id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2007-5238
Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka "three vulnerabilities."
[ "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.1:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-c8h3-2hgv-9732
There is memory leak at liblas::Open (liblas/liblas.hpp) in libLAS 1.8.1.
[]
null
null
6.5
null
GHSA-84w3-v2m2-fj4m
Invalid file validation on the upload feature in GROWI versions v4.2.2 allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution.
[]
null
null
null
null
CVE-2001-0487
AIX SNMP server snmpd allows remote attackers to cause a denial of service via a RST during the TCP connection.
[ "cpe:2.3:a:ibm:aix_snmp:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-g7v5-rc2j-fqgg
Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password, aka the "Web Client NTLM Authentication" vulnerability.
[]
null
null
null
null
GHSA-m62w-7qr8-gjmc
A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance.This vulnerability is due to insufficient request validation when using the REST API feature. An attacker could exploit this vulnerability by sending a crafted API request to an affected vManage instance. A successful exploit could allow the attacker to retrieve information from and send information to the configuration of the affected Cisco vManage instance. This vulnerability only affects the REST API and does not affect the web-based management interface or the CLI.
[]
null
9.1
null
null
RHSA-2021:0651
Red Hat Security Advisory: xterm security update
xterm: crash when processing combining characters
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
9.6
null
null
CVE-2022-35048
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0b2c.
[ "cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-x7pm-c993-32cr
** DISPUTED ** PHP remote file inclusion vulnerability in htmls/forum/includes/topic_review.php in UniversiBO 1.3.4 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. NOTE: this issue is disputed by CVE because the applicable include is in a function that is not called on a direct request.
[]
null
null
null
null
GHSA-446h-6m77-5x8g
The set_default_speeds function in backend/backend.c in NVidia NVClock before 0.8b2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/nvclock temporary file.
[]
null
null
null
null
CVE-2023-45828
WordPress RumbleTalk Live Group Chat plugin <= 6.2.5 - Broken Access Control vulnerability
Missing Authorization vulnerability in RumbleTalk Ltd RumbleTalk Live Group Chat allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RumbleTalk Live Group Chat: from n/a through 6.2.5.
[]
null
5.4
null
null
CVE-2021-27962
Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.
[ "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*" ]
null
7.1
null
4.9
GHSA-4g25-v4mv-2xm5
An arbitrary file upload vulnerability in the nccloud.web.arcp.taskmonitor.action.ArcpUploadAction.doAction() method of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file.
[]
null
9.8
null
null
GHSA-xq63-6w3f-wccq
An issue in Golden v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
[]
null
7.5
null
null
GHSA-7vx2-hp92-h538
A vulnerability has been identified in Simcenter Femap (All versions < V2406). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted BMP files. This could allow an attacker to execute code in the context of the current process.
[]
7.3
7.8
null
null
GHSA-59hf-2q3w-grfv
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
GHSA-jxr5-x54c-4445
Cross-site Scripting (XSS) in the spreadshirt-rss-3d-cube-flash-gallery plugin 2014 for WordPress allows remote attackers to execute arbitrary web script or HTML via unspecified parameters.
[]
null
null
null
null
GHSA-89wh-8rrv-869c
Improper access control in knoxcustom service prior to SMR Dec-2023 Release 1 allows attacker to send broadcast with system privilege.
[]
null
6.6
null
null
CVE-2020-5849
Unraid 6.8.0 allows authentication bypass.
[ "cpe:2.3:a:unraid:unraid:6.8.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2003-1279
S-PLUS 6.0 allows local users to overwrite arbitrary files and possibly elevate privileges via a symlink attack on (1) /tmp/__F8499 by Sqpe, (2) /tmp/PRINT.$$.out by PRINT, (3) /tmp/SUBST$PID.TXT and /tmp/ed.cmds$PID by mustfix.hlinks, (4) /tmp/file.1 and /tmp/file.2 by sas_get, (5) /tmp/file.1 by sas_vars, and (6) /tmp/sgml2html$$tmp /tmp/sgml2html$$tmp1 /tmp/sgml2html$$tmp2 by sglm2html.
[ "cpe:2.3:a:insightful:s-plus:6.0:*:unix:*:*:*:*:*" ]
null
null
null
4.6
GHSA-6jmq-74fh-8r6v
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
[]
null
4.3
null
null
GHSA-w6f4-2gqx-qg89
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.4
null
null
RHSA-2019:2519
Red Hat Security Advisory: rh-php71-php security, bug fix, and enhancement update
gd: Unsigned integer underflow _gdContributionsAlloc() php: Out of bounds access in php_pcre.c:php_pcre_replace_impl() php: Integer overflow in mysqli_api.c:mysqli_real_escape_string() php: Heap use after free in ext/standard/var_unserializer.re php: Out-of-bound read in timelib_meridian() gd: Infinite loop in gdImageCreateFromGifCtx() in gd_gif_in.c php: Reflected XSS on PHAR 404 page php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in http_fopen_wrapper.c when parsing HTTP response php: Dumpable FPM child processes allow bypassing opcache access controls php: Infinite loop in ext/iconv/iconv.c when using stream filter with convert.incov on invalid sequence leads to denial-of-service php: Reflected XSS vulnerability on PHAR 403 and 404 error pages php: NULL pointer dereference due to mishandling of ldap_get_dn return value allows DoS via malicious LDAP server reply php: Out-of-bounds read in ext/exif/exif.c:exif_read_data() when reading crafted JPEG data php: exif: Buffer over-read in exif_process_IFD_in_MAKERNOTE() php: Mishandled http_header_value in an atoi() call in http_fopen_wrapper.c php: Cross-site scripting (XSS) flaw in Apache2 component via body of 'Transfer-Encoding: chunked' request php: Buffer over-read in PHAR reading functions gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c php: Invalid memory access in function xmlrpc_decode() php: Heap-based buffer over-read in PHAR reading functions php: memcpy with negative length via crafted DNS response php: Heap-based buffer over-read in mbstring regular expression functions php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c php: File rename across filesystems may allow unwanted access during processing php: Uninitialized read in exif_process_IFD_in_MAKERNOTE php: Uninitialized read in exif_process_IFD_in_MAKERNOTE php: Invalid read in exif_process_SOFn() php: Heap buffer overflow in function exif_process_IFD_TAG() php: Heap buffer overflow in function exif_iif_add_value() php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure gd: Information disclosure in gdImageCreateFromXbm() php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() php: Buffer over-read in exif_read_data()
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
6.5
null
RHSA-2023:0569
Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update
go-yaml: Denial of Service in go-yaml goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7
null
null
GHSA-4783-m498-cppr
Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
CVE-2019-6976
libvips before 8.7.4 generates output images from uninitialized memory locations when processing corrupted input image data because iofuncs/memory.c does not zero out allocated memory. This can result in leaking raw process memory contents through the output image.
[ "cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*" ]
null
null
5.3
5
CVE-2017-2315
On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability.
[ "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r13:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x55:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*" ]
null
null
7.5
7.8
CVE-2021-39837
Adobe Acrobat Reader DC AcroForm deleteItemAt Use-After-Free Remote Code Execution Vulnerability
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm deleteItemAt action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*" ]
null
null
7.8
null
CVE-2012-4267
Cross-site scripting (XSS) vulnerability in user/register in Sockso 1.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the name parameter.
[ "cpe:2.3:a:pu-gh:sockso:*:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:pu-gh:sockso:1.4.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-447v-pq45-237q
Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
[]
null
null
null
null
RHSA-2016:0492
Red Hat Security Advisory: tomcat6 security and bug fix update
Tomcat/JbossWeb: security manager bypass via EL expressions
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2020-6221
Web Intelligence HTML interface in SAP Business Objects Business Intelligence Platform, versions 4.1, 4.2, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
[ "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.1:-:*:*:*:*:*:*", "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.2:-:*:*:*:*:*:*" ]
null
null
5.4
null
CVE-2021-25008
Code Snippets < 2.14.3 - Reflected Cross-Site Scripting
The Code Snippets WordPress plugin before 2.14.3 does not escape the snippets-safe-mode parameter before outputting it back in attributes, leading to a Reflected Cross-Site Scripting issue
[ "cpe:2.3:a:codesnippets:code_snippets:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
PYSEC-2021-717
null
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must not have loops between nodes. However, this condition was not checked and an attacker could craft models that would result in infinite loop during evaluation. In certain cases, the infinite loop would be replaced by stack overflow due to too many recursive calls. For example, the `While` implementation(https://github.com/tensorflow/tensorflow/blob/106d8f4fb89335a2c52d7c895b7a7485465ca8d9/tensorflow/lite/kernels/while.cc) could be tricked into a scneario where both the body and the loop subgraphs are the same. Evaluating one of the subgraphs means calling the `Eval` function for the other and this quickly exhaust all stack space. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. Please consult our security guide(https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
[]
null
null
null
null
GHSA-hqh5-gm7w-5966
A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.
[]
null
8.1
null
null
CVE-2014-0621
Multiple cross-site request forgery (CSRF) vulnerabilities in Technicolor (formerly Thomson) TC7200 STD6.01.12 allow remote attackers to hijack the authentication of administrators for requests that (1) perform a factory reset via a request to goform/system/factory, (2) disable advanced options via a request to goform/advanced/options, (3) remove ip-filters via the IpFilterAddressDelete1 parameter to goform/advanced/ip-filters, or (4) remove firewall settings via the cbFirewall parameter to goform/advanced/firewall.
[ "cpe:2.3:o:technicolor:tc7200_firmware:std6.01.12:*:*:*:*:*:*:*", "cpe:2.3:h:technicolor:tc7200:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-rfj8-j94q-wxfj
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: rfIDEAS V-2023-015.
[]
null
9.8
null
null
GHSA-pqpp-2363-649v
Cross-Site Scripting in buttle
All versions of `buttle` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `buttle` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious markdown files.RecommendationNo fix is currently available. Consider using an alternative module until a fix is made available.
[]
null
null
null
null
CVE-2023-34129
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in SonicWall GMS and Analytics allows an authenticated remote attacker to traverse the directory and extract arbitrary files using Zip Slip method to any location on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
[ "cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-j396-cqxp-9qrm
The RBB SPEED TEST App for Android version 2.0.3 and earlier, RBB SPEED TEST App for iOS version 2.1.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
5.9
null
RHSA-2023:2076
Red Hat Security Advisory: libwebp security update
Mozilla: libwebp: Double-free in libwebp
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2020:1135
Red Hat Security Advisory: polkit security and bug fix update
polkit: Improper authorization in polkit_backend_interactive_authority_check_authorization function in polkitd
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.4
null
CVE-2021-0735
In PackageManager, there is a possible way to get information about installed packages ignoring limitations introduced in Android 11 due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-188913056
[ "cpe:2.3:o:google:android:13.0.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
cisco-sa-20180207-iosxr
Cisco IOS XR Software Routing and Forwarding Inconsistency Denial of Service Vulnerability
A vulnerability in the forwarding information base (FIB) code of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause inconsistency between the routing information base (RIB) and the FIB, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect processing of extremely long routing updates. An attacker could exploit this vulnerability by sending a large routing update. A successful exploit could allow the attacker to trigger inconsistency between the FIB and the RIB, resulting in a DoS condition. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-iosxr ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-iosxr"]
[]
null
null
6.8
null
CVE-2016-6515
The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
[ "cpe:2.3:a:openbsd:openssh:*:p2:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
CVE-2009-4514
Cross-site scripting (XSS) vulnerability in the OpenSocial Shindig-Integrator module 5.x and 6.x before 6.x-2.1, a module for Drupal, allows remote authenticated users, with "create application" privileges, to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:astha_bhatnagar:shindigintegrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:astha_bhatnagar:shindigintegrator:5:*:*:*:*:*:*:*", "cpe:2.3:a:astha_bhatnagar:shindigintegrator:6.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:astha_bhatnagar:shindigintegrator:6.x-2.0-alpha1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-6ccf-vqxf-f729
GDM 2.4.4.x before 2.4.4.4, and 2.4.1.x before 2.4.1.7, does not limit the number or duration of commands and uses a blocking socket connection, which allows attackers to cause a denial of service (resource exhaustion) by sending commands and not reading the results.
[]
null
null
null
null
CVE-2024-45696
D-Link WiFi router - Hidden Functionality
Certain models of D-Link wireless routers contain hidden functionality. By sending specific packets to the web service, the attacker can forcibly enable the telnet service and log in using hard-coded credentials. The telnet service enabled through this method can only be accessed from within the same local network as the device.
[ "cpe:2.3:o:dlink:covr-x1870_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-x4860_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:covr-x1870:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*" ]
null
8.8
null
null
RHSA-2017:1417
Red Hat Security Advisory: rh-java-common-log4j security update
log4j: Socket receiver deserialization vulnerability
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
8.1
null
CVE-2020-24616
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
[ "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_supply_chain_finance:14.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_supply_chain_finance:14.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_supply_chain_finance:14.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
CVE-2009-3482
TrustPort Antivirus before 2.8.0.2266 and PC Security before 2.0.0.1291 use weak permissions (Everyone: Full Control) for files under %PROGRAMFILES%, which allows local users to gain privileges by replacing executables with Trojan horse programs.
[ "cpe:2.3:a:trustport:antivirus:*:*:*:*:*:*:*:*", "cpe:2.3:a:trustport:pc_security:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-wvw8-m25h-jr69
In checkGrantUriPermission of UriGrantsManagerService.java, there is a possible permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-140729426
[]
null
null
null
null
GHSA-w56v-4m7h-jhq8
wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action.
[]
null
null
null
null
GHSA-5gpg-48j6-gp7r
SQL injection vulnerability in default.php in Cornerstone Technologies webConductor allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
RHSA-2022:1645
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-twisted) security update
python-twisted: possible http request smuggling
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
8.1
null
null
CVE-2007-2334
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration interface and change the device configuration via certain requests.
[ "cpe:2.3:h:nortel:contivity:1000_vpn_switch:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:contivity:2000_vpn_switch:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:contivity:4000_vpn_switch:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_5000:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-fvv8-7jg6-pv3j
Memory corruption in video due to buffer overflow while parsing ps video clips in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[]
null
9.8
null
null
CVE-2019-14443
An issue was discovered in Libav 12.3. Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
[ "cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-vqpx-27gj-qfc5
In libstagefright, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-77474014
[]
null
null
null
null
CVE-2005-0550
Buffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*" ]
null
null
null
2.1
GHSA-q5c9-w6w2-m4fw
A vulnerability has been identified in SCALANCE XM-400 Family (All versions < V6.4), SCALANCE XR-500 Family (All versions < V6.4). The OSPF protocol implementation in affected devices incorrectly handles the number of LSA fields in combination with other modified fields. An unauthenticated remote attacker could create a permanent denial-of-service condition by sending specially crafted OSPF packets. Successful exploitation requires OSPF to be enabled on an affected device.
[]
null
null
null
null
CVE-2006-0658
Incomplete blacklist vulnerability in connector.php in FCKeditor 2.0 and 2.2, as used in products such as RunCMS, allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions that are not listed in the Config[DeniedExtensions][File], such as .php.txt.
[ "cpe:2.3:a:fckeditor:fckeditor:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fckeditor:fckeditor:2.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-w2px-wm37-g99g
A memory corruption issue was addressed with improved lock state checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes.
[]
null
null
7.8
null
GHSA-w7xf-fr96-56vj
The social-buttons-pack plugin before 1.1.1 for WordPress has multiple XSS issues.
[]
null
null
6.1
null
GHSA-x4cr-2586-v8hv
White Shark System (WSS) 1.3.2 is vulnerable to CSRF. Attackers can use the user_edit_password.php file to modify the user password.
[]
null
null
null
null
RHSA-2021:3366
Red Hat Security Advisory: python3 security update
python: CRLF injection via HTTP request method in httplib/http.client
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
6.5
null
null
CVE-2002-0125
Buffer overflow in ClanLib library 0.5 may allow local users to execute arbitrary code in games that use the library, such as (1) Super Methane Brothers, (2) Star War, (3) Kwirk, (4) Clankanoid, and others, via a long HOME environment variable.
[ "cpe:2.3:a:clanlib:clanlib:0.5:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-3r5w-8fgx-8jrh
Multiple cross-site scripting (XSS) vulnerabilities in Subrion CMS 2.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) multi_title parameter to blocks/add/; (2) cost, (3) days, or (4) title[en] parameter to plans/add/; (5) name or (6) title[en] parameter to fields/group/add/ in admin/manage/; or (7) f[accounts][fullname] or (8) f[accounts][username] parameter to advsearch/. NOTE: This might overlap CVE-2011-5211. NOTE: it was later reported that the f[accounts][fullname] and f[accounts][username] vectors might also affect 2.2.2.
[]
null
null
null
null
GHSA-4xp2-w642-7mcx
Cilium vulnerable to bypass of namespace restrictions in CiliumNetworkPolicy
ImpactAn attacker with the ability to create or modify CiliumNetworkPolicy objects in a particular namespace is able to affect traffic on an entire Cilium cluster, potentially bypassing policy enforcement in other namespaces.By using a crafted `endpointSelector` that uses the `DoesNotExist` operator on the `reserved:init` label, the attacker can create policies that bypass namespace restrictions and affect the entire Cilium cluster. This includes potentially allowing or denying all traffic.This attack requires API server access, as described in the [Kubernetes API Server Attacker](https://docs.cilium.io/en/stable/security/threat-model/#kubernetes-api-server-attacker) section of the Cilium Threat Model.PatchesThis issue was patched in https://github.com/cilium/cilium/pull/28007This issue affects:Cilium <= v1.14.1Cilium <= v1.13.6Cilium <= v1.12.13This issue has been resolved in:Cilium v1.14.2Cilium v1.13.7Cilium v1.12.14WorkaroundsAn admission webhook can be used to prevent the use of `endpointSelector`s that use the `DoesNotExist` operator on the `reserved:init` label in CiliumNetworkPolicies.AcknowledgementsThe Cilium community has worked together with members of Palantir and Isovalent to prepare these mitigations. Special thanks to @odinuge for reporting this issue and @joestringer for the fix.For more informationIf you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).If you think you have found a vulnerability in Cilium, we strongly encourage you to report it to our private security mailing list at [[email protected]](mailto:[email protected]) first, before disclosing it in any public forum. This is a private mailing list for Cilium's internal security team, and your report will be treated as top priority.
[]
null
6.9
null
null
GHSA-wwjm-jqc7-c985
In the Linux kernel, the following vulnerability has been resolved:bpf: Fix stackmap overflow check on 32-bit archesThe stackmap code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. However, on 32-bit arches, the roundup code itself can overflow by doing a 32-bit left-shift of an unsigned long value, which is undefined behaviour, so it is not guaranteed to truncate neatly. This was triggered by syzbot on the DEVMAP_HASH type, which contains the same check, copied from the hashtab code.The commit in the fixes tag actually attempted to fix this, but the fix did not account for the UB, so the fix only works on CPUs where an overflow does result in a neat truncation to zero, which is not guaranteed. Checking the value before rounding does not have this problem.
[]
null
7.8
null
null
GHSA-h969-5rx9-j9gx
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
[]
null
6.1
null
null
GHSA-whh8-fjgc-qp73
Onnx Directory Traversal vulnerability
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.
[]
null
7.5
null
null
GHSA-ph52-wh83-m7pg
A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
6.5
null
null
GHSA-3c6g-pvg8-gqw2
trentm/json vulnerable to command injection
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
[]
null
7.2
null
null
CVE-2022-22797
Sysaid – sysaid Open Redirect
Sysaid – sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
[ "cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*", "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*" ]
null
4.6
null
null
CVE-2019-6840
A Format String: CWE-134 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow an attacker to send a crafted message to the target server, thereby causing arbitrary commands to be executed.
[ "cpe:2.3:o:schneider-electric:meg6501-0001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:meg6501-0001:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:meg6501-0002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:meg6501-0002:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:meg6260-0410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:meg6260-0410:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:meg6260-0415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:meg6260-0415:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-mcj5-gg57-5fc7
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
4.9
null
GHSA-98w6-xwmp-rwv5
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Fusion Middleware 11.1.1.3.0, 11.1.1.4.0, and 11.1.1.5.0 allows remote authenticated users to affect availability, related to BPEL Console.
[]
null
null
null
null
GHSA-fg3m-fh8c-xhjv
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
[]
null
null
null
null
GHSA-4xgf-p747-c98v
Roger Wilco 1.4.1.6 and earlier or Roger Wilco Base Station 0.30a and earlier allows remote attackers to cause a denial of service (application crash) via a long, malformed UDP datagram.
[]
null
null
null
null
CVE-2011-3510
Unspecified vulnerability in the Oracle Business Intelligence Enterprise Edition component in Oracle Fusion Middleware 11.1.1.3.0 and 11.1.1.5.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to BI Platform Security.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*" ]
null
null
null
4.9
CVE-2000-0439
Internet Explorer 4.0 and 5.0 allows a malicious web site to obtain client cookies from another domain by including that domain name and escaped characters in a URL, aka the "Unauthorized Cookie Access" vulnerability.
[ "cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*" ]
null
null
null
2.6
CVE-2024-56755
netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING
In the Linux kernel, the following vulnerability has been resolved: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING In fscache_create_volume(), there is a missing memory barrier between the bit-clearing operation and the wake-up operation. This may cause a situation where, after a wake-up, the bit-clearing operation hasn't been detected yet, leading to an indefinite wait. The triggering process is as follows: [cookie1] [cookie2] [volume_work] fscache_perform_lookup fscache_create_volume fscache_perform_lookup fscache_create_volume fscache_create_volume_work cachefiles_acquire_volume clear_and_wake_up_bit test_and_set_bit test_and_set_bit goto maybe_wait goto no_wait In the above process, cookie1 and cookie2 has the same volume. When cookie1 enters the -no_wait- process, it will clear the bit and wake up the waiting process. If a barrier is missing, it may cause cookie2 to remain in the -wait- process indefinitely. In commit 3288666c7256 ("fscache: Use clear_and_wake_up_bit() in fscache_create_volume_work()"), barriers were added to similar operations in fscache_create_volume_work(), but fscache_create_volume() was missed. By combining the clear and wake operations into clear_and_wake_up_bit() to fix this issue.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-986q-37xh-j7h2
The Contest Gallery WordPress plugin before 13.1.0.6 does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address
[]
null
null
null
null
CVE-2024-31161
ASUS Download Master - Arbitrary File Upload
The upload functionality of ASUS Download Master does not properly filter user input. Remote attackers with administrative privilege can exploit this vulnerability to upload any file to any location. They may even upload malicious web page files to the website directory, allowing arbitrary system commands to be executed upon browsing the webpage.
[ "cpe:2.3:a:asus:download_master:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2019-13916
An issue was discovered in Cypress (formerly Broadcom) WICED Studio 6.2 CYW20735B1 and CYW20819A1. As a Bluetooth Low Energy (BLE) packet is received, it is copied into a Heap (ThreadX Block) buffer. The buffer allocated in dhmulp_getRxBuffer is four bytes too small to hold the maximum of 255 bytes plus headers. It is possible to corrupt a pointer in the linked list holding the free buffers of the g_mm_BLEDeviceToHostPool Block pool. This pointer can be fully controlled by overflowing with 3 bytes of packet data and the first byte of the packet CRC checksum. The checksum can be freely chosen by adapting the packet data accordingly. An attacker might be able to allocate the overwritten address as a receive buffer resulting in a write-what-where condition. This is fixed in BT SDK2.4 and BT SDK2.45.
[ "cpe:2.3:a:cypress:wiced_studio:6.2:*:*:*:*:*:*:*", "cpe:2.3:h:cypress:cyw20735b1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cypress:cyw20819a1:-:*:*:*:*:*:*:*" ]
null
8.8
null
5.8
GHSA-mm8x-5pvc-7mmq
Inappropriate implementation in V8 in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
GHSA-f5gh-x8hf-4hph
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1393, CVE-2019-1394, CVE-2019-1395, CVE-2019-1396, CVE-2019-1434.
[]
null
7.8
null
null
CVE-2021-33321
Insecure default configuration in Liferay Portal 6.2.3 through 7.3.2, and Liferay DXP before 7.3, allows remote attackers to enumerate user email address via the forgot password functionality. The portal.property login.secure.forgot.password should be defaulted to true.
[ "cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2025-0462
Shanghai Lingdang Information Technology Lingdang CRM index.php sql injection
A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0 and classified as critical. This issue affects some unknown processing of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1. The manipulation of the argument searchcontent leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
6.3
6.5
GHSA-499x-cvfw-94w6
uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap-around in functions malloc-simple. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
[]
null
9.8
null
null
CVE-2024-38123
Windows Bluetooth Driver Information Disclosure Vulnerability
Windows Bluetooth Driver Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*" ]
null
4.4
null
null
CVE-2017-0905
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
[ "cpe:2.3:a:recurly:recurly_client_ruby:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.0:c:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:recurly:recurly_client_ruby:2.11.2:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2017-12924
CDirVector::GetTable in dirfunc.hxx in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted fpx image.
[ "cpe:2.3:a:libfpx_project:libfpx:1.3.1:p6:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-hg7w-q48h-fqfx
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SysBasics Customize My Account for WooCommerce allows Reflected XSS. This issue affects Customize My Account for WooCommerce: from n/a through 2.8.22.
[]
null
7.1
null
null
CVE-2023-39529
PrestaShop vulnerable to file deletion via attachment API
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete a file from the server by using the Attachments controller and the Attachments API. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
[ "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-7w3h-vqp8-323r
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5 and Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 CLI allows an authenticated admin user with diagnose privileges to delete files on the system.
[]
null
6
null
null
GHSA-83r5-w7x4-gjjw
A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. An application may be able to execute arbitrary code with kernel privileges.
[]
null
7.8
null
null
CVE-2018-8912
Cross-site scripting (XSS) vulnerability in SYNO.NoteStation.Note in Synology Note Station before 2.5.1-0844 allows remote authenticated users to inject arbitrary web script or HTML via the commit_msg parameter.
[ "cpe:2.3:a:synology:note_station:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-m3cf-cwfr-2w97
Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
[]
null
null
null
null