id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
cisco-sa-cisco-sb-rv-overflow-htpymMB5
|
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability
|
A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 9.8 | null | null | null |
CVE-2024-20755
|
Adobe Bridge PDF Parsing Heap Memory Corruption Remote Code Execution Vulnerability
|
Bridge versions 13.0.5, 14.0.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:bridge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-wm2h-jpqw-93h6
|
ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain authentication data by making direct HTTP requests and then reading the HTML source, as demonstrated by a request for (1) RemMagSNMP.html, which discloses SNMP communities; or (2) WLAN.html, which discloses WEP keys.
|
[] | null | null | null | null | null |
|
GHSA-xj6r-wv4q-mrm6
|
In JetBrains TeamCity before 2021.2, a logout action didn't remove a Remember Me cookie.
|
[] | null | null | null | null | null |
|
CVE-2025-5698
|
Brilliance Golden Link Secondary System logSelect.htm sql injection
|
A vulnerability, which was classified as critical, was found in Brilliance Golden Link Secondary System up to 20250424. Affected is an unknown function of the file /sysframework/logSelect.htm. The manipulation of the argument nodename leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2024-52788
|
Tenda W9 v1.0.0.7(4456) was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root.
|
[
"cpe:2.3:o:tenda:w9_firmware:1.0.0.7\\(4456\\):*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
CVE-2023-4995
|
The Embed Calendly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'calendly' shortcode in versions up to, and including, 3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:embedcalendly:embed_calendly:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null | null |
|
CVE-2005-2064
|
Multiple cross-site scripting vulnerabilities in ASP Nuke 0.80 allow remote attackers to inject arbitrary web script or HTML via the (1) email parameter to forgot_password.asp, or the (2) FirstName, (3) LastName, (4) Username, (5) Password, (6) Address1, (7) Address2, (8) City, (9) ZipCode, (10) Email parameter to register.asp.
|
[
"cpe:2.3:a:asp-nuke:asp-nuke:0.80:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-mfh5-4mhh-m8jh
|
Foris before 101.1.1, as used in Turris OS, lacks certain HTML escaping in the login template.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-47526
|
WordPress Chartify Plugin <= 2.0.6 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chart Builder Team Chartify – WordPress Chart Plugin allows Stored XSS.This issue affects Chartify – WordPress Chart Plugin: from n/a through 2.0.6.
|
[
"cpe:2.3:a:ays-pro:chartify:2.0.6:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2025-21972
|
net: mctp: unshare packets when reassembling
|
In the Linux kernel, the following vulnerability has been resolved:
net: mctp: unshare packets when reassembling
Ensure that the frag_list used for reassembly isn't shared with other
packets. This avoids incorrect reassembly when packets are cloned, and
prevents a memory leak due to circular references between fragments and
their skb_shared_info.
The upcoming MCTP-over-USB driver uses skb_clone which can trigger the
problem - other MCTP drivers don't share SKBs.
A kunit test is added to reproduce the issue.
|
[] | null | null | null | null | null |
RHSA-2009:1572
|
Red Hat Security Advisory: 4Suite security update
|
expat: buffer over-read and crash on XML with malformed UTF-8 sequences
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-m42f-g5c9-vqgx
|
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | null | null | null | null |
|
CVE-2022-42771
|
In wlan driver, there is a race condition, This could lead to local denial of service in wlan services.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
|
GHSA-gj98-hgg3-qjh7
|
eXtremail 2.1.1 and earlier does not verify the ID field (aka transaction id) in DNS responses, which makes it easier for remote attackers to conduct DNS spoofing.
|
[] | null | null | null | null | null |
|
RHSA-2021:5108
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.z security update
|
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.1 | null | null | null |
RHSA-2023:7668
|
Red Hat Security Advisory: squid:4 security update
|
squid: DoS against HTTP and HTTPS squid: Use-After-Free in the HTTP Collapsed Forwarding Feature squid-cache: Squid Buffer Overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.9 | null | null | null |
CVE-2010-4337
|
The configure script in gnash 0.8.8 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/gnash-configure-errors.$$, (2) /tmp/gnash-configure-warnings.$$, or (3) /tmp/gnash-configure-recommended.$$ files.
|
[
"cpe:2.3:a:gnu:gnash:0.8.8:*:*:*:*:*:*:*"
] | null | null | null | 3.3 | null |
|
GHSA-fjf9-x8mw-r853
|
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug."
|
[] | null | null | null | null | null |
|
CVE-2022-25355
|
EC-CUBE 3.0.0 to 3.0.18-p3 and EC-CUBE 4.0.0 to 4.1.1 improperly handle HTTP Host header values, which may lead a remote unauthenticated attacker to direct the vulnerable version of EC-CUBE to send an Email with some forged reissue-password URL to EC-CUBE users.
|
[
"cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:3.0.18:-:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:3.0.18:p1:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:3.0.18:p2:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:3.0.18:p3:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2025-38599
|
wifi: mt76: mt7996: Fix possible OOB access in mt7996_tx()
|
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: Fix possible OOB access in mt7996_tx()
Fis possible Out-Of-Boundary access in mt7996_tx routine if link_id is
set to IEEE80211_LINK_UNSPECIFIED
|
[] | null | null | null | null | null |
GHSA-m4wp-4mv2-6p86
|
SeaCMS 7.2 mishandles member.php?mod=repsw4 requests.
|
[] | null | null | 8.8 | null | null |
|
CVE-2021-41159
|
Improper client input validation for FreeRDP gateway connections allows to overwrite memory
|
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.
|
[
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 5.8 | null | null | null |
RHSA-2014:0860
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: security protection bypass (APSB14-17) flash-plugin: security protection bypass (APSB14-17) flash-plugin: vulnerable JSONP callback APIs issue (APSB14-17)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
GHSA-jxxf-6872-8935
|
A vulnerability has been identified in SAP SuccessFactors Mobile Application for Android - versions older than 2108, which allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, which can lead to denial of service. The vulnerability is related to Android implementation methods that are widely used across Android mobile applications, and such methods are embedded into the SAP SuccessFactors mobile application. These Android methods begin executing once the user accesses their profile on the mobile application. While executing, it can also pick up the activities from other Android applications that are running in the background of the users device and are using the same types of methods in the application. Such vulnerability can also lead to phishing attacks that can be used for staging other types of attacks.
|
[] | null | null | null | null | null |
|
CVE-2024-2784
|
The Plus Addons for Elementor <= 5.5.4 - Authenticated (Contibutor+) Stored Cross-Site Scripting via Hover Card
|
The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Hover Card widget in all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2023-45063
|
WordPress AI Content Writing Assistant (Content Writer, ChatGPT, Image Generator) All in One Plugin <= 1.1.5 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <= 1.1.5 versions.
|
[
"cpe:2.3:a:rayhan1:ai_content_writing_assistant:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2007-0134
|
Multiple eval injection vulnerabilities in iGeneric iG Shop 1.0 allow remote attackers to execute arbitrary code via the action parameter, which is supplied to an eval function call in (1) cart.php and (2) page.php. NOTE: a later report and CVE analysis indicate that the vulnerability is present in 1.4.
|
[
"cpe:2.3:a:igeneric:ig_shop:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igeneric:ig_shop:1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-7vpp-xw9m-f3gh
|
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
|
[] | null | 6.5 | null | null | null |
|
GHSA-2f36-cx3x-62vx
|
In assertPackageWithSharedUserIdIsPrivileged of InstallPackageHelper.java, there is a possible execution of arbitrary app code as a privileged app due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 8.4 | null | null | null |
|
CVE-2022-41419
|
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_Processor::Process function in the mp4encrypt binary.
|
[
"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-pr45-cg4x-ff4m
|
ggit is vulnerable to Arbitrary Argument Injection via the clone() API
|
All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options.
|
[] | 6.9 | 6.5 | null | null | null |
GHSA-mq7j-4cj9-75x8
|
IBM Robotic Process Automation 21.0.1 through 21.0.7 and 23.0.0 through 23.0.1 could allow a user with physical access to the system due to session tokens for not being invalidated after a password reset. IBM X-Force ID: 243710.
|
[] | null | 3.2 | null | null | null |
|
GHSA-29cr-f47w-93jr
|
Heap-based buffer over-read in function png_convert_4 in file pngex.cc in AdvanceMAME through 2.1.
|
[] | null | 7.1 | null | null | null |
|
GHSA-f5hx-2mw6-fpj8
|
The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers.
|
[] | null | null | null | null | null |
|
GHSA-4gx9-fv89-q93q
|
The login function of Oracle WebCenter Interaction Portal 10.3.3 is vulnerable to reflected cross-site scripting (XSS). The content of the in_hi_redirect parameter, when prefixed with the https:// scheme, is unsafely reflected in a HTML META tag in the HTTP response. NOTE: this CVE is assigned by MITRE and isn't validated by Oracle because Oracle WebCenter Interaction Portal is out of support.
|
[] | null | null | 6.1 | null | null |
|
GHSA-p462-j56f-pv42
|
A remote authenticated information disclosure vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.
|
[] | null | 6.5 | null | null | null |
|
CVE-2013-3830
|
Unspecified vulnerability in the Hyperion Strategic Finance component in Oracle Hyperion 11.1.2.1 and 11.1.2.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server.
|
[
"cpe:2.3:a:oracle:hyperion_interactive_reporting:11.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hyperion_interactive_reporting:11.1.2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
ICSA-19-339-02
|
Weidmueller Industrial Ethernet Switches
|
The authentication mechanism has no brute-force prevention.CVE-2019-16670 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Remote authenticated users can crash a device by using a special packet.CVE-2019-16671 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). Sensitive credentials data is transmitted in cleartext.CVE-2019-16672 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Passwords are stored in cleartext and can be read by anyone with access to the device.CVE-2019-16673 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Authentication information used in a cookie is predictable and can lead to admin password compromise when captured on the network.CVE-2019-16674 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
GHSA-mw78-v8j9-2m24
|
Cross-site scripting (XSS) vulnerability in Views in the Ubercart module 7.x-3.x before 7.x-3.4 for Drupal allows remote attackers to inject arbitrary web script or HTML via the full name field.
|
[] | null | null | null | null | null |
|
CVE-2023-25519
|
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.
|
[
"cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2014-9526
|
Multiple cross-site scripting (XSS) vulnerabilities in concrete5 5.7.2.1, 5.7.2, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) gName parameter in single_pages/dashboard/users/groups/bulkupdate.php or (2) instance_id parameter in tools/dashboard/sitemap_drag_request.php.
|
[
"cpe:2.3:a:concrete5:concrete5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:concretecms:concrete_cms:5.7.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2012-3448
|
Unspecified vulnerability in Ganglia Web before 3.5.1 allows remote attackers to execute arbitrary PHP code via unknown attack vectors.
|
[
"cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-jp9m-h4rc-45p2
|
An issue was discovered in NASM version 2.16rc0. There are memory leaks in nasm_calloc() in nasmlib/alloc.c.
|
[] | null | 5.5 | null | null | null |
|
GHSA-h44j-3763-jcf8
|
In the Linux kernel, the following vulnerability has been resolved:thermal/drivers/qcom/lmh: Check for SCM availability at probeUp until now, the necessary scm availability check has not been
performed, leading to possible null pointer dereferences (which did
happen for me on RB1).Fix that.
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-29602
|
Division by zero in TFLite's implementation of `DepthwiseConv`
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `DepthwiseConv` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/depthwise_conv.cc#L287-L288). An attacker can craft a model such that `input`'s fourth dimension would be 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] | null | 2.5 | null | null | null |
GHSA-vvrh-3pvx-mjmw
|
iTech Gigs Script 1.21 allows SQL Injection via the browse-scategory.php sc parameter or the service-provider.php ser parameter.
|
[] | null | null | 9.8 | null | null |
|
RHSA-2017:1550
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 5
|
tomcat: security manager bypass via IntrospectHelper utility function tomcat: security manager bypass via JSP Servlet config parameters wildfly: Arbitrary file read via path traversal
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 7.7 | null | null |
CVE-2007-1180
|
WebAPP before 0.9.9.5 does not check referrers in certain forms, which might facilitate remote cross-site request forgery (CSRF) attacks or have other unknown impact.
|
[
"cpe:2.3:a:web-app.org:webapp:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-fqj7-rj6h-ppvp
|
PHPGURUKUL Restaurant Table Booking System using PHP and MySQL v1.0 was discovered to contain a SQL injection vulnerability via the searchdata parameter at /rtbs/check-status.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-54501
|
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. Processing a maliciously crafted file may lead to a denial of service.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-4h9w-7r8x-ppq7
|
FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections.
|
[] | null | null | null | null | null |
|
GHSA-cq8q-rrcp-vv25
|
The Xagio SEO plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.1.0.5 via the backup functionality due to weak filename structure and lack of protection in the directory. This makes it possible for unauthenticated attackers to extract sensitive data from backups which can include the entire database and site's files.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-28702
|
PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
|
[
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.6 | null | 4.6 | null |
|
GHSA-3x3h-fcc9-p4px
|
An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.
|
[] | null | 3.5 | null | null | null |
|
CVE-2021-24284
|
Kaswara Modern VC Addons <= 3.0.1 - Unauthenticated Arbitrary File Upload
|
The Kaswara Modern VC Addons WordPress plugin through 3.0.1 allows unauthenticated arbitrary file upload via the 'uploadFontIcon' AJAX action. The supplied zipfile being unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP.
|
[
"cpe:2.3:a:kaswara_project:kaswara:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 | null |
CVE-2018-18964
|
osCommerce 2.3.4.1 has an incomplete '.htaccess' for blacklist filtering in the "product" page. The .htaccess file in catalog/images/ bans the html extension, but there are several extensions in which contained HTML can be executed, such as the svg extension.
|
[
"cpe:2.3:a:oscommerce:online_merchant:2.3.4.1:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 | null |
|
GHSA-33cw-f6c5-2rv7
|
A vulnerability classified as critical was found in code-projects Simple Car Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2007-1491
|
Apache Tomcat in Avaya S87XX, S8500, and S8300 before CM 3.1.3, and Avaya SES allows connections from external interfaces via port 8009, which exposes it to attacks from outside parties.
|
[
"cpe:2.3:a:avaya:sip_enablement_services:*:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8300:*:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8500:*:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8700:*:*:*:*:*:*:*:*"
] | null | null | null | 5.2 | null |
|
GHSA-89w3-2j93-4g79
|
Fluent Bit (aka fluent-bit) 1.7.0 through 1.7,4 has a double free in flb_free (called from flb_parser_json_do and flb_parser_do).
|
[] | null | 9.8 | null | null | null |
|
RHSA-2015:2159
|
Red Hat Security Advisory: curl security, bug fix, and enhancement update
|
curl: incorrect handling of IP addresses in cookie domain curl: incorrect handle duplication after COPYPOSTFIELDS curl: URL request injection vulnerability in parseurlandfillconn() curl: re-using authenticated connection when unauthenticated curl: Negotiate not treated as connection-oriented
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
CVE-2020-6821
|
When reading from areas partially or fully outside the source resource with WebGL's <code>copyTexSubImage</code> method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2023-29367
|
iSCSI Target WMI Provider Remote Code Execution Vulnerability
|
iSCSI Target WMI Provider Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-vgj8-9328-h497
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2024-50442
|
WordPress Royal Elementor Addons and Templates plugin <= 1.3.980 - XML External Entity (XXE) vulnerability
|
Improper Restriction of XML External Entity Reference vulnerability in WP Royal Royal Elementor Addons allows XML Injection.This issue affects Royal Elementor Addons: from n/a through 1.3.980.
|
[
"cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-ghfj-4g4r-f7ww
|
Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2020-12745
|
An issue was discovered on Samsung mobile devices with Q(10.0) software. Attackers can bypass the locked-state protection mechanism and access clipboard content via USSD. The Samsung ID is SVE-2019-16556 (May 2020).
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-4xxv-x43x-7c6g
|
DLL hijacking vulnerability in Kies prior to version 2.6.4.22014_2 allows attacker to execute abitrary code.
|
[] | null | 7.8 | null | null | null |
|
GHSA-43xj-hvp7-hp7w
|
Unrestricted file upload vulnerability in calendar_admin.asp in Full Revolution aspWebCalendar 2008 allows remote attackers to upload and execute arbitrary code via the FILE1 parameter in an uploadfileprocess action, probably followed by a direct request to the file in calendar/eventimages/.
|
[] | null | null | null | null | null |
|
GHSA-hcfm-4g95-m8qp
|
The MIPL WC Multisite Sync plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.5 via the 'mipl_wc_sync_download_log' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-33833
|
ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).
|
[
"cpe:2.3:a:intel:connection_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2025-54871
|
Electron Capture is Vulnerable to TCC Bypass via Misconfigured Node Fuses (macOS)
|
Electron Capture facilitates video playback for screen-sharing and capture. In versions 2.19.1 and below, the elecap app on macOS allows local unprivileged users to bypass macOS TCC privacy protections by enabling ELECTRON_RUN_AS_NODE. This environment variable allows arbitrary Node.js code to be executed via the -e flag, which runs inside the main Electron context, inheriting any previously granted TCC entitlements (such as access to Documents, Downloads, etc.). This issue is fixed in version 2.20.0.
|
[] | null | 5.5 | null | null | null |
GHSA-mhhh-874c-f34g
|
net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.
|
[] | null | null | null | null | null |
|
GHSA-rpv7-pxwh-9c3x
|
Multiple cross-site scripting (XSS) vulnerabilities in HP Network Node Manager i (NNMi) 8.x, 9.0x, 9.1x, and 9.20 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-5579-734j-m88m
|
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, does not properly handle URL-encoded field names that are generated by some browsers, which could cause certain fields to appear to be unset, which has the effect of removing group permissions on bugs when buglist.cgi is provided with the encoded field names.
|
[] | null | null | null | null | null |
|
CVE-2022-46946
|
Helmet Store Showroom Site v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_brand.
|
[
"cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
RHSA-2016:1033
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: tags with indefinite length can corrupt pointers in asn1_find_indefinite_length() kernel: Infinite loop vulnerability in KVM
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.4 | null | null |
GHSA-c7jp-mf9p-5jw3
|
Multiple cross-site request forgery (CSRF) vulnerabilities in The Uniform Server 5.6.5 allow remote attackers to hijack the authentication of administrators for requests that change passwords via (1) apsetup.php, (2) psetup.php, (3) sslpsetup.php, or (4) mqsetup.php.
|
[] | null | null | null | null | null |
|
CVE-2022-4785
|
Download Video Sidebar Widgets <= 6.1 - Contributor+ Stored XSS via Shortcode
|
The Video Sidebar Widgets WordPress plugin through 6.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
[
"cpe:2.3:a:video_sidebar_widgets_project:video_sidebar_widgets:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-wmhc-c6v3-r3vr
|
, aka 'Visual Studio Remote Code Execution Vulnerability'.
|
[] | null | 7.8 | null | null | null |
|
GHSA-wrc6-jvcr-2g5p
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master PDF Catalog Woocommerce allows DOM-Based XSS.This issue affects PDF Catalog Woocommerce: from n/a through 2.0.
|
[] | null | 6.5 | null | null | null |
|
GHSA-c5fr-pjj5-9857
|
Incorrect Privilege Assignment vulnerability in VibeThemes VibeBP allows Privilege Escalation.This issue affects VibeBP: from n/a through 1.9.9.4.1.
|
[] | null | 9.8 | null | null | null |
|
GHSA-2f6r-892p-69g5
|
GeniXCMS arbitrary PHP code execution
|
In the Install Themes page in GeniXCMS 1.1.4, remote authenticated users can execute arbitrary PHP code via a .php file in a ZIP archive of a theme.
|
[] | null | null | 8.8 | null | null |
GHSA-w734-7qf2-5392
|
Deserialization of Untrusted Data vulnerability in Import and export users and customers.This issue affects Import and export users and customers: from n/a through 1.26.2.
|
[] | null | 4.4 | null | null | null |
|
CVE-2025-21696
|
mm: clear uffd-wp PTE/PMD state on mremap()
|
In the Linux kernel, the following vulnerability has been resolved:
mm: clear uffd-wp PTE/PMD state on mremap()
When mremap()ing a memory region previously registered with userfaultfd as
write-protected but without UFFD_FEATURE_EVENT_REMAP, an inconsistency in
flag clearing leads to a mismatch between the vma flags (which have
uffd-wp cleared) and the pte/pmd flags (which do not have uffd-wp
cleared). This mismatch causes a subsequent mprotect(PROT_WRITE) to
trigger a warning in page_table_check_pte_flags() due to setting the pte
to writable while uffd-wp is still set.
Fix this by always explicitly clearing the uffd-wp pte/pmd flags on any
such mremap() so that the values are consistent with the existing clearing
of VM_UFFD_WP. Be careful to clear the logical flag regardless of its
physical form; a PTE bit, a swap PTE bit, or a PTE marker. Cover PTE,
huge PMD and hugetlb paths.
|
[] | null | 5.5 | null | null | null |
CVE-2006-5615
|
PHP remote file inclusion vulnerability in publish.php in Textpattern 1.19, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the txpcfg[txpath] parameter.
|
[
"cpe:2.3:a:textpattern:textpattern:1.19:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-v4p2-35v8-xwf6
|
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2022-29468
|
A cross-site request forgery (CSRF) vulnerability exists in WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to increased privileges. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2004-1478
|
JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user's HTTP session.
|
[
"cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:standard:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:standard:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_server:web_01-01_1:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_server:web_01-01_2:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:6.1:*:j2ee_application_server:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-686q-p4vq-rq82
|
IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.1 before 7.0.1-ISS-SIM-FP0003 allows local users to discover cleartext passwords by (1) reading a configuration file or (2) examining a process.
|
[] | null | null | 6.2 | null | null |
|
CVE-2023-42455
|
Wazuh vulnerable to user privilege escalation
|
Wazuh is a security detection, visibility, and compliance open source project. In versions 4.4.0 and 4.4.1, it is possible to get the Wazuh API administrator key used by the Dashboard using the browser development tools. This allows a logged user to the dashboard to become administrator of the API, even if their dashboard role is not. Version 4.4.2 contains a fix. There are no known workarounds.
|
[
"cpe:2.3:a:wazuh:wazuh-kibana-app:*:*:*:*:*:wazuh:*:*",
"cpe:2.3:a:wazuh:wazuh-dashboard:*:*:*:*:*:wazuh:*:*"
] | null | 8.8 | null | null | null |
GHSA-4v9v-hfq4-rm2v
|
webpack-dev-server users' source code may be stolen when they access a malicious web site
|
SummarySource code may be stolen when you access a malicious web site.DetailsBecause the request for classic script by a script tag is not subject to same origin policy, an attacker can inject `<script src="http://localhost:8080/main.js">` in their site and run the script. Note that the attacker has to know the port and the output entrypoint script path. Combined with prototype pollution, the attacker can get a reference to the webpack runtime variables.
By using `Function::toString` against the values in `__webpack_modules__`, the attacker can get the source code.PoCDownload [reproduction.zip](https://github.com/user-attachments/files/18426585/reproduction.zip) and extract itRun `npm i`Run `npx webpack-dev-server`Open `https://e29c9a88-a242-4fb4-9e64-b24c9d29b35b.pages.dev/`You can see the source code output in the document and the devtools console.The script in the POC site is:This script uses the function generated by [`renderRequire`](https://github.com/webpack/webpack/blob/3919c844eca394d73ca930e4fc5506fb86e2b094/lib/javascript/JavascriptModulesPlugin.js#L1383).Especially, it uses the fact that `Array::forEach` is called for `__webpack_require__.i` and `execOptions` contains `__webpack_require__`.
It uses prototype pollution against `Array::forEach` to extract `__webpack_require__` reference.ImpactThis vulnerability can result in the source code to be stolen for users that uses a predictable port and output path for the entrypoint script.SummarySource code may be stolen when you use [`output.iife: false`](https://webpack.js.org/configuration/output/#outputiife) and access a malicious web site.DetailsWhen `output.iife: false` is set, some global variables for the webpack runtime are declared on the `window` object (e.g. `__webpack_modules__`).
Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject `<script src="http://localhost:8080/main.js">` in their site and run the script. Note that the attacker has to know the port and the output entrypoint script path. By running that, the webpack runtime variables will be declared on the `window` object.
By using `Function::toString` against the values in `__webpack_modules__`, the attacker can get the source code.I pointed out `output.iife: false`, but if there are other options that makes the webpack runtime variables to be declared on the `window` object, the same will apply for those cases.PoCDownload [reproduction.zip](https://github.com/user-attachments/files/18409777/reproduction.zip) and extract itRun `npm i`Run `npx webpack-dev-server`Open `https://852aafa3-5f83-44da-9fc6-ea116d0e3035.pages.dev/`Open the devtools console.You can see the content of `src/index.js` and other scripts loaded.The script in the POC site is:ImpactThis vulnerability can result in the source code to be stolen for users that has `output.iife: false` option set and uses a predictable port and output path for the entrypoint script.
|
[] | null | 5.3 | null | null | null |
CVE-1999-0079
|
Remote attackers can cause a denial of service in FTP by issuing multiple PASV commands, causing the server to run out of available ports.
|
[
"cpe:2.3:a:bisonware:bisonware_ftp_server:3.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-2639-626v-hq33
|
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom Gallery Widget 'image_title' parameter in all versions up to, and including, 5.10.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2017-18688
|
An issue was discovered on Samsung mobile devices with L(5.1), M(6.0), and N(7.0) software. There is an information disclosure (of memory locations outside a buffer) via /dev/dsm_ctrl_dev. The Samsung ID is SVE-2016-7340 (January 2017).
|
[
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-r4x3-pjwq-wcwm
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Luca Paggetti 3D Presentation allows Stored XSS.This issue affects 3D Presentation: from n/a through 1.0.
|
[] | null | 6.5 | null | null | null |
|
CVE-2006-4669
|
PHP remote file inclusion vulnerability in admin/system/include.php in Somery 0.4.6 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the skindir parameter.
|
[
"cpe:2.3:a:somery:somery:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
GHSA-33qr-m49q-rxfx
|
Compromised xrpl.js versions 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2
|
ImpactVersions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. If you are using one of these versions, stop immediately and rotate any private keys or secrets used with affected systems.Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions.PatchesUpgrade to version 4.2.5 or 2.14.3.Required ActionsTo secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys:The XRP Ledger supports key rotation: https://xrpl.org/docs/tutorials/how-tos/manage-account-settings/assign-a-regular-key-pairIf any account's master key is potentially compromised, you should disable it: https://xrpl.org/docs/tutorials/how-tos/manage-account-settings/disable-master-key-pairReferenceshttps://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor
|
[] | 9.3 | null | null | null | null |
CVE-2025-5868
|
RT-Thread lwp_syscall.c sys_thread_sigprocmask array index
|
A vulnerability, which was classified as critical, has been found in RT-Thread 5.1.0. This issue affects the function sys_thread_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index.
|
[] | 8.6 | 8 | 8 | 7.4 | null |
GHSA-j57f-3hr8-2q9j
|
Cross-site scripting (XSS) vulnerability in the Zero Point module 6.x-1.x before 6.x-1.18 and 7.x-1.x before 7.x-1.4 for Drupal allows remote attackers to inject arbitrary web script or HTML via the path aliases.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.