 due to insufficient input sanitization and output escaping on user supplied URLs. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.4 | null | null |
|
GHSA-4rm4-8m7j-xwx3 | tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file. | [] | null | 5.5 | null | null |
|
GHSA-43v9-p898-p49x | An HTTP parameter pollution issue was discovered on Shenzhen Dragon Brothers Fingerprint Bluetooth Round Padlock FB50 2.3. With the user ID, user name, and the lock's MAC address, anyone can unbind the existing owner of the lock, and bind themselves instead. This leads to complete takeover of the lock. The user ID, name, and MAC address are trivially obtained from APIs found within the Android or iOS application. With only the MAC address of the lock, any attacker can transfer ownership of the lock from the current user, over to the attacker's account. Thus rendering the lock completely inaccessible to the current user. | [] | null | null | 9.8 | null |
|
GHSA-gv2f-vxwc-xp58 | Broadcasting Intent including the BluetoothDevice object without proper restriction of receivers in sendIntentSessionError function of Bluetooth prior to SMR Jun-2022 Release 1 leaks MAC address of the connected Bluetooth device. | [] | null | 4.3 | null | null |
|
GHSA-chj7-ph5p-5643 | ASPwebSoft Speedy Asp Discussion Forum allows remote attackers to change the password of any account via a modified account id and possibly arbitrary values of the name, email, country, password, and passwordre parameters to profileupdate.asp. | [] | null | null | null | null |
|
GHSA-wm32-3r4m-jvcc | Symbiote Seed Open Redirect vulnerability | A vulnerability was found in Symbiote Seed up to 6.0.2. It has been classified as critical. Affected is the function `onBeforeSecurityLogin` of the file `code/extensions/SecurityLoginExtension.php` of the component `Login`. The manipulation of the argument URL leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 6.0.3 can address this issue. The name of the patch is b065ebd82da53009d273aa7e989191f701485244. It is recommended to upgrade the affected component. VDB-217626 is the identifier assigned to this vulnerability. | [] | null | 6.1 | null | null |
GHSA-6988-g89m-27vf | Magento stored cross-site scripting (XSS) in the customer address upload feature | Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a stored cross-site scripting (XSS) in the customer address upload feature. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Exploitation of this issue requires user interaction. | [] | null | 8.1 | null | null |
GHSA-xgwj-62j7-h8hh | LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs. | [] | null | null | 8.6 | null |
|
CVE-2024-31921 | WordPress Ultimate Product Catalog plugin <= 5.2.15 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Etoile Web Design Ultimate Product Catalogue.This issue affects Ultimate Product Catalogue: from n/a through 5.2.15.
| [] | null | 4.3 | null | null |
CVE-2012-2333 | Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-4351 | Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2019-9743 | An issue was discovered on PHOENIX CONTACT RAD-80211-XD and RAD-80211-XD/HP-BUS devices. Command injection can occur in the WebHMI component. | [
"cpe:2.3:o:phoenixcontact:rad-80211-xd\\/hp-bus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:rad-80211-xd\\/hp-bus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:rad-80211-xd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:rad-80211-xd:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2002-2072 | java.security.AccessController in Sun Java Virtual Machine (JVM) in JRE 1.2.2 and 1.3.1 allows remote attackers to cause a denial of service (JVM crash) via a Java program that calls the doPrivileged method with a null argument. | [
"cpe:2.3:a:sun:jre:1.2.2:*:linux_production:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-pjc4-3w99-j7v4 | Open redirect in Flask-Unchained | This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | [] | 5.3 | 5.4 | null | null |
CVE-2025-23047 | Cilium vulnerable to information leakage via insecure default Hubble UI CORS header | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. As a workaround, users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch from commit a3489f190ba6e87b5336ee685fb6c80b1270d06d. | [] | null | 6.5 | null | null |
CVE-2020-24419 | Uncontrolled Search Path Element in Adobe After Effects for Windows | Adobe After Effects version 17.1.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
GHSA-2p2x-x4c8-xrmc | Vulnerability in the RDBMS Security component of Oracle Database Server. Supported versions that are affected are 12.2.0.1, 19c and 21c. Easily exploitable vulnerability allows high privileged attacker having DBA privilege with network access via Oracle Net to compromise RDBMS Security. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of RDBMS Security as well as unauthorized update, insert or delete access to some of RDBMS Security accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | [] | null | 5.5 | null | null |
|
RHSA-2017:2390 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.3 | null |
GHSA-jw53-g5p8-77fr | Moxa G3100V2 Series, editions prior to Version 2.8, and OnCell G3111/G3151/G3211/G3251 Series, editions prior to Version 1.7 allows a reflected cross-site scripting attack which may allow an attacker to execute arbitrary script code in the user’s browser within the trust relationship between their browser and the server. | [] | null | null | 6.1 | null |
|
CVE-2010-2849 | Cross-site scripting (XSS) vulnerability in productionnu2/nuedit.php in nuBuilder 10.04.20, and possibly other versions before 10.07.12, allows remote attackers to inject arbitrary web script or HTML via the f parameter. | [
"cpe:2.3:a:nusoftware:nubuilder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.06.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.06.26:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.07.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.08.20:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.09.23:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-qfg7-wc25-r3j2 | eGroupware Community Edition Stored XSS vulnerability | Stored XSS vulnerability in eGroupware Community Edition before 16.1.20170922 allows an unauthenticated remote attacker to inject JavaScript via the User-Agent HTTP header, which is mishandled during rendering by the application administrator. | [] | null | null | 6.1 | null |
CVE-2023-23814 | WordPress Calendar Event Multi View plugin <= 1.4.13 - Broken Access Control vulnerability | Missing Authorization vulnerability in CodePeople CP Multi View Event Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CP Multi View Event Calendar : from n/a through 1.4.13. | [] | null | 3.8 | null | null |
GHSA-mcrg-9w29-v64p | The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673. | [] | null | null | null | null |
|
CVE-2017-2346 | MS-MPC or MS-MIC crash when passing large fragmented traffic through an ALG | An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT or stateful-firewall rules are configured with ALGs enabled. This issue was caused by the code change for PR 1182910 in Junos OS 14.1X55-D30, 14.1X55-D35, 14.2R7, 15.1R5, and 16.1R2. No other versions of Junos OS and no other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS on MX platforms running: 14.1X55 from 14.1X55-D30 to releases prior to 14.1X55-D35; 14.2R from 14.2R7 to releases prior to 14.2R7-S4, 14.2R8; 15.1R from 15.1R5 to releases prior to 15.1R5-S2, 15.1R6; 16.1R from 16.1R2 to releases prior to 16.1R3-S2, 16.1R4. | [
"cpe:2.3:o:juniper:junos:14.1x55:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x55:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
RHSA-2016:2088 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.3 | null |
CVE-2024-6617 | NinjaTeam Header Footer Custom Code <= 1.2 - Admin+ Stored XSS via CSS Styles | The NinjaTeam Header Footer Custom Code WordPress plugin before 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2013-4888 | Cross-site scripting (XSS) vulnerability in index.php in Digital Signage Xibo 1.4.2 allows remote attackers to inject arbitrary web script or HTML via the layout parameter in the layout page. | [
"cpe:2.3:a:springsignage:xibo:1.4.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2019:1161 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.22 security update | tomcat: Host name verification missing in WebSocket client wildfly-core: Cross-site scripting (XSS) in JBoss Management Console dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 5.3 | null |
GHSA-w3jx-4fjp-hqjc | The Hubbub Lite WordPress plugin before 1.34.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 4.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.