id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-52827
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2025-49460
|
Zoom Workplace Clients - Argument Injection
|
Uncontrolled resource consumption in certain Zoom Workplace Clients may allow an unauthenticated user to conduct a denial of service via network access.
|
[] | null | 4.3 | null | null | null |
CVE-1999-0314
|
ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.
|
[
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2012-5623
|
Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.
|
[
"cpe:2.3:a:squirrelmail:change_passwd:4.0:*:*:*:*:squirrelmail:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2007-4141
|
OpenRat CMS 0.8-beta1 and earlier allows remote attackers to obtain sensitive information via a request containing an XSS sequence in the action parameter to index.php, which reveals the path in an error message.
|
[
"cpe:2.3:a:openrat:openrat_cms:0.8_beta1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-5whq-j5qg-wjvp
|
Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke
|
Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function.
|
[] | null | 6.1 | null | null | null |
GHSA-m65j-rhw9-8g9v
|
Description:VMware AVI Load Balancer contains an authenticated blind SQL Injection vulnerability. VMware has evaluated the severity of the issue to be in the Moderate severity range https://www.broadcom.com/support/vmware-services/security-response with a maximum CVSSv3 base score of 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N .Known Attack Vectors:An authenticated malicious user with network access may be able to use specially crafted SQL queries to gain database access.Resolution:To remediate CVE-2025-41233 apply the patches to the Avi Controller listed in the 'Fixed Version' column of the 'Response Matrix' found below.Workarounds:None.Additional Documentation:None.Acknowledgements:VMware would like to thank Alexandru Copaceanu https://www.linkedin.com/in/alexandru-copaceanu-b39aaa1a8/ for reporting this issue to us.Notes:None.Response Matrix:ProductVersionRunning OnCVECVSSv4SeverityFixed VersionWorkaroundsAdditional DocumentsVMware Avi Load Balancer30.1.1AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.1.2-2p3 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-1/vmware-avi-load-balancer-release-notes/release-notes-30-1-2.html NoneNoneVMware Avi Load Balancer30.1.2AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.1.2-2p3 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-1/vmware-avi-load-balancer-release-notes/release-notes-30-1-2.html NoneNoneVMware Avi Load Balancer30.2.1AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.2.1-2p6 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-2/vmware-avi-load-balancer-release-notes/release-notes-for-avi-load-balancer-version-30-2-1.html NoneNoneVMware Avi Load Balancer30.2.2AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 30.2.2-2p5 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-2/vmware-avi-load-balancer-release-notes/release-notes-for-avi-load-balancer-version-30-2-2.html NoneNoneVMware Avi Load Balancer30.2.3AnyCVE-2025-41233N/AN/AUnaffectedNoneNoneVMware Avi Load Balancer31.1.1AnyCVE-2025-41233 6.8 https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N Moderate 31.1.1-2p2 https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/31-1/vmware-avi-load-balancer-release-notes/Release-Note-Section-20627.html NoneNoneCWE-89 in the Avi Load Balancer component of VMware allows an authenticated attacker to execute blind SQL injections in versions 30.1.1, 30.1.2, 30.2.1, and 30.2.2 due to improper input validation, enabling unauthorized database access.
|
[] | null | 6.8 | null | null | null |
|
CVE-2011-3404
|
Microsoft Internet Explorer 6 through 9 does not properly use the Content-Disposition HTTP header to control rendering of the HTTP response body, which allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Content-Disposition Information Disclosure Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-p5gp-pfc7-q5g2
|
Untrusted search path in Intel Graphics Driver 15.40.x.x, 15.45.x.x, and 21.20.x.x allows unprivileged user to elevate privileges via local access.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-36198
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2017-14122
|
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.
|
[
"cpe:2.3:a:rarlab:unrar:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
GHSA-q6vm-3q95-jvvp
|
An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly handling malicious requests to the PyPi API endpoint allowing the attacker to cause uncontrolled resource consumption.
|
[] | null | 5.3 | null | null | null |
|
CVE-2015-1835
|
Apache Cordova Android before 3.7.2 and 4.x before 4.0.2, when an application does not set explicit values in config.xml, allows remote attackers to modify undefined secondary configuration variables (preferences) via a crafted intent: URL.
|
[
"cpe:2.3:a:apache:cordova:*:*:*:*:*:android:*:*",
"cpe:2.3:a:apache:cordova:4.0.0:*:*:*:*:android:*:*",
"cpe:2.3:a:apache:cordova:4.0.1:*:*:*:*:android:*:*"
] | null | null | 5.3 | 2.6 | null |
|
GHSA-fm3r-6fgh-c3xh
|
Multiple directory traversal vulnerabilities in PHP Content Architect (aka NoAh) 0.9 pre 1.2 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the filepath parameter to (1) css_file.php, (2) js_file.php, or (3) xml_file.php in noah/modules/nosystem/templates/.
|
[] | null | null | null | null | null |
|
CVE-2021-39527
|
An issue was discovered in libredwg through v0.10.1.3751. appinfo_private() in decode.c has a heap-based buffer overflow.
|
[
"cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2021-38870
|
IBM Aspera Cloud is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208343.
|
[
"cpe:2.3:a:ibm:aspera_on_cloud:-:*:*:*:*:*:*:*"
] | null | null | 6.4 | null | null |
|
CVE-2020-13525
|
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:a:processmaker:processmaker:3.4.11:*:*:*:*:*:*:*"
] | null | null | 6.4 | null | null |
|
CVE-2006-5985
|
Multiple cross-site scripting (XSS) vulnerabilities in admin/options.php in Extreme CMS 0.9, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) bg1, (2) bg2, (3) text, or (4) size parameters. NOTE: the provenance of this information is unknown; details are obtained from third party sources.
|
[
"cpe:2.3:a:extreme_cms:extreme_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-63c3-hhxg-g55x
|
CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2011:1532
|
Red Hat Security Advisory: kexec-tools security, bug fix, and enhancement update
|
kexec-tools: Multiple security flaws by management of kdump core files and ramdisk images kexec-tools: Multiple security flaws by management of kdump core files and ramdisk images kexec-tools: Multiple security flaws by management of kdump core files and ramdisk images
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-fpvx-gw57-2p3v
|
A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2015:2516
|
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 commons-collections security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null | null |
CVE-2009-2959
|
Cross-site scripting (XSS) vulnerability in the waterfall web status view (status/web/waterfall.py) in Buildbot 0.7.6 through 0.7.11p1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:buildbot:buildbot:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:buildbot:buildbot:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:buildbot:buildbot:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:buildbot:buildbot:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:buildbot:buildbot:0.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:buildbot:buildbot:0.7.10p1:*:*:*:*:*:*:*",
"cpe:2.3:a:buildbot:buildbot:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:buildbot:buildbot:0.7.11p1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
ICSA-23-173-03
|
SpiderControl SCADAWebServer
|
SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition.
|
[] | null | null | 4.9 | null | null |
CVE-2023-40293
|
Harman Infotainment 20190525031613 and later allows command injection via unauthenticated RPC with a D-Bus connection object.
|
[
"cpe:2.3:a:samsung:harman_infotainment:20190525031613:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
CVE-2019-4117
|
IBM Cloud Private 3.1.1 and 3.1.2 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 158116.
|
[
"cpe:2.3:a:ibm:cloud_private:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_private:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_private:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_private:3.1.2:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
|
GHSA-g53m-685r-w68h
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager allows Stored XSS.This issue affects Advanced Access Manager: from n/a through 6.9.20.
|
[] | null | 5.9 | null | null | null |
|
CVE-2021-3821
|
A potential security vulnerability has been identified for certain HP multifunction printers (MFPs). The vulnerability may lead to Denial of Service when running HP Workpath solutions on potentially affected products.
|
[
"cpe:2.3:o:hp:futuresmart_5:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2010-0998
|
Multiple stack-based buffer overflows in Free Download Manager (FDM) before 3.0.852 allow remote attackers to execute arbitrary code via vectors involving (1) the folders feature in Site Explorer, (2) the websites feature in Site Explorer, (3) an FTP URI, or (4) a redirect.
|
[
"cpe:2.3:a:freedownloadmanager:free_download_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:2:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:2.5.700:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:2.5.704:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:2.5.724:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:3.0.843:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:3.0.848:*:*:*:*:*:*:*",
"cpe:2.3:a:freedownloadmanager:free_download_manager:3.0.850:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-w5pm-jf53-p26g
|
This issue was addressed with improved entitlements. This issue affected versions prior to iOS 12.1.1.
|
[] | null | null | 3.3 | null | null |
|
CVE-2012-3353
|
The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling JCR content loader module makes it possible to import arbitrary files in the content repository, including local files, causing potential information leaks. Users should upgrade to version 2.1.6 of the JCR ContentLoader
|
[
"cpe:2.3:a:apache:sling_jcr_contentloader:2.1.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2014-4488
|
IOHIDFamily in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not properly validate resource-queue metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted app.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-mhc8-f455-fqc9
|
Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
CVE-2021-24439
|
Browser Screenshots < 1.7.6 - Contributor+ Stored XSS
|
The Browser Screenshots WordPress plugin before 1.7.6 allowed authenticated users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks as the image_class parameter of the browser-shot shortcode was not escaped.
|
[
"cpe:2.3:a:prothemedesign:browser_screenshots:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null |
GHSA-x76c-7p22-r2w3
|
Missing Authorization vulnerability in FocuxTheme WPKit For Elementor allows Privilege Escalation. This issue affects WPKit For Elementor: from n/a through 1.1.0.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-16544
|
Jenkins QMetry for JIRA - Test Management Plugin 1.12 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
|
[
"cpe:2.3:a:qmetry:jenkins_qmetry_for_jira:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 4 | null |
|
GHSA-78x3-gqhv-hvhp
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 410/12, SD 615/16/SD 415, and SD 810, while processing QSEE Syscall 'qsee_macc_gen_ecc_privkey', untrusted pointer dereference occurs, which could result in arbitrary write.
|
[] | null | null | 7.5 | null | null |
|
CVE-2024-56602
|
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
|
In the Linux kernel, the following vulnerability has been resolved:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
sock_init_data() attaches the allocated sk object to the provided sock
object. If ieee802154_create() fails later, the allocated sk object is
freed, but the dangling pointer remains in the provided sock object, which
may allow use-after-free.
Clear the sk pointer in the sock object on error.
|
[] | null | 7.8 | null | null | null |
CVE-2024-34757
|
WordPress Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin <= 1.5.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Visualmodo Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg allows Stored XSS.This issue affects Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg: from n/a through 1.5.3.
|
[
"cpe:2.3:a:visualmodo:borderless:-:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
CVE-2023-25136
|
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
|
[
"cpe:2.3:a:openbsd:openssh:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-4c27-wwv3-v6h2
|
A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2015:0707
|
Red Hat Security Advisory: qpid security and bug fix update
|
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)
|
[
"cpe:/a:redhat:enterprise_mrg:3:server:el6"
] | null | null | null | null | null |
CVE-2024-45455
|
WordPress WP Meta SEO plugin <= 4.5.13 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JoomUnited WP Meta SEO allows Stored XSS.This issue affects WP Meta SEO: from n/a through 4.5.13.
|
[
"cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-m2hr-w7qh-g6f3
|
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Cross-Site Scripting in Badge Registration V-2023-005.
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-30486
|
WordPress Media Library Folders plugin <= 8.1.7 - Auth. SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Max Foundry Media Library Folders.This issue affects Media Library Folders: from n/a through 8.1.7.
|
[] | null | 8.5 | null | null | null |
CVE-2012-2331
|
Cross-site scripting (XSS) vulnerability in serendipity/serendipity_admin_image_selector.php in Serendipity before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via the serendipity[textarea] parameter. NOTE: this issue might be resultant from cross-site request forgery (CSRF).
|
[
"cpe:2.3:a:s9y:serendipity:*:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.6.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-39356
|
NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[] | 7.1 | 7.4 | null | null | null |
|
GHSA-cg87-wmx4-v546
|
KaTeX \htmlData does not validate attribute names
|
ImpactKaTeX users who render untrusted mathematical expressions with `renderToString` could encounter malicious input using `\htmlData` that runs arbitrary JavaScript, or generate invalid HTML.PatchesUpgrade to KaTeX v0.16.21 to remove this vulnerability.WorkaroundsAvoid use of or turn off the `trust` option, or set it to forbid `\htmlData` commands.Forbid inputs containing the substring `"\\htmlData"`.Sanitize HTML output from KaTeX.Details`\htmlData` did not validate its attribute name argument, allowing it to generate invalid or malicious HTML that runs scripts.For more informationIf you have any questions or comments about this advisory:Open an issue or security advisory in the [KaTeX repository](https://github.com/KaTeX/KaTeX/)Email us at [katex-security@mit.edu](mailto:katex-security@mit.edu)
|
[] | null | 6.3 | null | null | null |
GHSA-25vq-w6f5-5w2h
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | null | null | null | null |
|
CVE-2018-6547
|
plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user.
|
[
"cpe:2.3:a:plays.tv:plays.tv:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | 9.4 | null |
|
GHSA-cr45-v5gw-mw3r
|
Open redirect vulnerability in goto.php in phpwind 8.7 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.
|
[] | null | null | null | null | null |
|
CVE-2019-1185
|
Windows Subsystem for Linux Elevation of Privilege Vulnerability
|
An elevation of privilege vulnerability exists due to a stack corruption in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
|
[
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"
] | null | 7.3 | 7.8 | 4.6 | null |
GHSA-q7vf-vqj4-fh23
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd plugin <= 2.16.0 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-836h-9m9x-w2qm
|
A CSRF vulnerability was found in flatCore before 1.5, leading to the upload of arbitrary .php files via acp/core/files.upload-script.php.
|
[] | null | null | 8.8 | null | null |
|
CVE-2013-1246
|
Cisco TelePresence System Software does not properly handle inactive t-shell sessions, which allows remote authenticated users to cause a denial of service (memory consumption and service outage) by establishing multiple SSH connections, aka Bug ID CSCug77610.
|
[
"cpe:2.3:a:cisco:telepresence_system_software:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-9mvw-cqg2-v8j4
|
Directory traversal vulnerability in the Speed Root Explorer application before 3.2 for Android and the Speed Explorer application before 2.2 for Android allows remote attackers to write to arbitrary files via a crafted filename.
|
[] | null | null | null | null | null |
|
GHSA-w8qh-prf7-9pcv
|
Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2003:197
|
Red Hat Security Advisory: xpdf security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
cisco-sa-cucm-arb-write-74QzruUU
|
Cisco Unified Communications Products Arbitrary File Write Vulnerability
|
A vulnerability in the software upgrade process of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to write arbitrary files on the affected system.
This vulnerability is due to improper restrictions applied to a system script. An attacker could exploit this vulnerability by using crafted variables during the execution of a system upgrade. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 4.9 | null | null | null |
GHSA-r4x3-g983-9g48
|
Moderate severity vulnerability that affects sprockets
|
Withdrawn, accidental duplicate publish.Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
|
[] | null | null | null | null | null |
CVE-2021-38417
|
VISAM VBASE Editor Improper Access Control
|
VISAM VBASE version 11.6.0.6 is vulnerable to improper access control via the web-remote endpoint, which may allow an unauthenticated user viewing access to folders and files in the directory listing.
|
[
"cpe:2.3:a:visam:vbase_web-remote:11.6.0.6:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
CVE-2019-2935
|
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: EAI). Supported versions that are affected are 19.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-vgjh-q88x-j2v7
|
Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG painting.
|
[] | null | null | null | null | null |
|
GHSA-8cvq-3jjp-ph9p
|
Apache Linkis Metadata Query Service JDBC: JDBC Datasource Module with Mysql has file read vulnerability
|
Affected versions:Apache Linkis Metadata Query Service JDBC 1.5.0 before 1.7.0Description:In Apache Linkis <1.7.0, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will allow the attacker to read arbitrary files from the Linkis server. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis < 1.6.0 will be affected.We recommend users upgrade the version of Linkis to version 1.7.0.
|
[] | null | 5.9 | null | null | null |
GHSA-h785-wmf4-9p56
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
CVE-2007-6291
|
SQL injection vulnerability in abm.aspx in Xigla Absolute Banner Manager .NET 4.0 allows remote attackers to execute arbitrary SQL commands via the z parameter.
|
[
"cpe:2.3:a:xigla:absolute_banner_manager.net:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-5vxc-2qqr-5x28
|
The Fonto – Custom Web Fonts Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] | null | 6.4 | null | null | null |
|
CVE-2018-17616
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of onBlur events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6334.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-pxfv-7rr3-2qjg
|
copyparty vulnerable to path traversal attack
|
SummaryAll versions before 1.8.2 have a path traversal vulnerability, allowing an attacker to download unintended files from the server.DetailsUnauthenticated users were able to retrieve any files which are accessible (according to OS-level permissions) from the copyparty process. Usually, this is all files that are readable by the OS account which is used to run copyparty.The vulnerability did not make it possible to list the contents of folders, so an attacker needs to know the full absolute path to the file, or the relative path from where copyparty is installed.Some methods of running copyparty ([prisonparty](https://github.com/9001/copyparty/tree/hovudstraum/bin#prisonpartysh), the [nix package](https://github.com/9001/copyparty#nix-package), and [docker](https://github.com/9001/copyparty/tree/hovudstraum/scripts/docker)) had a mitigating effect, mostly reducing the attack scope to files inside copyparty volumes, and possibly the copyparty config file.Checking for attacksPlease keep in mind that, if an attacker were to find a way to overwrite the logs, for example by discovering the password to another service with sufficient privileges, then the following approaches cannot be trusted.if copyparty was only accessible through a reverse proxy, then all attacks would be visible in the webserver access-log as URLs which contain both `.cpr/` and `%2F`nginx:However, if copyparty was directly accessible from the internet, then any successful attacks (file retrievals) would unfortunately leave no trace. That said, it is very probable that an attacker would make at least one invalid attempt, which would become apparent in the copyparty server log, detectable with `grep -aE '(Errno|Permission).*\.cpr/'` revealing the following:python2 example: `[IOError] [Errno 13] Permission denied: '/etc/shadow', .cpr//etc/shadow`python3 example: `[PermissionError] [Errno 13] Permission denied: b'/etc/shadow', .cpr//etc/shadow`Providing an exact command for this approach is difficult, as it depends on how copyparty is deployed;if copyparty was running as a systemd service: `journalctl -am | grep -aE '(Errno|Permission).*\.cpr/'`if copyparty was logging to a compressed file: `xz -kdc thefilename.xz | grep -aE '(Errno|Permission).*\.cpr/'`if the copyparty log is available in a plaintext file: `grep -aE '(Errno|Permission).*\.cpr/' thefilename.txt`PoC / attack example
|
[] | 8.7 | null | 7.5 | null | null |
CVE-2013-0181
|
Cross-site scripting (XSS) vulnerability in Views in the Search API (search_api) module 7.x-1.x before 7.x-1.4 for Drupal, when using certain backends and facets, allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message.
|
[
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
CVE-2025-27150
|
Tuleap dumps the Redis password into the generated troubleshooting archives
|
Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
|
[] | null | 5.3 | null | null | null |
RHSA-2017:2708
|
Red Hat Security Advisory: Red Hat JBoss Core Services security update
|
httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) httpd: Uninitialized memory reflection in mod_auth_digest
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 4.8 | null | null |
CVE-2017-15221
|
ASX to MP3 converter 3.1.3.7.2010.11.05 has a buffer overflow via a crafted M3U file, a related issue to CVE-2009-1324.
|
[
"cpe:2.3:a:asx_to_mp3_converter_project:asx_to_mp3_converter:3.1.3.7:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-qv47-9766-h942
|
A path handling issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. A local attacker may be able to elevate their privileges.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2011:1437
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46) Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) Mozilla: crash while profiling page with many functions (MFSA 2011-49)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null | null |
CVE-2023-48398
|
In ProtocolNetAcBarringInfo::ProtocolNetAcBarringInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2002-1938
|
Virgil CGI Scanner 0.9 allows remote attackers to execute arbitrary commands via the (1) tar (TARGET) or (2) zielport (ZIELPORT) parameters.
|
[
"cpe:2.3:a:virgil:cgi_scanner:0.9:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-xf6w-j33h-544m
|
The Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allows remote attackers on an intranet to bypass authentication and gain administrative access via vectors including a '/' (slash) character at the end of the PATH_INFO to cgi/b, aka "double-slash auth bypass." NOTE: remote attackers outside the intranet can exploit this by leveraging a separate CSRF vulnerability. NOTE: SpeedTouch 780 might also be affected by some of these issues.
|
[] | null | null | null | null | null |
|
CVE-2007-5532
|
Unspecified vulnerability in the People Tools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.22.17, 8.47.14, 8.48.13, 8.49.05 has unknown impact and remote attack vectors, aka PSE01.
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-jvq3-qvh3-fg4x
|
Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[] | null | null | null | null | null |
|
CVE-2013-1521
|
Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-ggcq-5v24-32h6
|
In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2024:6844
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 4.4 | null | null | null |
GHSA-rqw3-7f5v-7r6j
|
Insufficient data validation in CORS in Google Chrome prior to 76.0.3809.87 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.
|
[] | null | null | null | null | null |
|
RHSA-2010:0500
|
Red Hat Security Advisory: firefox security, bug fix, and enhancement update
|
mozilla: in-session phishing attack Firefox: overlong UTF-8 seqence detection problem mozilla: XMLDocument:: load() doesn't check nsIContentPolicy (MFSA 2010-24) firefox: arbitrary code execution via memory corruption firefox: keystrokes sent to hidden frame rather than visible frame due to javascript flaw nsGenericDOMDataNode:: SetTextInternal Content-Disposition: attachment ignored if Content-Type: multipart also present Mozilla Freed object reuse across plugin instances Mozilla Integer Overflow in XSLT Node Sorting Mozilla Crashes with evidence of memory corruption Mozilla Crashes with evidence of memory corruption Mozilla Crashes with evidence of memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2012-2020
|
Unspecified vulnerability in HP Operations Agent before 11.03.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1326.
|
[
"cpe:2.3:a:hp:operations_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:7.36:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.51.102:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.60.005:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.60.006:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.60.007:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.60.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.60.008:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_agent:8.60.501:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-5v3c-45g9-44rq
|
Absolute path traversal vulnerability in a certain ActiveX control in the CYFT object in ft60.dll in Yahoo! Messenger 8.1.0.421 allows remote attackers to force a download, and create or overwrite arbitrary files via a full pathname in the second argument to the GetFile method.
|
[] | null | null | null | null | null |
|
CVE-2018-13574
|
The mintToken function of a smart contract implementation for DataShieldCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:datashieldcoin_project:datashieldcoin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2006-6928
|
Multiple cross-site scripting (XSS) vulnerabilities in Rialto 1.6 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to (a) listmain.asp or (b) searchmain.asp, the (2) the Keyword parameter to (c) searchkey.asp, or the (3) refno parameter to (d) forminfo.asp.
|
[
"cpe:2.3:a:grandora:rialto:1.6:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-cv3h-4jh6-rh6p
|
A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page.Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.
|
[] | null | 4.7 | null | null | null |
|
CVE-2023-35061
|
Improper initialization for the Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
|
[] | 2.3 | 4.3 | null | null | null |
|
GHSA-hhx7-wfpj-c7rr
|
The TFTP firmware update mechanism on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices does not properly implement firmware validations, allowing remote attackers to write arbitrary data to internal memory.
|
[] | null | null | null | null | null |
|
GHSA-5c47-vqvw-7jp7
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
|
[] | null | null | null | null | null |
|
GHSA-rc57-9r3x-98cq
|
XML External Entity Reference in drools
|
drools <=7.59.x is affected by an XML External Entity (XXE) vulnerability in KieModuleMarshaller.java. The Validator class is not used correctly, resulting in the XXE injection vulnerability.
|
[] | null | 9.8 | null | null | null |
GHSA-4297-vxj6-vc69
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22275.
|
[] | null | null | 3.3 | null | null |
|
GHSA-8m3j-w2qr-v6w7
|
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formGetIptv.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-6635
|
WooCommerce - Social Login <= 2.7.3 - Unauthenticated Authentication Bypass
|
The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.3. This is due to insufficient controls in the 'woo_slg_login_email' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, excluding an administrator, if they know the email of user.
|
[
"cpe:2.3:a:wpweb:woocommerce_social_login:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
CVE-2022-27777
|
A XSS Vulnerability in Action View tag helpers >= 5.2.0 and < 5.2.0 which would allow an attacker to inject content if able to control input into specific attributes.
|
[
"cpe:2.3:a:rubyonrails:actionpack:*:*:*:*:*:ruby:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-55c5-qvfc-69mh
|
A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application.
|
[] | null | null | 7.5 | null | null |
|
GHSA-3rv9-f576-m286
|
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Virames Vira-Investing allows Account Footprinting.This issue affects Vira-Investing: before 1.0.84.86.
|
[] | null | 5.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.