id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-v4hv-2gw5-jv35 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
CVE-2018-16004 | Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-r6x6-vqh9-prpr | Information disclosure due to buffer over-read in WLAN while parsing NMF frame. | [] | null | 7.5 | null | null |
|
GHSA-xqq5-jfcp-g927 | Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file. | [] | null | null | null | null |
|
GHSA-rhq4-fxqr-q589 | A vulnerability, which was classified as problematic, was found in SourceCodester Online Admission System. Affected is an unknown function of the file index.php. The manipulation of the argument eid with the input 8</h3><script>alert(1)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205572. | [] | null | 6.1 | null | null |
|
CVE-2020-13334 | In GitLab versions prior to 13.2.10, 13.3.7 and 13.4.2, improper authorization checks allow a non-member of a project/group to change the confidentiality attribute of issue via mutation GraphQL query | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-j3jp-gvr5-7hwq | python-engineio vulnerable to Cross-Site Request Forgery (CSRF) | WebSocket cross-origin vulnerabilityImpactThis is a Cross-Site Request Forgery (CSRF) vulnerability. It affects Socket.IO and Engine.IO web servers that authenticate clients using cookies.Patchespython-engineio version 3.9.0 patches this vulnerability by adding server-side Origin header checks.WorkaroundsDo not use cookies for client authentication, or else add a CSRF token to the connection URL.Referenceshttps://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
https://www.christian-schneider.net/CrossSiteWebSocketHijacking.htmlFor more informationIf you have any questions or comments about this advisory:Open an issue in [python-engineio](http://github.com/miguelgrinberg/python-engineio) | [] | 8.7 | null | 8.8 | null |
CVE-2017-5108 | Type confusion in PDFium in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted PDF file. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2022-32427 | PrinterLogic Windows Client through 25.0.0.676 allows attackers to execute directory traversal. Authenticated users with prior knowledge of the driver filename could exploit this to escalate privileges or distribute malicious content. This issue has been resolved in PrinterLogic Windows Client 25.0.0688 and all affected are advised to upgrade. | [
"cpe:2.3:a:printerlogic:windows_client:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-wwqp-pxgc-w8wf | Multiple cross-site scripting (XSS) vulnerabilities in default.asp in WmsCms 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) search, (2) sbr, (3) p, and (4) sbl parameters, different vectors than CVE-2007-3137. | [] | null | null | null | null |
|
CVE-2015-1201 | Privoxy before 3.0.22 allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:privoxy:privoxy:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2011-5327 | In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2021-4452 | Google Language Translator <= 6.0.9 - Reflected Cross-Site Scripting | The Google Language Translator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in versions up to, and including, 6.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Specifically affects users with older browsers that lack proper URL encoding support. | [
"cpe:2.3:a:gtranslate:google_language_translator:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-62m9-v7g3-w362 | SAP NetWeaver Server ABAP allows an unauthenticated attacker to exploit a vulnerability that causes the server to respond differently based on the existence of a specified user, potentially revealing sensitive information. This issue does not enable data modification and has no impact on server availability. | [] | null | 5.3 | null | null |
|
CVE-2017-12337 | A vulnerability in the upgrade mechanism of Cisco collaboration products based on the Cisco Voice Operating System software platform could allow an unauthenticated, remote attacker to gain unauthorized, elevated access to an affected device. The vulnerability occurs when a refresh upgrade (RU) or Prime Collaboration Deployment (PCD) migration is performed on an affected device. When a refresh upgrade or PCD migration is completed successfully, an engineering flag remains enabled and could allow root access to the device with a known password. If the vulnerable device is subsequently upgraded using the standard upgrade method to an Engineering Special Release, service update, or a new major release of the affected product, this vulnerability is remediated by that action. Note: Engineering Special Releases that are installed as COP files, as opposed to the standard upgrade method, do not remediate this vulnerability. An attacker who can access an affected device over SFTP while it is in a vulnerable state could gain root access to the device. This access could allow the attacker to compromise the affected system completely. Cisco Bug IDs: CSCvg22923, CSCvg55112, CSCvg55128, CSCvg55145, CSCvg58619, CSCvg64453, CSCvg64456, CSCvg64464, CSCvg64475, CSCvg68797. | [
"cpe:2.3:a:cisco:emergency_responder:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:finesse:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:hosted_collaboration_solution:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:mediasense:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_license_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:socialminer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:-:*:*:*:session_management:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_contact_center_express:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_intelligence_center:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-97qr-hm36-rpm6 | Buffer overflow in the ActSoft DVD-Tools ActiveX control (dvdtools.ocx) allows remote attackers to execute arbitrary code via a long DVD_TOOLS.OpenDVD property value. | [] | null | null | null | null |
|
GHSA-p3q8-f73x-vhcq | Cross-site scripting (XSS) vulnerability in the Web user interface (UI) in Intel Security ePO 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows authenticated users to inject malicious Java scripts via bypassing input validation. | [] | null | null | 5.4 | null |
|
CVE-2022-22464 | IBM Security Access Manager Appliance 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 225081. | [
"cpe:2.3:a:ibm:security_verify_access:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.3.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
|
GHSA-pp4w-9x82-6r47 | Withdrawn Advisory: Apache IoTDB contains Improper Authentication | Withdrawn AdvisoryThis advisory has been withdrawn because the affected component, `org.apache.iotdb.admin:iotdb-web-workbench`, is not in a [supported ecosystem](https://github.com/github/advisory-database/blob/main/README.md#supported-ecosystems). This link is maintained to preserve external references.Original DescriptionImproper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects iotdb-web-workbench component: from 0.13.0 before 0.13.3. | [] | null | 7.5 | null | null |
GHSA-rp9p-863f-9c4h | Cross-site Scripting in Apache ActiveMQ | Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551. | [] | null | null | null | null |
RHSA-2024:8026 | Red Hat Security Advisory: thunderbird security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 9.8 | null | null |
GHSA-9469-9gw8-5gq8 | The agent in Bomgar Remote Support 15.2.x before 15.2.3, 16.1.x before 16.1.5, and 16.2.x before 16.2.4 allows DLL hijacking because of weak %SYSTEMDRIVE%\ProgramData permissions. | [] | null | 7.8 | null | null |
|
GHSA-2gmp-x9r7-xp6q | Improper Null Termination vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of10::Port:unpack.This issue affects libfluid: 0.1.0. | [] | null | 5.3 | null | null |
|
GHSA-mp3w-frxm-jcqg | A vulnerability classified as problematic was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228799. | [] | null | null | 3.5 | null |
|
RHSA-2019:2504 | Red Hat Security Advisory: OpenShift Container Platform 4.1.11 openshift security update | kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 5 | null |
CVE-2022-36441 | An issue was discovered in Zebra Enterprise Home Screen 4.1.19. The Gboard used by different applications can be used to launch and use several other applications that are restricted by the admin. | [
"cpe:2.3:a:zebra:enterprise_home_screen:4.1.19:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-gccr-pgwc-7hq4 | Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. For more information about these vulnerabilities, see the Details section of this advisory. | [] | null | 6.5 | null | null |
|
RHSA-2024:8030 | Red Hat Security Advisory: thunderbird security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 9.8 | null | null |
CVE-2009-1869 | Integer overflow in the ActionScript Virtual Machine 2 (AVM2) abcFile parser in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an AVM2 file with a large intrf_count value that triggers a dereference of an out-of-bounds pointer. | [
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:basic:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex:3.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-2365-p872-cmm2 | ClipperCMS 1.3.3 allows remote authenticated administrators to upload .htaccess files. | [] | null | null | 7.2 | null |
|
CVE-2020-10636 | ICSA-20-140-02 Emerson OpenEnterprise | Inadequate encryption may allow the passwords for Emerson OpenEnterprise versions through 3.3.4 user accounts to be obtained. | [
"cpe:2.3:a:emerson:openenterprise_scada_server:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-hr4v-37pq-7rhh | saned in sane-backends 1.0.7 and earlier, and possibly later versions, does not properly allocate memory in certain cases, which could allow attackers to cause a denial of service (memory consumption). | [] | null | null | null | null |
|
RHSA-2024:3775 | Red Hat Security Advisory: idm:DL1 security update | freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.1 | null | null |
CVE-1999-0268 | MetaInfo MetaWeb web server allows users to upload, execute, and read scripts. | [
"cpe:2.3:a:metainfo:metaweb:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-7m7g-25jr-54gh | SQL injection vulnerability in index.php for RadScripts RadBids Gold 2 allows remote attackers to execute arbitrary SQL commands via the mode parameter. | [] | null | null | null | null |
|
GHSA-f26q-xpfw-6vmj | An issue was discovered in Zoho ManageEngine AssetExplorer. There is XSS via SoftwareListView.do with the parameter swType or swComplianceType. | [] | null | 6.1 | null | null |
|
RHSA-2024:2696 | Red Hat Security Advisory: unbound security update | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8 | null | null |
GHSA-fm87-46vv-jqrr | Path Traversal in html-pages | Versions of `html-pages` before 2.1.0 are vulnerable to path traversal.RecommendationUpdate to version 2.1.0 or later. | [] | null | 9.8 | null | null |
GHSA-hg7w-q48h-fqfx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SysBasics Customize My Account for WooCommerce allows Reflected XSS. This issue affects Customize My Account for WooCommerce: from n/a through 2.8.22. | [] | null | 7.1 | null | null |
|
CVE-2022-23327 | A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS). | [
"cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2019-17093 | An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0. | [
"cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avg:anti-virus:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.4 |
|
GHSA-49rm-rmg5-26vv | Warehouse Management System v1.0 was discovered to contain a SQL injection vulnerability via the cari parameter. | [] | null | 7.5 | null | null |
|
CVE-2013-4824 | Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to bypass authentication via unknown vectors, aka ZDI-CAN-1644. | [
"cpe:2.3:a:hp:imc_service_operation_management_software_module:-:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-fwjp-fr8h-pc84 | SQL Injection vulnerability in the module "Isotope" (pk_isotope) <=1.7.3 from Promokit.eu for PrestaShop allows attackers to obtain sensitive information and cause other impacts via `pk_isotope::saveData` and `pk_isotope::removeData` methods. | [] | null | 9.8 | null | null |
|
GHSA-qw5p-mqmr-476h | Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function. | [] | null | null | null | null |
|
GHSA-gw78-jjhr-qwf9 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
PYSEC-2017-105 | null | Apache Atlas versions 0.6.0 (incubating), 0.7.0 (incubating), and 0.7.1 (incubating) allow access to the webapp directory contents by pointing to URIs like /js and /img. | [] | null | null | 7.5 | null |
GHSA-38hc-j6w3-jg6w | The Bundle copy module 7.x-1.x before 7.x-1.1 for Drupal does not check for the "use PHP for settings" permission while importing settings, which allows remote authenticated users with certain permissions to execute arbitrary PHP code via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-7254 | Stack overflow in Protocol Buffers Java Lite | Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. | [
"cpe:2.3:a:google:protobuf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*"
] | 8.7 | null | null | null |
GHSA-h5qg-fjxf-6rch | An issue in Cloud Whale Interactive Technology LLC. PolyBuzz iOS 2.0.20 allows attackers to access sensitive user information via supplying a crafted link. | [] | null | 6.5 | null | null |
|
RHSA-2013:1115 | Red Hat Security Advisory: bind97 security update | bind: named crash with an assertion failure on parsing malformed rdata | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-h256-hgwr-xqh9 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF files. Crafted data in a TIF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18700. | [] | null | 7.8 | null | null |
|
CVE-2024-1441 | Libvirt: off-by-one error in udevlistinterfacesbystatus() | An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash. | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/a:redhat:advanced_virtualization:8::el8"
] | null | 5.5 | null | null |
CVE-2019-2948 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
PYSEC-2021-476 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc) does not validate all constraints specified in the op's contract(https://www.tensorflow.org/api_docs/python/tf/raw_ops/QuantizedBatchNormWithGlobalNormalization). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [] | null | null | null | null |
GHSA-88c5-63gc-ff3v | itsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote code execution can be achieved by entering malicious code in the date selection box. | [] | null | 6.1 | null | null |
|
GHSA-5wrj-rjjw-w232 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter in ip/goform/addressNat. | [] | null | 7.5 | null | null |
|
GHSA-6q72-j329-pxq8 | The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows remote attackers to modify data or cause a denial of service, or execute arbitrary code, via unspecified vectors. | [] | null | null | null | null |
|
GHSA-3xpv-gvv8-7m5h | The Wechat Social login plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'convert_remoteimage_to_local' function in versions up to, and including, 1.3.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | [] | null | 9.8 | null | null |
|
CVE-2022-42538 | Elevation of privilege | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-wc83-5m7f-xhpq | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation. | [] | null | null | null | null |
|
GHSA-8cf9-r9vq-j85q | The Quick Paypal Payments WordPress plugin before 5.7.26.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
CVE-2023-33287 | A stored cross-site scripting (XSS) vulnerability in the Inline Table Editing application before 3.8.0 for Confluence allows attackers to store and execute arbitrary JavaScript via a crafted payload injected into the tables. | [
"cpe:2.3:a:actonic:inline_table_editing:*:*:*:*:*:confluence:*:*"
] | null | 5.4 | null | null |
|
GHSA-33wx-8m27-jwj5 | The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability. | [] | null | 6.1 | null | null |
|
GHSA-v29p-wgpj-c454 | In the Linux kernel, the following vulnerability has been resolved:mctp: fix use after freeClang static analysis reports this problem
route.c:425:4: warning: Use of memory after it is freed
trace_mctp_key_acquire(key);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
When mctp_key_add() fails, key is freed but then is later
used in trace_mctp_key_acquire(). Add an else statement
to use the key only when mctp_key_add() is successful. | [] | null | 7.8 | null | null |
|
GHSA-3fq4-ww3p-x6v2 | GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c:314:12. | [] | null | null | 6.5 | null |
|
CVE-2024-46046 | Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function. | [
"cpe:2.3:o:tenda:fh451_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:fh451_firmware:1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:fh451:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2024-4438 | Etcd: incomplete fix for cve-2023-39325/cve-2023-44487 in openstack platform | The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2023-39325/CVE-2023-44487, known as Rapid Reset. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead. | [
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8",
"cpe:/a:redhat:openstack:17.1::el9",
"cpe:/a:redhat:openstack:18.0"
] | null | 7.5 | null | null |
GHSA-3m8v-mqfw-xp3g | In the Linux kernel, the following vulnerability has been resolved:PCI: s390: Fix use-after-free of PCI resources with per-function hotplugOn s390 PCI functions may be hotplugged individually even when they
belong to a multi-function device. In particular on an SR-IOV device VFs
may be removed and later re-added.In commit a50297cf8235 ("s390/pci: separate zbus creation from
scanning") it was missed however that struct pci_bus and struct
zpci_bus's resource list retained a reference to the PCI functions MMIO
resources even though those resources are released and freed on
hot-unplug. These stale resources may subsequently be claimed when the
PCI function re-appears resulting in use-after-free.One idea of fixing this use-after-free in s390 specific code that was
investigated was to simply keep resources around from the moment a PCI
function first appeared until the whole virtual PCI bus created for
a multi-function device disappears. The problem with this however is
that due to the requirement of artificial MMIO addreesses (address
cookies) extra logic is then needed to keep the address cookies
compatible on re-plug. At the same time the MMIO resources semantically
belong to the PCI function so tying their lifecycle to the function
seems more logical.Instead a simpler approach is to remove the resources of an individually
hot-unplugged PCI function from the PCI bus's resource list while
keeping the resources of other PCI functions on the PCI bus untouched.This is done by introducing pci_bus_remove_resource() to remove an
individual resource. Similarly the resource also needs to be removed
from the struct zpci_bus's resource list. It turns out however, that
there is really no need to add the MMIO resources to the struct
zpci_bus's resource list at all and instead we can simply use the
zpci_bar_struct's resource pointer directly. | [] | null | null | null | null |
|
GHSA-gp2r-2vq4-pw96 | Cross-site scripting (XSS) vulnerability in neomail.pl in NeoMail 1.27 allows remote attackers to inject arbitrary web script or HTML via the sort parameter. NOTE: some sources say that the affected parameter is "date," but the demonstration URL shows that it is "sort". | [] | null | null | null | null |
|
CVE-2020-16987 | Azure Sphere Unsigned Code Execution Vulnerability | Azure Sphere Unsigned Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
CVE-2017-1000412 | Linaro's open source TEE solution called OP-TEE, version 2.4.0 (and older) is vulnerable to the bellcore attack in the LibTomCrypt code resulting in compromised private RSA key. | [
"cpe:2.3:a:linaro:op-tee:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-34606 | XINJE XD/E Series PLC Program Tool DLL Hijacking | A vulnerability exists in XINJE XD/E Series PLC Program Tool in versions up to v3.5.1 that can allow an authenticated, local attacker to load a malicious DLL. Local access is required to successfully exploit this vulnerability. This means the potential attacker must have access to the system and sufficient file-write privileges. If exploited, the attacker could place a malicious DLL file on the system, that when running XINJE XD/E Series PLC Program Tool will allow the attacker to execute arbitrary code with the privileges of another user's account. | [
"cpe:2.3:a:xinje:xd\\/e_series_plc_program_tool:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
GHSA-g2pj-29c7-96vw | Gambio GX before 4.0.1.0 allows SQL Injection in admin/mobile.php. | [] | null | null | null | null |
|
CVE-2021-29811 | IBM Jazz for Service Management and IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 stores user credentials in plain clear text which can be read by an authenticated admin user. IBM X-Force ID: 204329. | [
"cpe:2.3:a:ibm:tivoli_netcool\\/omnibus_webgui:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | null |
|
CVE-2019-10092 | In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. | [
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collection:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:9.6:-:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:9.6:p1:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:9.6:p3:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:9.6:p4:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:9.6:p7:*:*:*:*:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:9.6:p8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2022-33906 | DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the FwBlockServiceSmm driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.23, 5.3: 05.36.23, 5.4: 05.44.23, 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022048 | [
"cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
GHSA-2x9p-5m3j-p43m | Shopwind <=v3.4.2 was discovered to contain a Arbitrary File Download vulnerability via the neirong parameter at \backend\controllers\DbController.php. | [] | null | 5.3 | null | null |
|
CVE-2020-2490 | If exploited, the command injection vulnerability could allow remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. QTS versions prior to 4.4.3.1421 on build 20200907. | [
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-qq7c-vp73-p9c7 | FUEL CMS 1.5.0 allows SQL Injection via parameter 'col' in /fuel/index.php/fuel/logs/items | [] | null | null | null | null |
|
GHSA-rjjv-v2f9-mvc3 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roninwp FAT Event Lite allows Stored XSS. This issue affects FAT Event Lite: from n/a through 1.1. | [] | null | 6.5 | null | null |
|
GHSA-rwhp-3v8j-67m2 | dingfanzu CMS V1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the addPro parameter of the component doAdminAction.php which allows a remote attacker to execute arbitrary code | [] | null | 6.1 | null | null |
|
CVE-2003-0266 | Multiple buffer overflows in SLWebMail 3 on Windows systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long Language parameter to showlogin.dll, (2) a long CompanyID parameter to recman.dll, (3) a long CompanyID parameter to admin.dll, or (4) a long CompanyID parameter to globallogin.dll. | [
"cpe:2.3:a:bvrp_software:slwebmail:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-5jq8-q6rj-9gq4 | Red-DiscordBot vulnerable to Incorrect Authorization in commands API | ImpactDue to a bug in Red's Core API, 3rd-party cogs using the [`@commands.can_manage_channel()`](https://docs.discord.red/en/stable/framework_checks.html#redbot.core.commands.can_manage_channel) command permission check without additional permission controls may authorize a user to run a command even when that user doesn't have permissions to manage a channel.
None of the core commands or core cogs are affected. The maintainers of the project are not aware of any _public_ 3rd-party cog utilizing this API at the time of writing this advisory.The [`@commands.mod_or_can_manage_channel()`](https://docs.discord.red/en/stable/framework_checks.html#redbot.core.commands.mod_or_can_manage_channel), [`@commands.admin_or_can_manage_channel()`](https://docs.discord.red/en/stable/framework_checks.html#redbot.core.commands.admin_or_can_manage_channel), and [`@commands.guildowner_or_can_manage_channel()`](https://docs.discord.red/en/stable/framework_checks.html#redbot.core.commands.guildowner_or_can_manage_channel) command permission checks are unaffected.CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/AU:Y/R:U/RE:LPatchesThe problem was patched in PR #6398 and later released in version [3.5.10](https://pypi.org/project/Red-DiscordBot/3.5.10/).WorkaroundsAny cog using the [`@commands.can_manage_channel()`](https://docs.discord.red/en/stable/framework_checks.html#redbot.core.commands.can_manage_channel) command permission check should be unloaded until an upgrade to a patched version can be performed.Referenceshttps://github.com/Cog-Creators/Red-DiscordBot/pull/6398
https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.5.10
https://pypi.org/project/Red-DiscordBot/3.5.10/ | [] | 6.9 | 5.3 | null | null |
CVE-2024-7383 | Libnbd: nbd server improper certificate validation | A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic. | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:10",
"cpe:/a:redhat:advanced_virtualization:8::el8"
] | null | 7.4 | null | null |
CVE-2009-3389 | Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions. | [
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0a1:*:pre:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0a1pre:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-c379-hcwr-qvc4 | Mozilla Firefox before 43.0 mishandles the # (number sign) character in a data: URI, which allows remote attackers to spoof web sites via unspecified vectors. | [] | null | null | null | null |
|
GHSA-hq73-h252-8wm6 | Unknown vulnerability in UFS for Solaris 9 for SPARC, with logging enabled, allows local users to cause a denial of service (UFS file system hang). | [] | null | null | null | null |
|
CVE-2023-52453 | hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume | In the Linux kernel, the following vulnerability has been resolved:
hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume
When the optional PRE_COPY support was added to speed up the device
compatibility check, it failed to update the saving/resuming data
pointers based on the fd offset. This results in migration data
corruption and when the device gets started on the destination the
following error is reported in some cases,
[ 478.907684] arm-smmu-v3 arm-smmu-v3.2.auto: event 0x10 received:
[ 478.913691] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000310200000010
[ 478.919603] arm-smmu-v3 arm-smmu-v3.2.auto: 0x000002088000007f
[ 478.925515] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000000000000000
[ 478.931425] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000000000000000
[ 478.947552] hisi_zip 0000:31:00.0: qm_axi_rresp [error status=0x1] found
[ 478.955930] hisi_zip 0000:31:00.0: qm_db_timeout [error status=0x400] found
[ 478.955944] hisi_zip 0000:31:00.0: qm sq doorbell timeout in function 2 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-34282 | A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-047) | [
"cpe:2.3:a:siemens:pads_viewer:*:*:*:*:plus:*:*:*",
"cpe:2.3:a:siemens:pads_viewer:*:*:*:*:standard:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-9hch-g858-cr9j | IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 270270. | [] | null | 10 | null | null |
|
GHSA-gc94-7v9h-xfq8 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.1 before 15.3.5, all versions starting from 15.4 before 15.4.4, all versions starting from 15.5 before 15.5.2. A malicious maintainer could exfiltrate a Datadog integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server. | [] | null | 5.4 | null | null |
|
CVE-2017-16512 | The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 through 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available. | [
"cpe:2.3:a:hashicorp:vagrant_vmware_fusion:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2018-8039 | It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks. | [
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2024-34547 | WordPress Magical Addons For Elementor plugin <= 1.1.34 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor alam Magical Addons For Elementor allows Stored XSS.This issue affects Magical Addons For Elementor: from n/a through 1.1.34.
| [] | null | 6.5 | null | null |
GHSA-rcp4-35j5-3qcc | The Meks Flexible Shortcodes WordPress plugin before 1.3.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [] | null | 5.4 | null | null |
|
PYSEC-2021-140 | null | An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword. | [] | null | null | null | null |
GHSA-ggpf-5p78-jw44 | Cross-site scripting (XSS) vulnerability in the HTTP Protocol Stack (HTTPSTK) in Novell eDirectory before 8.8 SP3 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. | [] | null | null | null | null |
|
CVE-2020-12963 | An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system. | [
"cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2005-3586 | content.php in Mambo 4.5.2 through 4.5.2.3 allows remote attackers to obtain the installation path of the application via a URL that causes the application to return an error. | [
"cpe:2.3:a:mambo:mambo:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.2.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.