id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-mwvc-v6v5-5p39
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2025-5512
|
quequnlong shiyi-blog Administrator Backend verifyPassword improper authentication
|
A vulnerability, which was classified as critical, was found in quequnlong shiyi-blog up to 1.2.1. Affected is an unknown function of the file /api/sys/user/verifyPassword/ of the component Administrator Backend. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
CVE-2017-8827
|
forgotpassword.php in GeniXCMS 1.0.2 lacks a rate limit, which might allow remote attackers to cause a denial of service (login inability) or possibly conduct Arbitrary User Password Reset attacks via a series of requests.
|
[
"cpe:2.3:a:genixcms:genixcms:1.0.2:*:*:*:*:*:*:*"
] | null | null | 9.1
| 6.4
| null |
|
CVE-1999-0174
|
The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack.
|
[
"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*"
] | null | null | null | 6.4
| null |
|
CVE-2020-35545
|
Time-based SQL injection exists in Spotweb 1.4.9 via the query string.
|
[
"cpe:2.3:a:spotweb_project:spotweb:1.4.9:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
CVE-2021-21375
|
Crash in receiving updated SDP answer after initial SDP negotiation failed
|
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service.
|
[
"cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.5
| null | null | null |
GHSA-45vq-42x3-g38f
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a length variable which is used to copy data has a size of only 8 bits and can be exceeded resulting in a denial of service.
|
[] | null | null | 7.5
| null | null |
|
GHSA-mh9h-44jv-cw34
|
Software installed and run as a non-privileged user may conduct improper GPU system calls to gain access to the graphics buffers of a parent process.
|
[] | null | 8.4
| null | null | null |
|
GHSA-r587-wfm5-v67q
|
Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
|
[] | null | null | null | null | null |
|
GHSA-ffg8-5m28-xmv3
|
Cross Site Scripting (XSS) vulnerability in mblog 3.5 via the nickname field to /settings/profile.
|
[] | null | null | null | null | null |
|
CVE-2022-0985
|
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 4.3
| null | 4
| null |
|
CVE-2024-36949
|
amd/amdkfd: sync all devices to wait all processes being evicted
|
In the Linux kernel, the following vulnerability has been resolved:
amd/amdkfd: sync all devices to wait all processes being evicted
If there are more than one device doing reset in parallel, the first
device will call kfd_suspend_all_processes() to evict all processes
on all devices, this call takes time to finish. other device will
start reset and recover without waiting. if the process has not been
evicted before doing recover, it will be restored, then caused page
fault.
|
[] | null | 4.7
| null | null | null |
CVE-2016-7099
|
The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
|
[
"cpe:2.3:a:nodejs:node.js:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.16-isaacs-manual:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.19:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.21:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.22:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.23:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.25:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.26:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.27:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.28:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.29:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.31:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.32:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.33:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.34:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.35:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.36:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.37:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.38:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.39:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.40:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.41:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.42:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.43:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.44:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.45:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.46:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.14:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.15:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.5.0:*:*:*:*:*:*:*"
] | null | null | 5.9
| 4.3
| null |
|
GHSA-vp7q-rg64-pxr9
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35803.
|
[] | null | 7.8
| null | null | null |
|
GHSA-2r6x-xmcw-65m8
|
In the Linux kernel, the following vulnerability has been resolved:f2fs: fix to do sanity check on direct node in truncate_dnode()syzbot reports below bug:BUG: KASAN: slab-use-after-free in f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574
Read of size 4 at addr ffff88802a25c000 by task syz-executor148/5000CPU: 1 PID: 5000 Comm: syz-executor148 Not tainted 6.4.0-rc7-syzkaller-00041-ge660abd551f1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351
print_report mm/kasan/report.c:462 [inline]
kasan_report+0x11c/0x130 mm/kasan/report.c:572
f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574
truncate_dnode+0x229/0x2e0 fs/f2fs/node.c:944
f2fs_truncate_inode_blocks+0x64b/0xde0 fs/f2fs/node.c:1154
f2fs_do_truncate_blocks+0x4ac/0xf30 fs/f2fs/file.c:721
f2fs_truncate_blocks+0x7b/0x300 fs/f2fs/file.c:749
f2fs_truncate.part.0+0x4a5/0x630 fs/f2fs/file.c:799
f2fs_truncate include/linux/fs.h:825 [inline]
f2fs_setattr+0x1738/0x2090 fs/f2fs/file.c:1006
notify_change+0xb2c/0x1180 fs/attr.c:483
do_truncate+0x143/0x200 fs/open.c:66
handle_truncate fs/namei.c:3295 [inline]
do_open fs/namei.c:3640 [inline]
path_openat+0x2083/0x2750 fs/namei.c:3791
do_filp_open+0x1ba/0x410 fs/namei.c:3818
do_sys_openat2+0x16d/0x4c0 fs/open.c:1356
do_sys_open fs/open.c:1372 [inline]
__do_sys_creat fs/open.c:1448 [inline]
__se_sys_creat fs/open.c:1442 [inline]
__x64_sys_creat+0xcd/0x120 fs/open.c:1442
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcdThe root cause is, inodeA references inodeB via inodeB's ino, once inodeA
is truncated, it calls truncate_dnode() to truncate data blocks in inodeB's
node page, it traverse mapping data from node->i.i_addr[0] to
node->i.i_addr[ADDRS_PER_BLOCK() - 1], result in out-of-boundary access.This patch fixes to add sanity check on dnode page in truncate_dnode(),
so that, it can help to avoid triggering such issue, and once it encounters
such issue, it will record newly introduced ERROR_INVALID_NODE_REFERENCE
error into superblock, later fsck can detect such issue and try repairing.Also, it removes f2fs_truncate_data_blocks() for cleanup due to the
function has only one caller, and uses f2fs_truncate_data_blocks_range()
instead.
|
[] | null | null | null | null | null |
|
CVE-2025-5903
|
TOTOLINK T10 POST Request cstecgi.cgi setWiFiAclRules buffer overflow
|
A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7
| 8.8
| 8.8
| 9
| null |
GHSA-prq7-8x29-rfm8
|
A vulnerability classified as critical was found in corincerami curiosity. Affected by this vulnerability is an unknown functionality of the file app/controllers/image_controller.rb. The manipulation of the argument sol leads to sql injection. The name of the patch is d64fddd74ca72714e73f4efe24259ca05c8190eb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217639.
|
[] | null | 9.8
| null | null | null |
|
GHSA-f48x-7rw5-v6gv
|
An issue was discovered in YzmCMS V5.8. There is a CSRF vulnerability that can add member user accounts via member/member/add.html.
|
[] | null | null | null | null | null |
|
CVE-2023-42657
|
WS_FTP Server Directory Traversal
|
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a directory traversal vulnerability was discovered. An attacker could leverage this vulnerability to perform file operations (delete, rename, rmdir, mkdir) on files and folders outside of their authorized WS_FTP folder path. Attackers could also escape the context of the WS_FTP Server file structure and perform the same level of operations (delete, rename, rmdir, mkdir) on file and folder locations on the underlying operating system.
|
[
"cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*"
] | null | 9.9
| null | null | null |
GHSA-68x4-crpm-89qf
|
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31253255. References: QC-CR#1072166.
|
[] | null | null | 7
| null | null |
|
CVE-2020-0067
|
In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: Android. Versions: Android kernel. Android ID: A-120551147.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 4.4
| null | 2.1
| null |
|
CVE-2022-0660
|
Generation of Error Message Containing Sensitive Information in microweber/microweber
|
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
|
[
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 9.4
| null | null |
GHSA-97m2-g29m-rv4q
|
A Remote Arbitrary Code Execution vulnerability in HPE Intelligent Management Center (IMC) PLAT version 7.2 E0403P06 was found.
|
[] | null | null | 8.8
| null | null |
|
GHSA-559q-jfjp-2w9j
|
The xp_enumresultset function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2015-5223
|
OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.
|
[
"cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-5gxv-52gp-vmhp
|
Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 8.8
| null | null | null |
|
GHSA-g8c4-9gqr-q3cf
|
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an external control of file name or path vulnerability has been identified, which may allow an attacker to delete files.
|
[] | null | null | 7.5
| null | null |
|
CVE-2021-46979
|
iio: core: fix ioctl handlers removal
|
In the Linux kernel, the following vulnerability has been resolved:
iio: core: fix ioctl handlers removal
Currently ioctl handlers are removed twice. For the first time during
iio_device_unregister() then later on inside
iio_device_unregister_eventset() and iio_buffers_free_sysfs_and_mask().
Double free leads to kernel panic.
Fix this by not touching ioctl handlers list directly but rather
letting code responsible for registration call the matching cleanup
routine itself.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
CVE-2016-0535
|
Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect availability via vectors related to RPC.
|
[
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-46v6-hq2c-4h25
|
A vulnerability has been found in Tenda 4G300 1.01.42 and classified as critical. Affected by this vulnerability is the function sub_41E858. The manipulation of the argument GO/page leads to stack-based buffer overflow. The attack can be launched remotely. The identifier VDB-261985 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 8.8
| null | null | null |
|
CVE-2021-22231
|
A denial of service in user's profile page is found starting with GitLab CE/EE 8.0 that allows attacker to reject access to their profile page via using a specially crafted username.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 3.5
| null | null | null |
|
GHSA-7wf8-gwxc-fc4v
|
Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3353.
|
[] | null | null | null | null | null |
|
GHSA-w3fh-pxv3-4cx4
|
include/iniset.php in Roundcube Webmail 0.5.4 and earlier, when PHP 5.3.7 or 5.3.8 is used, allows remote attackers to trigger a GET request for an arbitrary URL, and cause a denial of service (resource consumption and inbox outage), via a Subject header containing only a URL, a related issue to CVE-2011-3379.
|
[] | null | null | null | null | null |
|
GHSA-3j5x-8vq5-wc5h
|
Hitachi Vantara Pentaho Business Analytics Server versions before 9.3.0.0, 9.2.0.2 and 8.3.0.25 with the Data Lineage feature enabled transmits database passwords in clear text. The transmission of sensitive data in clear text allows unauthorized actors with access to the network to sniff and obtain sensitive information that can be later used to gain unauthorized access.
|
[] | null | 7.5
| null | null | null |
|
GHSA-m8p9-q9xx-54j2
|
TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vulnerability in the setup.cgi binary, exploitable via the HTTP parameters "command", "todo", and "next_file," which allows an attacker to execute arbitrary commands with root privileges.
|
[] | null | 8
| null | null | null |
|
GHSA-7864-h326-5m8j
|
In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148
|
[] | null | null | null | null | null |
|
CVE-2019-5998
|
Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via notifybtstatus command.
|
[
"cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*"
] | null | null | 8.8
| 8.3
| null |
|
CVE-2021-25766
|
In JetBrains YouTrack before 2020.4.4701, improper resource access checks were made.
|
[
"cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*"
] | null | 5.3
| null | 5
| null |
|
GHSA-47gg-69h8-fx9p
|
An Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, version 7.4.7 and below may allow an EAP verified remote user to connect from FortiClient via revoked certificate.
|
[] | null | 6.5
| null | null | null |
|
CVE-2006-0998
|
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) sometimes selects a weak cipher instead of an available stronger cipher, which makes it easier for remote attackers to sniff and decrypt an SSL protected session.
|
[
"cpe:2.3:o:novell:open_enterprise_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:sp1.1a:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:sp1.1b:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-h95j-w8vr-v949
|
A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for CVE-2005-0155, which allows local users to overwrite arbitrary files with debugging information.
|
[] | null | null | null | null | null |
|
GHSA-h2f9-j85c-642x
|
An arbitrary File download vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: fileDownload(). An attacker can pass in specially crafted filePath and fieName parameters to perform arbitrary File download.
|
[] | null | 9.8
| null | null | null |
|
GHSA-h2jh-xp68-gwgf
|
Red Hat JBoss EAP version 5 is vulnerable to a deserialization of untrusted data in the JMX endpoint when deserializes the credentials passed to it. An attacker could exploit this vulnerability resulting in a denial of service attack.
|
[] | null | null | 5.3
| null | null |
|
CVE-2019-15001
|
The Jira Importers Plugin in Atlassian Jira Server and Data Cente from version with 7.0.10 before 7.6.16, from 7.7.0 before 7.13.8, from 8.0.0 before 8.1.3, from 8.2.0 before 8.2.5, from 8.3.0 before 8.3.4 and from 8.4.0 before 8.4.1 allows remote attackers with Administrator permissions to gain remote code execution via a template injection vulnerability through the use of a crafted PUT request.
|
[
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:8.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:8.4.0:*:*:*:*:*:*:*"
] | null | 7.2
| null | 9
| null |
|
CVE-2021-24073
|
Skype for Business and Lync Spoofing Vulnerability
|
Skype for Business and Lync Spoofing Vulnerability
|
[
"cpe:2.3:a:microsoft:lync_server:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:skype_for_business_server:2015:cu8:*:*:*:*:*:*"
] | null | 6.5
| null | null | null |
CVE-2018-9590
|
In add_attr of sdp_discovery.c in Android-7.0, Android-7.1.1, Android-7.1.2, Android-8.0, Android-8.1 and Android-9, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Android ID: A-115900043.
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2021-41185
|
Download file outside intended directory
|
Mycodo is an environmental monitoring and regulation system. An exploit in versions prior to 8.12.7 allows anyone with access to endpoints to download files outside the intended directory. A patch has been applied and a release made. Users should upgrade to version 8.12.7. As a workaround, users may manually apply the changes from the fix commit.
|
[
"cpe:2.3:a:mycodo_project:mycodo:*:*:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
GHSA-8vrf-cvxp-7364
|
HTMLCOIN through 2.12 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service. The attacker sends invalid headers/blocks. The attack requires no stake and can fill the victim's disk and RAM.
|
[] | null | 7.5
| null | null | null |
|
CVE-2019-1990
|
In ihevcd_fmt_conv_420sp_to_420p of ihevcd_fmt_conv.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-118453553
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8
| 9.3
| null |
|
CVE-2024-30473
|
Dell ECS, versions prior to 3.8.1, contain a privilege elevation vulnerability in user management. A remote high privileged attacker could potentially exploit this vulnerability, gaining access to unauthorized end points.
|
[] | null | 4.9
| null | null | null |
|
GHSA-pv77-wcvm-2654
|
Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: APIs). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
|
[] | null | null | null | null | null |
|
RHSA-2019:2004
|
Red Hat Security Advisory: icedtea-web security update
|
icedtea-web: unsigned code injection in a signed JAR file icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.2
| null | null |
GHSA-j3r3-5gjp-qv35
|
The URL handler in the manual browser option for Gaim before 0.59.1 allows remote attackers to execute arbitrary script via shell metacharacters in a link.
|
[] | null | null | null | null | null |
|
CVE-2004-1349
|
gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.
|
[
"cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*"
] | null | null | null | 2.1
| null |
|
GHSA-mp76-7w5v-pr75
|
TurboBoost Commands vulnerable to arbitrary method invocation
|
ImpactTurboBoost Commands has existing protections in place to guarantee that only public methods on Command classes can be invoked; however, the existing checks aren't as robust as they should be. It's possible for a sophisticated attacker to invoke more methods than should be permitted depending on the the strictness of authorization checks that individual applications enforce. Being able to call some of these methods can have security implications.DetailsCommands verify that the class must be a `Command` and that the method requested is defined as a public method; however, this isn't robust enough to guard against all unwanted code execution. The library should more strictly enforce which methods are considered safe before allowing them to be executed.PatchesPatched in the following versions.0.1.3[NPM Package](https://www.npmjs.com/package/@turbo-boost/commands/v/0.1.3)[Ruby GEM](https://rubygems.org/gems/turbo_boost-commands/versions/0.1.3)0.2.2[NPM Package](https://www.npmjs.com/package/@turbo-boost/commands/v/0.2.2)[Ruby GEM](https://rubygems.org/gems/turbo_boost-commands/versions/0.2.2)WorkaroundsYou can add this guard to mitigate the issue if running an unpatched version of the library.
|
[] | null | 8.1
| null | null | null |
GHSA-fh9c-m4hq-c8c4
|
Cross-site request forgery (CSRF) vulnerability in Special:CreateCategory in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to hijack the authentication of users for requests that create categories via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-m945-cp8g-j6x8
|
XML external entity (XXE) vulnerability in QlikTech Qlikview before 11.20 SR12 allows remote attackers to conduct server-side request forgery (SSRF) attacks and read arbitrary files via crafted XML data in a request to AccessPoint.aspx.
|
[] | null | null | null | null | null |
|
RHSA-2025:9126
|
Red Hat Security Advisory: libvpx security update
|
libvpx: Double-free in libvpx encoder
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.1
| null | null | null |
CVE-2025-49690
|
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
|
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an unauthorized attacker to elevate privileges locally.
|
[] | null | 7.4
| null | null | null |
GHSA-jmcc-mpgx-5c8c
|
In the Linux kernel, the following vulnerability has been resolved:bus: fsl-mc: don't assume child devices are all fsl-mc devicesChanges in VFIO caused a pseudo-device to be created as child of
fsl-mc devices causing a crash [1] when trying to bind a fsl-mc
device to VFIO. Fix this by checking the device type when enumerating
fsl-mc child devices.[1]
Modules linked in:
Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
CPU: 6 PID: 1289 Comm: sh Not tainted 6.2.0-rc5-00047-g7c46948a6e9c #2
Hardware name: NXP Layerscape LX2160ARDB (DT)
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mc_send_command+0x24/0x1f0
lr : dprc_get_obj_region+0xfc/0x1c0
sp : ffff80000a88b900
x29: ffff80000a88b900 x28: ffff48a9429e1400 x27: 00000000000002b2
x26: ffff48a9429e1718 x25: 0000000000000000 x24: 0000000000000000
x23: ffffd59331ba3918 x22: ffffd59331ba3000 x21: 0000000000000000
x20: ffff80000a88b9b8 x19: 0000000000000000 x18: 0000000000000001
x17: 7270642f636d2d6c x16: 73662e3030303030 x15: ffffffffffffffff
x14: ffffd59330f1d668 x13: ffff48a8727dc389 x12: ffff48a8727dc386
x11: 0000000000000002 x10: 00008ceaf02f35d4 x9 : 0000000000000012
x8 : 0000000000000000 x7 : 0000000000000006 x6 : ffff80000a88bab0
x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000a88b9e8
x2 : ffff80000a88b9e8 x1 : 0000000000000000 x0 : ffff48a945142b80
Call trace:
mc_send_command+0x24/0x1f0
dprc_get_obj_region+0xfc/0x1c0
fsl_mc_device_add+0x340/0x590
fsl_mc_obj_device_add+0xd0/0xf8
dprc_scan_objects+0x1c4/0x340
dprc_scan_container+0x38/0x60
vfio_fsl_mc_probe+0x9c/0xf8
fsl_mc_driver_probe+0x24/0x70
really_probe+0xbc/0x2a8
__driver_probe_device+0x78/0xe0
device_driver_attach+0x30/0x68
bind_store+0xa8/0x130
drv_attr_store+0x24/0x38
sysfs_kf_write+0x44/0x60
kernfs_fop_write_iter+0x128/0x1b8
vfs_write+0x334/0x448
ksys_write+0x68/0xf0
__arm64_sys_write+0x1c/0x28
invoke_syscall+0x44/0x108
el0_svc_common.constprop.1+0x94/0xf8
do_el0_svc+0x38/0xb0
el0_svc+0x20/0x50
el0t_64_sync_handler+0x98/0xc0
el0t_64_sync+0x174/0x178
Code: aa0103f4 a9025bf5 d5384100 b9400801 (79401260)
---[ end trace 0000000000000000 ]---
|
[] | null | 5.5
| null | null | null |
|
GHSA-vwjx-mmwm-pwrf
|
Lucee RCE/XXE Vulnerability
|
ImpactThe Lucee team received a responsible disclosure of a security vulnerability which affects all previous releases of Lucee.After reviewing the report and confirming the vulnerability, the Lucee team then conducted a further security review and found additional vulnerabilities which have been addressed as part of this this security update.PatchesLucee 5.4.3.2 and 5.3.12.1 stable releases have been patched with additional hardeningThe older releases, 5.3.7.59., 5.3.8.236 and 5.3.9.173 have also been patchedAny users running older release, should plan to immediately upgrade to the latest stable release6.0 will have a RC as it's not yet released
|
[] | null | 10
| null | null | null |
GHSA-gcqv-qxrf-w8gq
|
The Admin CP in vBulletin 5.6.3 allows XSS via an admincp/attachment.php&do=rebuild&type= URI.
|
[] | null | null | null | null | null |
|
CVE-2002-2179
|
The dynamic initialization feature of the ClearPath MCP environment allows remote attackers to cause a denial of service (crash) via a TCP port scan using a tool such as nmap.
|
[
"cpe:2.3:h:unisys:clearpath_mcp:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8
| null |
|
cisco-sa-smb-rv-cmd-inj-8Pv9JMJD
|
Cisco Small Business RV Series Routers Command Injection Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV340 and RV345 Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
|
[] | null | 4.7
| null | null | null |
CVE-2018-3302
|
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H).
|
[
"cpe:2.3:a:oracle:outside_in_technology:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"
] | null | null | 7.1
| 5.8
| null |
|
GHSA-q8vp-7pjr-536g
|
Buffer overflow in the SSLv2 implementation in IBM Domino 8.5.x before 8.5.1 FP5 IF3, 8.5.2 before FP4 IF3, 8.5.3 before FP6 IF6, 9.0 before IF7, and 9.0.1 before FP2 IF3 allows remote attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-23580
|
WordPress BizLibrary plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthew Garvin BizLibrary allows Reflected XSS. This issue affects BizLibrary: from n/a through 1.1.
|
[] | null | 7.1
| null | null | null |
GHSA-xwvc-pqcf-c28g
|
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows remote attackers to cause a denial of service via invalid variables in an authentication packet, aka Bug ID CSCuv40469.
|
[] | null | null | null | null | null |
|
RHSA-2017:2029
|
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
|
openssh: User enumeration via covert timing channel openssh: Denial of service via very long passwords openssh: loading of untrusted PKCS#11 modules in ssh-agent openssh: Leak of host private key material to privilege-separated child process via realloc() openssh: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3
| null | null |
CVE-2019-1000
|
An elevation of privilege vulnerability exists in Microsoft Azure Active Directory Connect build 1.3.20.0, which allows an attacker to execute two PowerShell cmdlets in context of a privileged account, and perform privileged actions.To exploit this, an attacker would need to authenticate to the Azure AD Connect server, aka 'Microsoft Azure AD Connect Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:a:microsoft:azure_active_directory_connect:-:*:*:*:*:*:*:*"
] | null | null | 5.3
| 3.5
| null |
|
CVE-2007-3362
|
ageet AGEphone before 1.6.2, running on Windows Mobile 5 on the HTC HyTN Pocket PC device, allows remote attackers to (1) cause a denial of service (call disruption and device hang) via a SIP message with a malformed header and (2) cause a denial of service (call disruption, false ring indication, and device outage) via a SIP message with a malformed SDP delimiter.
|
[
"cpe:2.3:o:microsoft:windows_mobile:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:htc:hytn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ageet:agephone:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8
| null |
|
CVE-2024-8355
|
Visteon Infotainment System DeviceManager iAP Serial Number SQL Injection Vulnerability
|
Visteon Infotainment System DeviceManager iAP Serial Number SQL Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Visteon Infotainment system. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DeviceManager. When parsing the iAP Serial number, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20112.
|
[
"cpe:2.3:a:visteon:infotainment:74.00.311a:*:*:*:*:*:*:*",
"cpe:2.3:o:visteon:infotainment_firmware:74.00.311a:*:*:*:*:*:*:*"
] | null | null | 6.8
| null | null |
CVE-2022-21429
|
Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Billing Care). Supported versions that are affected are 12.0.0.4.0-12.0.0.6.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
|
GHSA-5vxq-pj53-vwx3
|
A vulnerability was found in SourceCodester Advocate Office Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /control/edit_client.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3
| 6.3
| null | null | null |
|
GHSA-3fj9-c88m-7g9f
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IndiaNIC Widgets Controller allows Reflected XSS.This issue affects Widgets Controller: from n/a through 1.1.
|
[] | null | 7.1
| null | null | null |
|
CVE-2022-3817
|
Axiomatic Bento4 mp4mux memory leak
|
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component mp4mux. The manipulation leads to memory leak. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212683.
|
[
"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*"
] | null | 4.3
| null | null | null |
GHSA-39jm-hv2r-rprm
|
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability in image conversion, related to parsing offsets in TIFF files. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 7.8
| null | null |
|
CVE-2024-56569
|
ftrace: Fix regression with module command in stack_trace_filter
|
In the Linux kernel, the following vulnerability has been resolved:
ftrace: Fix regression with module command in stack_trace_filter
When executing the following command:
# echo "write*:mod:ext3" > /sys/kernel/tracing/stack_trace_filter
The current mod command causes a null pointer dereference. While commit
0f17976568b3f ("ftrace: Fix regression with module command in stack_trace_filter")
has addressed part of the issue, it left a corner case unhandled, which still
results in a kernel crash.
|
[] | null | 5.5
| null | null | null |
CVE-2021-47088
|
mm/damon/dbgfs: protect targets destructions with kdamond_lock
|
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/dbgfs: protect targets destructions with kdamond_lock
DAMON debugfs interface iterates current monitoring targets in
'dbgfs_target_ids_read()' while holding the corresponding
'kdamond_lock'. However, it also destructs the monitoring targets in
'dbgfs_before_terminate()' without holding the lock. This can result in
a use_after_free bug. This commit avoids the race by protecting the
destruction with the corresponding 'kdamond_lock'.
|
[] | null | 7
| null | null | null |
GHSA-6fpg-25vc-vc92
|
The XML Editor in Microsoft InfoPath 2007 SP2 and 2010; SQL Server 2005 SP3 and SP4 and 2008 SP1, SP2, and R2; SQL Server Management Studio Express (SSMSE) 2005; and Visual Studio 2005 SP1, 2008 SP1, and 2010 does not properly handle external entities, which allows remote attackers to read arbitrary files via a crafted .disco (Web Service Discovery) file, aka "XML External Entities Resolution Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-qmx9-wr57-3mx9
|
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter on the registration page.
|
[] | null | 5.4
| null | null | null |
|
CVE-2014-7445
|
The LEGEND OF TRANCE (aka com.legendoftrance) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:jowangel:legend_of_trance:1:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
GHSA-73ch-cpx9-cfrm
|
Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: EMC). Supported versions that are affected are 19.1-19.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Simphony accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Simphony. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).
|
[] | null | 7.6
| null | null | null |
|
GHSA-vhmc-p5m8-7586
|
Directory traversal vulnerability in EFTP 2.0.8.346 allows local users to read directories via a ... (modified dot dot) in the CWD command.
|
[] | null | null | null | null | null |
|
GHSA-6hhf-qpp9-xw74
|
XunRuiCMS v4.5.5 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /admin.php.
|
[] | null | 6.1
| null | null | null |
|
GHSA-vmch-3qqq-rp5p
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Heateor Heateor Social Login allows Stored XSS.This issue affects Heateor Social Login: from n/a through 1.1.32.
|
[] | null | 6.5
| null | null | null |
|
GHSA-9h4h-3fmc-xcrf
|
IdeaTMS 2022 is vulnerable to SQL Injection via the PATH_INFO
|
[] | null | 9.8
| null | null | null |
|
CVE-2023-36528
|
WordPress kk Star Ratings plugin <= 5.4.3 - Rate Manipulation due to IP Spoofing Vulnerability
|
Missing Authorization vulnerability in FeedbackWP kk Star Ratings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects kk Star Ratings: from n/a through 5.4.3.
|
[] | null | 5.3
| null | null | null |
CVE-2018-20234
|
There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
|
[
"cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*"
] | null | null | 8.8
| 9
| null |
|
CVE-2021-26195
|
An issue was discovered in JerryScript 2.4.0. There is a heap-buffer-overflow in lexer_parse_number in js-lexer.c file.
|
[
"cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
CVE-2018-19135
|
ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capability). With this vulnerability, one can automatically upload files (by default, it allows html, pdf, xml, zip, and many other file types). A file can be accessed publicly under the "/assets/files" directory.
|
[
"cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.8
| null |
|
CVE-2022-40703
|
CWE-302 Authentication Bypass by Assumed-Immutable Data in AliveCor Kardia App version 5.17.1-754993421 and prior
on Android allows an unauthenticated attacker with physical access to the Android device containing the app to bypass application authentication and alter information in the app.
|
[
"cpe:2.3:a:alivecor:kardia:*:*:*:*:*:android:*:*"
] | null | 5.2
| null | null | null |
|
GHSA-8cmp-jx7c-f587
|
A vulnerability, which was classified as critical, has been found in qinguoyi TinyWebServer up to 1.0. Affected by this issue is some unknown functionality of the file /http/http_conn.cpp. The manipulation of the argument name/password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| null | null | null |
|
GHSA-r95r-f5pv-5rr9
|
Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
|
[] | null | 7.8
| null | null | null |
|
PYSEC-2019-103
| null |
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2).
|
[] | null | null | null | null | null |
GHSA-q9qr-vfrw-vgjq
|
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges and a compromised Firmware needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-146032016
|
[] | null | null | null | null | null |
|
RHSA-2025:16122
|
Red Hat Security Advisory: udisks2 security update
|
udisks: Out-of-bounds read in UDisks Daemon
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.5
| null | null | null |
GHSA-9fg7-x9rx-2vx3
|
Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a GIF image file with a crafted Netscape Navigator Application Extension Block that modifies the heap in the Picture Modifier block.
|
[] | null | null | null | null | null |
|
CVE-2020-36174
|
The Ninja Forms plugin before 3.4.27.1 for WordPress allows CSRF via services integration.
|
[
"cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*"
] | null | 6.5
| null | 4.3
| null |
|
GHSA-mm9r-mqf2-8fj4
|
Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.
|
[] | null | 4.4
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.