id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-3rj2-wfgm-mm6x | A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5. It has been declared as problematic. This vulnerability affects the function updateQuestionCou of the file /api/mjkj-chat/chat/mng/update/questionCou of the component Number of Question Handler. The manipulation leads to enforcement of behavioral workflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 5.3 | 4.3 | null | null |
|
CVE-2006-4915 | Cross-site scripting (XSS) vulnerability in index.php in Innovate Portal 2.0 allows remote attackers to inject arbitrary web script or HTML via the content parameter. | [
"cpe:2.3:a:innovate_portal:innovate_portal:2.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-35gp-6hvq-gx74 | Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect integrity via unknown vectors related to pkg.depotd. | []
| null | null | null | null |
|
CVE-2020-20595 | A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add. | [
"cpe:2.3:a:opms_project:opms:1.3:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-jpgp-p76h-hmp8 | An issue has been discovered in GitLab affecting versions from 11.8 before 12.10.13. GitLab was vulnerable to a stored XSS by in the error tracking feature. | []
| null | null | null | null |
|
CVE-2025-22304 | WordPress WP Visitor Statistics plugin <= 7.3 - Broken Access Control vulnerability | Missing Authorization vulnerability in osamaesh WP Visitor Statistics (Real Time Traffic) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through 7.3. | []
| null | 4.3 | null | null |
CVE-2023-46134 | D-Tale vulnerable to Remote Code Execution through the Custom Filter Input | D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.
| [
"cpe:2.3:a:man:d-tale:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
CVE-2023-5308 | The Podcast Subscribe Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'podcast_subscribe' shortcode in versions up to, and including, 1.4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:secondlinethemes:podcast_subscribe_buttons:*:*:*:*:*:wordpress:*:*"
]
| null | 6.4 | null | null |
|
ICSA-24-030-07 | Rockwell Automation LP30/40/50 and BM40 Operator Interface | After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpFiletransfer component to read internally from an invalid address, potentially leading to a denial-of-service condition. After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to memory, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpAppForce component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpApp/CmpAppBP/CmpAppForce components to read internally from an invalid address, potentially leading to a denial-of-service condition. After successful authentication, specifically crafted communication requests can cause the cmpFiletransfer component to dereference addresses provided by the request for internal read access, which can lead to a denial-of-service situation. | []
| null | 6.5 | null | null |
CVE-2011-4919 | mpack 1.6 has information disclosure via eavesdropping on mails sent by other users | [
"cpe:2.3:a:mpack_project:mpack:1.6:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2020-25599 | An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 7 | null | 4.4 |
|
GHSA-vp73-qc6h-83r4 | Unknown vulnerability in IPV6 functionality for DCE daemons (1) dced or (2) rpcd on HP-UX 11.11 allows attackers to cause a denial of service (crash) via an attack that modifies internal data. | []
| null | null | null | null |
|
GHSA-c9m9-x3p2-fwvw | The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space. | []
| null | null | 7.8 | null |
|
GHSA-xqv4-m752-6vpr | Memory leak in Cisco IOS XR 5.1.x through 5.1.3, 5.2.x through 5.2.5, and 5.3.x through 5.3.2 on ASR 9001 devices allows remote attackers to cause a denial of service (control-plane protocol outage) via crafted fragmented packets, aka Bug ID CSCux26791. | []
| null | null | 7.5 | null |
|
CVE-2020-15217 | User data exposure in GLPI | In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
CVE-2008-4179 | Multiple cross-site scripting (XSS) vulnerabilities in NooMS 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) page_id parameter to smileys.php and the (2) q parameter to search.php. | [
"cpe:2.3:a:nooms:nooms:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-5g9m-x68j-5mr2 | Citrix Provisioning Services before 7.12 allows attackers to obtain sensitive kernel address information via unspecified vectors. | []
| null | null | 5.3 | null |
|
GHSA-vjmg-qh6v-526r | In Ericsson BSCS iX R18 Billing & Rating iX R18, MX is a web base module in BSCS iX that is vulnerable to stored XSS via an Alert Dashboard comment. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or exploiting admins' browsers by using the beef framework. | []
| null | null | null | null |
|
CVE-2021-45674 | Certain NETGEAR devices are affected by stored XSS. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106. | [
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*"
]
| null | 3.2 | null | null |
|
GHSA-w3cg-6577-wx9f | Directory Traversal in cuciuci | Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | []
| null | null | 7.5 | null |
RHSA-2009:0053 | Red Hat Security Advisory: kernel-rt security and bug fix update | Linux Kernel 'atm module' Local Denial of Service kernel: libertas: fix buffer overrun kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector kernel: enforce a minimum SG_IO timeout kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
]
| null | null | null | null |
CVE-2010-5286 | Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. | [
"cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2025-38038 | cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost | In the Linux kernel, the following vulnerability has been resolved:
cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost
set_boost is a per-policy function call, hence a driver wide lock is
unnecessary. Also this mutex_acquire can collide with the mutex_acquire
from the mode-switch path in status_store(), which can lead to a
deadlock. So, remove it. | []
| null | null | null | null |
RHSA-2011:0306 | Red Hat Security Advisory: samba3x security update | Samba unsafe fd_set usage | [
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-jf69-6wxx-cpxg | The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory. | []
| null | null | null | null |
|
GHSA-rvjh-ch4h-2q94 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via getprop_builtin_foreign at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | []
| null | null | null | null |
|
CVE-2012-6583 | Cross-site scripting (XSS) vulnerability in the Imagemenu module 6.x-1.x before 6.x-1.4 for Drupal allows remote authenticated users with the "administer imagemenu" permission to inject arbitrary web script or HTML via an image file name. | [
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
RHSA-2024:10518 | Red Hat Security Advisory: OpenShift Container Platform 4.17.7 bug fix and security update | go-retryablehttp: url might write sensitive information to log file QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass cross-spawn: regular expression denial of service | [
"cpe:/a:redhat:openshift:4.17::el9"
]
| null | 4.4 | 7.5 | null |
GHSA-7fr5-wc4r-qrrc | The Web Panel in Netsweeper before 4.0.5 has a default password of branding for the branding account, which makes it easier for remote attackers to obtain access via a request to webadmin/. | []
| null | null | null | null |
|
GHSA-c9g7-6vjc-r2p5 | Cross-site request forgery (CSRF) vulnerability in admin/index.php in 11in1 1.2.1 stable 12-31-2011 allows remote attackers to hijack the authentication of administrators for requests that add new topics via an addTopic action. | []
| null | null | null | null |
|
CVE-2024-3534 | Campcodes Church Management System login.php sql injection | A vulnerability, which was classified as critical, has been found in Campcodes Church Management System 1.0. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259904. | [
"cpe:2.3:a:campcodes:church_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 7.3 | 7.3 | 7.5 |
CVE-2018-19620 | ShowDoc 2.4.1 allows remote attackers to edit other users' notes by navigating with a modified page_id. | [
"cpe:2.3:a:showdoc:showdoc:2.4.1:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4 |
|
GHSA-gv7v-mp3w-gfvh | Redmine before 4.0.9 and 4.1.x before 4.1.3 allows an attacker to learn the values of internal authentication keys by observing timing differences in string comparison operations within SysController and MailHandlerController. | []
| null | 5.3 | null | null |
|
GHSA-j4qq-hcfp-m638 | In the Linux kernel, the following vulnerability has been resolved:mm: migrate: fix getting incorrect page mapping during page migrationWhen running stress-ng testing, we found below kernel crash after a few hours:Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
pc : dentry_name+0xd8/0x224
lr : pointer+0x22c/0x370
sp : ffff800025f134c0
......
Call trace:
dentry_name+0xd8/0x224
pointer+0x22c/0x370
vsnprintf+0x1ec/0x730
vscnprintf+0x2c/0x60
vprintk_store+0x70/0x234
vprintk_emit+0xe0/0x24c
vprintk_default+0x3c/0x44
vprintk_func+0x84/0x2d0
printk+0x64/0x88
__dump_page+0x52c/0x530
dump_page+0x14/0x20
set_migratetype_isolate+0x110/0x224
start_isolate_page_range+0xc4/0x20c
offline_pages+0x124/0x474
memory_block_offline+0x44/0xf4
memory_subsys_offline+0x3c/0x70
device_offline+0xf0/0x120
......After analyzing the vmcore, I found this issue is caused by page migration.
The scenario is that, one thread is doing page migration, and we will use the
target page's ->mapping field to save 'anon_vma' pointer between page unmap and
page move, and now the target page is locked and refcount is 1.Currently, there is another stress-ng thread performing memory hotplug,
attempting to offline the target page that is being migrated. It discovers that
the refcount of this target page is 1, preventing the offline operation, thus
proceeding to dump the page. However, page_mapping() of the target page may
return an incorrect file mapping to crash the system in dump_mapping(), since
the target page->mapping only saves 'anon_vma' pointer without setting
PAGE_MAPPING_ANON flag.There are seveval ways to fix this issue:
(1) Setting the PAGE_MAPPING_ANON flag for target page's ->mapping when saving
'anon_vma', but this can confuse PageAnon() for PFN walkers, since the target
page has not built mappings yet.
(2) Getting the page lock to call page_mapping() in __dump_page() to avoid crashing
the system, however, there are still some PFN walkers that call page_mapping()
without holding the page lock, such as compaction.
(3) Using target page->private field to save the 'anon_vma' pointer and 2 bits
page state, just as page->mapping records an anonymous page, which can remove
the page_mapping() impact for PFN walkers and also seems a simple way.So I choose option 3 to fix this issue, and this can also fix other potential
issues for PFN walkers, such as compaction. | []
| null | 5.5 | null | null |
|
CVE-2016-9816 | Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at EL2. | [
"cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.9 |
|
GHSA-w8x6-88rf-9hhp | The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | []
| null | 6.5 | null | null |
|
CVE-2025-32649 | WordPress GB Gallery Slideshow Plugin <= 1.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gb-plugins GB Gallery Slideshow allows Reflected XSS. This issue affects GB Gallery Slideshow: from n/a through 1.3. | []
| null | 7.1 | null | null |
CVE-2019-11021 | admin/app/mediamanager in Schlix CMS 2.1.8-7 allows Authenticated Unrestricted File Upload, leading to remote code execution. NOTE: "While inadvertently allowing a PHP file to be uploaded via Media Manager was an oversight, it still requires an admin permission. We think it's pretty rare for an administrator to exploit a bug on his/her own site to own his/her own site. | [
"cpe:2.3:a:schlix:cms:2.1.8-7:*:*:*:*:*:*:*"
]
| null | 7.2 | null | 6.5 |
|
CVE-2018-9935 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addField method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5312. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2024-8888 | Insufficient Session Expiration vulnerability on CIRCUTOR Q-SMT | An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc. | [
"cpe:2.3:a:circutor:circutor_q_smt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:circutor:q-smt_firmware:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:circutor:q-smt:-:*:*:*:*:*:*:*"
]
| null | 10 | null | null |
CVE-2022-26897 | Azure Site Recovery Information Disclosure Vulnerability | Azure Site Recovery Information Disclosure Vulnerability | [
"cpe:2.3:a:microsoft:azure_site_recovery:*:*:*:*:vmware_to_azure:*:*:*"
]
| null | 4.9 | null | null |
CVE-2024-4551 | Video Gallery – YouTube Playlist, Channel Gallery by YotuWP <= 1.3.13 - Authenticated (Contributor+) Arbitrary File Inclusion via Shortcode | The Video Gallery – YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the display function. This makes it possible for authenticated attackers, with contributor access and higher, to include and execute arbitrary php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | [
"cpe:2.3:a:yotuwp:video_gallery:*:*:*:*:*:wordpress:*:*"
]
| null | 6.4 | null | null |
CVE-2024-54105 | Read/Write vulnerability in the image decoding module
Impact: Successful exploitation of this vulnerability will affect availability. | [
"cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*"
]
| null | 5.1 | null | null |
|
GHSA-p569-737x-7h7p | An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file. | []
| null | null | 6.1 | null |
|
CVE-2022-2378 | Easy Student Results <= 2.2.8 - Reflected Cross-Site Scripting | The Easy Student Results WordPress plugin through 2.2.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting | [
"cpe:2.3:a:easy_student_results_project:easy_student_results:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | null |
CVE-2002-0407 | htcgibin.exe in Lotus Domino server 5.0.9a and earlier allows remote attackers to determine the physical pathname for the server via requests that contain certain MS-DOS device names such as com5, such as (1) a request with a .pl or .java extension, or (2) a request containing a large number of periods, which causes htcgibin.exe to leak the pathname in an error message. | [
"cpe:2.3:a:lotus:domino:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2015-8984 | The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.3 |
|
GHSA-h77j-6rq9-4jc3 | Heap-based buffer overflow in ImageIO in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image. | []
| null | null | null | null |
|
GHSA-4q76-q6w7-7fw8 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getAnnot method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6013. | []
| null | null | 8.8 | null |
|
CVE-2024-10291 | ZZCMS phome.php Ebak_DotranExecutSQL sql injection | A vulnerability has been found in ZZCMS 2023 and classified as critical. This vulnerability affects the function Ebak_DoExecSQL/Ebak_DotranExecutSQL of the file 3/Ebak5.1/upload/phome.php. The manipulation of the argument phome leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*"
]
| 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-4h58-f788-v8pw | There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond | []
| null | null | null | null |
|
GHSA-63rf-cwpf-vw2p | The dashboard report in Puppet Enterprise before 3.0.1 allows attackers to execute arbitrary YAML code via a crafted report-specific type. | []
| null | null | null | null |
|
GHSA-5cfp-mpf4-f8hr | VMware vRealize Operations contains a privilege escalation vulnerability. A malicious actor with administrative network access can escalate privileges to root. | []
| null | 7.2 | null | null |
|
GHSA-7hvj-fm99-26hr | Certain NETGEAR devices are affected by a a hardcoded password. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.30, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.24, JR6150 before 1.0.1.24, R6120 before 1.0.0.48, R6220 before 1.1.0.86, R6230 before 1.1.0.86, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, and WNR2020 before 1.1.0.62. | []
| null | null | null | null |
|
CVE-2018-20640 | PHP Scripts Mall Entrepreneur Job Portal Script 3.0.1 has stored Cross-Site Scripting (XSS) via the Full Name field. | [
"cpe:2.3:a:entrepreneur_job_portal_script_project:entrepreneur_job_portal_script:3.0.1:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
GHSA-9wqc-q367-q634 | An issue in Beijing Panabit Network Software Co., Ltd Panalog big data analysis platform v. 20240323 and before allows attackers to execute arbitrary code via the exportpdf.php component. | []
| null | 9.8 | null | null |
|
RHSA-2018:1130 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ kernel: Stack information leak in the EFS element | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
]
| null | null | 6.5 | null |
CVE-2023-49436 | Tenda AX9 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'list' parameter at /goform/SetNetControlList. | [
"cpe:2.3:o:tenda:ax9_firmware:22.03.01.46:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax9:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-g8p2-c9gc-6wh6 | sdbstarter in SAP MaxDB 7.6.0.37, and possibly other versions, allows local users to execute arbitrary commands by using unspecified environment variables to modify configuration settings. | []
| null | null | null | null |
|
GHSA-p2hf-v29f-72xj | SQL injection vulnerability in janobe Online Job Portal v.2020 allows a remote attacker to execute arbitrary code via the ForPass.php component. | []
| null | 9.8 | null | null |
|
CVE-2017-3893 | In BlackBerry QNX Software Development Platform (SDP) 6.6.0, the default configuration of the QNX SDP system did not in all circumstances prevent attackers from modifying the GOT or PLT tables with buffer overflow attacks. | [
"cpe:2.3:a:blackberry:qnx_software_development_platform:6.6.0:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 6.4 |
|
GHSA-pqvp-99qr-6m3h | wps_shop.cgi in WPS Web Portal System 0.7.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) art and (2) cat variables. | []
| null | null | null | null |
|
RHSA-2021:4373 | Red Hat Security Advisory: pcre security update | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 pcre: Integer overflow when parsing callout numeric arguments | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 5.3 | null | null |
CVE-2024-9504 | Booking calendar, Appointment Booking System <= 3.2.15 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload | The Booking calendar, Appointment Booking System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.2.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | [
"cpe:2.3:a:wpdevart:booking_calendar:*:*:*:*:*:wordpress:*:*"
]
| null | 7.2 | null | null |
GHSA-qj4x-mh6f-mw42 | A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges. | []
| 7.7 | 8.8 | null | null |
|
CVE-2012-5582 | opendnssec misuses libcurl API | [
"cpe:2.3:a:opendnssec:opendnssec:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-jvjq-8w6h-2qr7 | To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | []
| null | null | null | null |
|
CVE-2021-20135 | Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https://www.tenable.com/downloads/nessus). | [
"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*"
]
| null | 6.7 | null | 4.6 |
|
GHSA-qxh7-4xcw-xqvm | The PluginContext object of Opera 6.05 and 7.0 allows remote attackers to cause a denial of service (crash) via an HTTP request containing a long string that gets passed to the ShowDocument method. | []
| null | null | null | null |
|
CVE-2021-42195 | An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function handleEditText() located in swfdump.c. It allows an attacker to cause code Execution. | [
"cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
GHSA-r5pq-3cxr-5rmc | The WPQA Builder Plugin WordPress plugin before 5.2, used as a companion plugin for the Discy and Himer , does not validate that the message_id of the wpqa_message_view ajax action belongs to the requesting user, leading to any user being able to read messages for any other users via a Insecure Direct Object Reference (IDOR) vulnerability. | []
| null | 4.3 | null | null |
|
CVE-2017-15783 | XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at CADImage+0x0000000000285ce1." | [
"cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
GHSA-9jq6-f57r-6g4c | Cross-site scripting (XSS) vulnerability in Cybozu Office 9.0.0 through 10.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7795, CVE-2015-7796, CVE-2015-7797, CVE-2015-7798, and CVE-2016-1150. | []
| null | null | 6.1 | null |
|
CVE-2003-1121 | Services in ScriptLogic 4.01, and possibly other versions before 4.14, process client requests at raised privileges, which allows remote attackers to (1) modify arbitrary registry entries via the ScriptLogic RPC service (SLRPC) or (2) modify arbitrary configuration via the RunAdmin services (SLRAserver.exe and SLRAclient.exe). | [
"cpe:2.3:a:scriptlogic:scriptlogic:4.1:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2014-1842 | Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to list all usernames via a Go action with a .. (dot dot) in the search-bar value. | [
"cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:southrivertech:titan_ftp_server:10.0.1733:*:*:*:*:*:*:*",
"cpe:2.3:a:southrivertech:titan_ftp_server:10.01.1740:*:*:*:*:*:*:*",
"cpe:2.3:a:southrivertech:titan_ftp_server:10.30:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2025-2563 | User Registration & Membership < 4.1.2- Unauthenticated Privilege Escalation | The User Registration & Membership WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges | []
| null | 8.1 | null | null |
CVE-2023-6076 | PHPGurukul Restaurant Table Booking System Reservation Status booking-details.php information disclosure | A vulnerability classified as problematic was found in PHPGurukul Restaurant Table Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file booking-details.php of the component Reservation Status Handler. The manipulation of the argument bid leads to information disclosure. The attack can be launched remotely. The identifier VDB-244945 was assigned to this vulnerability. | [
"cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*"
]
| null | 5.3 | 5.3 | 5 |
CVE-2024-52891 | IBM Concert Software log manipulation | IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3
could allow an authenticated user to inject malicious information or obtain information from log files due to improper log neutralization. | [
"cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.3:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
CVE-2005-3091 | Cross-site scripting (XSS) vulnerability in Mantis before 1.0.0rc1 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, as identified by bug#0005751 "thraxisp". | [
"cpe:2.3:a:mantis:mantis:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0a3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0a4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-wggh-x2ch-8rhx | Authentication Bypass by Spoofing in org.onosproject.acl (access control) and org.onosproject.mobility (host mobility) in ONOS v2.0 and earlier allows attackers to bypass network access control via data plane packet injection. To exploit the vulnerability, an attacker sends a gratuitous ARP reply that causes the host mobility application to remove existing access control flow denial rules in the network. The access control application does not re-install flow deny rules, so the attacker can bypass the intended access control policy. | []
| null | null | null | null |
|
CVE-2020-9882 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2004-2402 | Cross-site scripting (XSS) vulnerability in YaBB.pl in YaBB 1 GOLD SP 1.3.2 allows remote attackers to inject arbitrary web script or HTML via a hex-encoded to parameter. NOTE: some sources say that the board parameter is affected, but this is incorrect. | [
"cpe:2.3:a:yabb:yabb:1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1_gold_-_sp_1:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:1_gold_release:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:2000-09-01:*:*:*:*:*:*:*",
"cpe:2.3:a:yabb:yabb:2000-09-11:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-j5rc-gv5c-g3gv | The Slope Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slope-reservations' shortcode in all versions up to, and including, 4.2.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
GHSA-64gc-rw82-mfm5 | Cross-site scripting (XSS) vulnerability in Adobe ColdFusion 8.0 through 9.0.1 allows remote attackers to inject arbitrary web script or HTML via the cfform tag. | []
| null | null | null | null |
|
GHSA-323q-9369-p5wm | PHP remote file inclusion vulnerability in genpage-cgi.php in Brian Fraval hitweb 4.2 and possibly earlier versions allows remote attackers to execute arbitrary PHP code via the REP_INC parameter. | []
| null | null | null | null |
|
CVE-2021-46459 | Victor CMS v1.0 was discovered to contain multiple SQL injection vulnerabilities in the component admin/users.php?source=add_user. These vulnerabilities can be exploited through a crafted POST request via the user_name, user_firstname,user_lastname, or user_email parameters. | [
"cpe:2.3:a:victor_cms_project:victor_cms:1.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-rq4h-wrjf-38w8 | Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution | []
| null | 8.4 | null | null |
|
GHSA-wgj9-rrf6-3qqq | A vulnerability was found in DedeCMS 5.7. It has been classified as problematic. Affected is an unknown function of the file /src/dede/member_rank.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258918 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | 4.3 | null | null |
|
CVE-2023-29203 | Unauthenticated user can have information about hidden users on subwikis through uorgsuggest.vm | XWiki Commons are technical libraries common to several other top level XWiki projects. It's possible to list some users who are normally not viewable from subwiki by requesting users on a subwiki which allows only global users with `uorgsuggest.vm`. This issue only concerns hidden users from main wiki. Note that the disclosed information are the username and the first and last name of users, no other information is leaked. The problem has been patched on XWiki 13.10.8, 14.4.3 and 14.7RC1.
| [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:13.9:rc1:*:*:*:*:*:*"
]
| null | 3.7 | null | null |
CVE-2010-1234 | Unspecified vulnerability in Google Chrome before 4.1.249.1036 allows remote attackers to truncate the URL shown in the HTTP Basic Authentication dialog via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.38.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.40.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.42.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.1.42.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.212.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.212.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.221.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.224.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.229.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.235.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.236.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.237.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.237.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.239.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.240.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.241.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.242.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.243.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.245.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.245.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.247.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.248.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.250.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.250.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.251.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.252.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.254.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.255.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.256.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.257.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.258.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.259.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.261.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.263.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.264.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.265.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.266.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.267.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.268.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.269.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.271.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.275.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-22052 | Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.19 and 21.3-21.10. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data. CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*"
]
| null | 3.1 | null | null |
|
GHSA-9g9h-7mhh-5mcr | Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'check_out_date' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response. | []
| null | 5.4 | null | null |
|
RHSA-2010:0380 | Red Hat Security Advisory: kernel security and bug fix update | kernel: mac80211: fix spurious delBA handling kernel: ext4: avoid divide by zero when trying to mount a corrupted file system kernel: bug in GFS/GFS2 locking code leads to dos kernel: ipv6: skb is unexpectedly freed | [
"cpe:/o:redhat:rhel_eus:5.4"
]
| null | null | null | null |
CVE-2005-0720 | PHP remote file inclusion vulnerability in admin/header.php in PHP mcNews 1.3 allows remote attackers to execute arbitrary PHP code by modifying the skinfile parameter to reference a URL on a remote web server that contains the code. | [
"cpe:2.3:a:mcnews:mcnews:1.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-q4jv-8wfr-4pf8 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates. | []
| null | 6.5 | null | null |
|
CVE-2023-29043 | Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known.
| [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6156:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6161:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6166:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6173:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6176:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6178:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6189:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6194:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6199:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6204:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6205:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6209:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6210:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6214:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6215:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6216:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6218:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6219:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6220:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6227:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6230:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6233:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6235:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6236:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6239:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6241:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-rc5q-3pm2-x989 | An issue was discovered in Joomla! 3.1.0 through 3.9.23. The lack of escaping of image-related parameters in multiple com_tags views cause lead to XSS attack vectors. | []
| null | null | null | null |
|
GHSA-gxpp-9rc5-5w9w | In app/Model/MispObject.php in MISP 2.4.141, an incorrect sharing group association could lead to information disclosure on an event edit. When an object has a sharing group associated with an event edit, the sharing group object is ignored and instead the passed local ID is reused. | []
| null | null | null | null |
|
GHSA-3xf5-6j2f-h2hr | Sophos Disk Encryption (SDE) 5.x in Sophos Enterprise Console (SEC) 5.x before 5.2.2 does not enforce intended authentication requirements for a resume action from sleep mode, which allows physically proximate attackers to obtain desktop access by leveraging the absence of a login screen. | []
| null | 6.8 | null | null |
|
GHSA-c5jp-vv5q-7wc3 | Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.This issue affects Atahualpa: from n/a through 3.7.24. | []
| null | 5.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.