id
string
title
string
description
string
cpes
list
cvss_v4_0
float64
cvss_v3_1
float64
cvss_v3_0
float64
cvss_v2_0
float64
patch_commit_url
string
GHSA-hvf9-xw27-729c
A vulnerability in the hardware-based SSL/TLS cryptography functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to an implementation error within the cryptographic functions for SSL/TLS traffic processing when they are offloaded to the hardware. An attacker could exploit this vulnerability by sending a crafted stream of SSL/TLS traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected error in the hardware-based cryptography engine, which could cause the device to reload.
[]
null
null
8.6
null
null
CVE-2019-15126
An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:bcm4389_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:bcm4389:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:bcm43012_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:bcm43012:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:bcm43013_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:bcm43013:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:bcm4375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:bcm4375:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:bcm43752_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:bcm43752:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:bcm4356_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:broadcom:bcm4356:-:*:*:*:*:*:*:*" ]
null
3.1
null
2.9
null
CVE-2006-0974
Cross-site scripting (XSS) vulnerability in failure.asp in Battleaxe bttlxeForum 2.0 allows remote attackers to inject arbitrary web script or HTML via the err_txt parameter.
[ "cpe:2.3:a:battleaxe_software:bttlxeforum:2.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-2006
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*" ]
null
7
null
null
null
PYSEC-2024-13
null
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
[]
null
null
null
null
null
CVE-2016-7974
The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
[ "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2025-23822
WordPress Category Custom Fields plugin <= 1.0 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Cornea Alexandru Category Custom Fields allows Cross Site Request Forgery.This issue affects Category Custom Fields: from n/a through 1.0.
[]
null
7.1
null
null
null
CVE-2015-3763
Safari in Apple iOS before 8.4.1 does not limit the rate of JavaScript alert messages, which allows remote attackers to cause a denial of service (apparent browser locking) via a crafted web site.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-7qh9-cwj4-9h44
Buffer overflow in the BFup ActiveX control (BFup.dll) in B21Soft BFup before 1.0.802.29 allows remote attackers to execute arbitrary code via a long FilePath parameter.
[]
null
null
null
null
null
GHSA-vf7v-wqw9-gv37
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of CGM files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12163)
[]
null
null
null
null
null
GHSA-w2r6-3gg9-r2fp
SAP EMR Unwired (com.sap.mobile.healthcare.emr.v2) and Clinical Task Tracker (com.sap.mobile.healthcare.ctt) does not properly restrict access, which allows remote attackers to change the backendurl, clientid, ssourl, and infopageurl settings via unspecified vectors, aka SAP Security Note 2117079.
[]
null
null
null
null
null
GHSA-96rj-cc48-wqpc
setMarkdown in Qt before 5.14.2 has a use-after-free related to QTextMarkdownImporter::insertBlock.
[]
null
9.8
null
null
null
CVE-2025-26524
No Rate Limiting Vulnerability in RupeeWeb trading platform
This vulnerability exists in RupeeWeb trading platform due to missing rate limiting on OTP requests in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints which could lead to the OTP bombing/ flooding on the targeted system.
[]
5.1
null
null
null
null
GHSA-v94g-ggp4-7f34
Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of OPC client certificates. The issue results from dereferencing a NULL pointer. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20508.
[]
null
null
7.5
null
null
CVE-2020-8162
A client side enforcement of server side security vulnerability exists in rails < 5.2.4.2 and rails < 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.
[ "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-wr6f-rjpp-8f66
Google Chrome before 6.0.472.59 on Mac OS X does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. NOTE: this issue exists because of an incorrect fix for CVE-2010-3112 on Mac OS X.
[]
null
null
null
null
null
GHSA-wv7x-gv33-fgrm
Memory corruption due to ioctl command size was incorrectly set to the size of a pointer and not enough storage is allocated for the copy of the user argument in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[]
null
null
null
null
null
CVE-2025-55156
PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter
pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issue has been patched in version 0.5.0b3.dev91.
[]
7.8
null
null
null
null
CVE-2018-1000826
Microweber version <= 1.0.7 contains a Cross Site Scripting (XSS) vulnerability in Admin login form template that can result in Execution of JavaScript code.
[ "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-xmfc-6x2r-fqv5
In the Linux kernel, the following vulnerability has been resolved:virtio-blk: Fix memory leak among suspend/resume procedureThe vblk->vqs should be freed before we call init_vqs() in virtblk_restore().
[]
null
5.5
null
null
null
RHSA-2025:11402
Red Hat Security Advisory: avahi security update
avahi: Avahi Wide-Area DNS Uses Constant Source Port
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
null
GHSA-gqwh-h8jw-f265
Multiple cross-site scripting (XSS) vulnerabilities in Web4Future News Portal allow remote attackers to inject arbitrary web script or HTML via the ID parameter to (1) comentarii.php or (2) view.php. NOTE: this issue might be resultant from SQL injection.
[]
null
null
null
null
null
GHSA-3mh5-q9p2-6cqr
RCS module in Huawei ALP-AL00B smart phones with software versions earlier than 8.0.0.129, BLA-AL00B smart phones with software versions earlier than 8.0.0.129 has a remote control vulnerability. An attacker can trick a user to install a malicious application. When the application connects with RCS for the first time, it needs user to manually click to agree. In addition, the attacker needs to obtain the key that RCS uses to authenticate the application. Successful exploitation may cause the attacker to control keyboard remotely.
[]
null
null
4.4
null
null
CVE-2023-47819
WordPress Easy Call Now by ThikShare Plugin <= 1.1.0 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Dang Ngoc Binh Easy Call Now by ThikShare plugin <= 1.1.0 versions.
[ "cpe:2.3:a:dangngocbinh:easy_call_now_by_thikshare:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2013-6340
epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2018-18353
Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2018-9955
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA resolveNode method of Button elements. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5531.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
RHSA-2023:0605
Red Hat Security Advisory: thunderbird security update
Mozilla: Revocation status of S/Mime signature certificates was not checked
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
null
CVE-2000-1018
shred 1.0 file wiping utility does not properly open a file for overwriting or flush its buffers, which prevents shred from properly replacing the file's data and allows local users to recover the file.
[ "cpe:2.3:a:mendel_cooper:shred:1.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
RHSA-2002:139
Red Hat Security Advisory: : Updated glibc packages fix vulnerabilities in resolver
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
null
CVE-2007-5440
Multiple PHP remote file inclusion vulnerabilities in CRS Manager allow remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter to (1) index.php or (2) login.php. NOTE: this issue is disputed by CVE, since DOCUMENT_ROOT cannot be modified by an attacker
[ "cpe:2.3:a:crs_manager:crs_manager:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-32xr-h3h3-rvqj
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
[]
null
7.8
null
null
null
GHSA-rmcp-9fhq-58pv
Improper permissions handling in MediaWiki AbuseFilter
An issue was discovered in the AbuseFilter extension for MediaWiki before 1.39.9, 1.40.x and 1.41.x before 1.41.3, and 1.42.x before 1.42.2. An API caller can match a filter condition against AbuseFilter logs even if the caller is not authorized to view the log details for the filter.
[]
null
5.3
null
null
null
CVE-2023-1030
SourceCodester/code-projects Online Boat Reservation System POST Parameter login.php cross site scripting
A vulnerability has been found in SourceCodester/code-projects Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:online_boat_reservation_system_project:online_boat_reservation_system:1.0:*:*:*:*:*:*:*" ]
5.1
3.5
3.5
4
null
GHSA-m7rc-p9fx-3j84
Multiple cross-site scripting vulnerabilities in the (1) Pool or (2) News Modules in Php-Nuke allow remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
[]
null
null
null
null
null
CVE-2013-3823
Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
[ "cpe:2.3:a:oracle:supply_chain_products_suite:9.3.1:*:*:*:*:*:*:*" ]
null
null
null
4
null
GHSA-vh49-hg45-89gx
IBM Planning Analytics 2.0 could be vulnerable to cross-site request forgery (CSRF) which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 198241.
[]
null
null
null
null
null
GHSA-xq5c-p875-fv6j
Telepad allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
[]
null
5.9
null
null
null
GHSA-772g-9pc9-6mmj
User enumeration is found in PHPJabbers Food Delivery Script v3.1. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
[]
null
9.8
null
null
null
GHSA-c4x7-5j2r-4346
The kernel-mode driver in Microsoft Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
[]
null
null
7.8
null
null
CVE-2017-11132
An issue was discovered in heinekingmedia StashCat before 1.5.18 for Android. No certificate pinning is implemented; therefore the attacker could issue a certificate for the backend and the application would not notice it.
[ "cpe:2.3:a:heinekingmedia:stashcat:*:*:*:*:*:android:*:*" ]
null
7.5
null
5
null
GHSA-rm87-ccvw-q747
In TBD of TBD, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
null
CVE-2017-16332
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_event_alarm, at 0x9d01ec34, the value for the `s_aid` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
[ "cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*" ]
null
null
8.5
null
null
GHSA-ppcc-8c3j-x247
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in clicklabs® Medienagentur Download Button for Elementor allows Stored XSS.This issue affects Download Button for Elementor: from n/a through 1.2.1.
[]
null
6.5
null
null
null
CVE-2024-10631
Countdown Timer <= 1.0.5 - Contributor+ Stored XSS
The Countdown Timer for WordPress Block Editor WordPress plugin through 1.0.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
6.5
null
null
null
GHSA-fq7v-xj92-r9mr
An issue was discovered in Zoho ManageEngine Key Manager Plus 6.1.6. A user, with the level Operator, can see all SSH servers (and user information) even if no SSH server or user is associated to the operator.
[]
null
4.3
null
null
null
CVE-2010-1799
Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:*:*:ja:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:java:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:vista:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:windows_sp_2:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:windows_vista:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:windows_xp:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:windows_xp_sp2:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:windows:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-8fmw-29w8-grr7
Unspecified vulnerability in the Oracle iProcurement component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect integrity via unknown vectors related to Redirection.
[]
null
null
null
null
null
CVE-2021-42664
A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
[ "cpe:2.3:a:engineers_online_portal_project:engineers_online_portal:1.0:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-fm87-mh9v-3658
The Snapshot Backup WordPress plugin through 2.1.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
[]
null
4.7
null
null
null
GHSA-q7xm-7x78-ppqp
The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted "install license" arguments, aka Bug ID CSCuh30824.
[]
null
null
null
null
null
GHSA-9mfx-rmx2-gvrc
IBM iNotes 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998824.
[]
null
null
6.1
null
null
GHSA-7p76-mrph-qq8g
SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.
[]
null
null
7.5
null
null
CVE-2021-25659
A vulnerability has been identified in Automation License Manager 5 (All versions), Automation License Manager 6 (All versions < V6.0 SP9 Update 2). Sending specially crafted packets to port 4410/tcp of an affected system could lead to extensive memory being consumed and as such could cause a denial-of-service preventing legitimate users from using the system.
[ "cpe:2.3:a:siemens:automation_license_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2021-44238
AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE) via /aya/module/admin/ust_tab_e.inc.php,
[ "cpe:2.3:a:ayacms_project:ayacms:3.1.2:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
null
GHSA-4pff-25fv-cm83
Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
[]
null
5
null
null
null
GHSA-7pjx-r98g-p4qj
The web-based management interfaces in Sourcefire Defense Center (DC) and 3D Sensor before 4.8.2 allow remote authenticated users to gain privileges via a $admin value for the admin parameter in an edit action to admin/user/user.cgi and unspecified other components.
[]
null
null
null
null
null
GHSA-whjp-5gj5-fqm7
Cisco Wireless LAN Controller (WLC) devices with software 7.5(102.0) and 7.6(1.62) allow remote attackers to cause a denial of service (device crash) by triggering an exception during attempted forwarding of unspecified IPv6 packets to a non-IPv6 device, aka Bug ID CSCuj01046.
[]
null
null
null
null
null
CVE-2015-6401
Cisco EPC3928 devices with EDVA 5.5.10, 5.5.11, and 5.7.1 allow remote attackers to bypass an intended authentication requirement and execute unspecified administrative functions via a crafted HTTP request, aka Bug ID CSCux24941.
[ "cpe:2.3:o:cisco:epc3928_docsis_3.0_8x4_wireless_residential_gateway_with_embedded_digital_voice_adapter:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:epc3928_docsis_3.0_8x4_wireless_residential_gateway_with_embedded_digital_voice_adapter:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:epc3928_docsis_3.0_8x4_wireless_residential_gateway_with_embedded_digital_voice_adapter:5.7.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-4633
IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.
[ "cpe:2.3:a:ibm:resilient_security_orchestration_automation_and_response:38.0:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
CVE-2023-39445
Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an unauthenticated attacker to execute arbitrary code by sending a specially crafted file to the product's certain management console.
[ "cpe:2.3:h:logitec:lan-wh300n_re:*:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1467ghbk-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1467ghbk-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1467ghbk-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1467ghbk-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1900ghbk-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1900ghbk-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1900ghbk-s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1900ghbk-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-600ghbk-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-600ghbk-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-733febk2-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-733febk2-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-f1167acf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-f1167acf2:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-34167
Uncontrolled search path for the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*" ]
5.4
6.7
null
null
null
GHSA-2jpr-j4c2-5fwj
SQL injection vulnerability in news.php in gCards version 1.43 allows remote attackers to execute arbitrary SQL commands via the limit parameter.
[]
null
null
null
null
null
CVE-2006-4486
Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.
[ "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
CVE-2025-7079
mao888 bluebell-plus JWT Token jwt.go hard-coded password
A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
[]
6.3
3.7
3.7
2.6
null
RHSA-2024:7670
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication protobuf: StackOverflow vulnerability in Protocol Buffers graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
[ "cpe:/a:redhat:quarkus:3.8::el8" ]
null
8.8
null
null
null
cisco-sa-ucs-invcert-eOpRvCKH
Cisco Unified Computing System Central Software Improper Certificate Validation Vulnerability
A vulnerability in the certificate registration process of Cisco Unified Computing System (UCS) Central Software could allow an authenticated, adjacent attacker to register a rogue Cisco Unified Computing System Manager (UCSM). This vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to the registration API. A successful exploit could allow the attacker to register a rogue Cisco UCSM and gain access to Cisco UCS Central Software data and Cisco UCSM inventory data. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-invcert-eOpRvCKH ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-invcert-eOpRvCKH"]
[]
null
4.3
null
null
null
GHSA-h8g4-6mrj-mfm8
In the Linux kernel, the following vulnerability has been resolved:bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queuesWhen running `test_sockmap` selftests, the following warning appears:WARNING: CPU: 2 PID: 197 at net/core/stream.c:205 sk_stream_kill_queues+0xd3/0xf0 Call Trace: <TASK> inet_csk_destroy_sock+0x55/0x110 tcp_rcv_state_process+0xd28/0x1380 ? tcp_v4_do_rcv+0x77/0x2c0 tcp_v4_do_rcv+0x77/0x2c0 __release_sock+0x106/0x130 __tcp_close+0x1a7/0x4e0 tcp_close+0x20/0x70 inet_release+0x3c/0x80 __sock_release+0x3a/0xb0 sock_close+0x14/0x20 __fput+0xa3/0x260 task_work_run+0x59/0xb0 exit_to_user_mode_prepare+0x1b3/0x1c0 syscall_exit_to_user_mode+0x19/0x50 do_syscall_64+0x48/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xaeThe root case is in commit 84472b436e76 ("bpf, sockmap: Fix more uncharged while msg has more_data"), where I used msg->sg.size to replace the tosend, causing breakage:if (msg->apply_bytes && msg->apply_bytes < tosend) tosend = psock->apply_bytes;
[]
null
null
null
null
null
CVE-2023-21451
A Stack-based overflow vulnerability in IpcRxEmbmsSessionList in SECRIL prior to Android S(12) allows attacker to cause memory corruptions.
[ "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
null
6.7
null
null
null
GHSA-2p82-m3fp-gp3x
Execution with Unnecessary Privileges vulnerability in Bitdefender Endpoint Security Tools, Total Security allows a local attacker to elevate to 'NT AUTHORITY\System. Impersonation enables the server thread to perform actions on behalf of the client but within the limits of the client's security context. This issue affects: Bitdefender Endpoint Security Tools versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 25.0.26.
[]
null
7.8
null
null
null
GHSA-5v7x-9h3r-vmfx
Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote authenticated users to bypass intended privilege requirements and list the privileges of arbitrary users via unspecified vectors.
[]
null
null
null
null
null
CVE-2021-25673
A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, the application could enter an infinite loop, become unresponsive and must be restarted to restore the service.
[ "cpe:2.3:a:siemens:simatic_s7-plcsim:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
null
GHSA-fhhf-3xm2-h9f8
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
[]
null
7.8
null
null
null
CVE-2020-0822
An elevation of privilege vulnerability exists when the Windows Language Pack Installer improperly handles file operations, aka 'Windows Language Pack Installer Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2016-4671
An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) via a crafted PDF file.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2023-23886
WordPress WP-RecentComments plugin <= 2.2.7 - Broken Access Control vulnerability
Missing Authorization vulnerability in mg12 WP-RecentComments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-RecentComments: from n/a through 2.2.7.
[]
null
5.4
null
null
null
CVE-2024-53848
check-jsonschema default caching for remote schemas allows for cache confusion
check-jsonschema is a CLI and set of pre-commit hooks for jsonschema validation. The default cache strategy uses the basename of a remote schema as the name of the file in the cache, e.g. `https://example.org/schema.json` will be stored as `schema.json`. This naming allows for conflicts. If an attacker can get a user to run `check-jsonschema` against a malicious schema URL, e.g., `https://example.evil.org/schema.json`, they can insert their own schema into the cache and it will be picked up and used instead of the appropriate schema. Such a cache confusion attack could be used to allow data to pass validation which should have been rejected. This issue has been patched in version 0.30.0. All users are advised to upgrade. A few workarounds exist: 1. Users can use `--no-cache` to disable caching. 2. Users can use `--cache-filename` to select filenames for use in the cache, or to ensure that other usages do not overwrite the cached schema. (Note: this flag is being deprecated as part of the remediation effort.) 3. Users can explicitly download the schema before use as a local file, as in `curl -LOs https://example.org/schema.json; check-jsonschema --schemafile ./schema.json`
[]
null
7.1
null
null
null
GHSA-r8f7-9pfq-mjmv
Improper Certificate Validation in node-sass
Certificate validation in node-sass 2.0.0 to 6.0.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
[]
null
5.3
null
null
null
GHSA-2237-8cw9-xj7q
Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.
[]
null
null
9.8
null
null
CVE-2006-3875
Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, and Excel Viewer 2003 allows user-assisted attackers to execute arbitrary code via a crafted COLINFO record in an XLS file, a different vulnerability than CVE-2006-2387 and CVE-2006-3867.
[ "cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2004:*:mac_os_x:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:x:*:mac_os_x:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*" ]
null
null
null
5.1
null
RHSA-2025:4449
Red Hat Security Advisory: xmlrpc-c security update
libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.5
null
null
null
GHSA-383j-f5vg-3hcm
In the Linux kernel, the following vulnerability has been resolved:ext4: check stripe size compatibility on remount as wellWe disable stripe size in __ext4_fill_super if it is not a multiple of the cluster ratio however this check is missed when trying to remount. This can leave us with cases where stripe < cluster_ratio after remount:set making EXT4_B2C(sbi->s_stripe) become 0 that can cause some unforeseen bugs like divide by 0.Fix that by adding the check in remount path as well.
[]
null
5.5
null
null
null
GHSA-2w4f-8m3p-jrxr
A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
[]
null
6.1
null
null
null
GHSA-v7v4-vj4g-88wh
In older versions of Sendmail, an attacker could use a pipe character to execute root commands.
[]
null
null
null
null
null
GHSA-vh98-48jw-fxwj
A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.
[]
5.2
7
null
null
null
CVE-2021-29218
A local unquoted search path security vulnerability has been identified in HPE Agentless Management Service for Windows version(s): Prior to 1.44.0.0, 10.96.0.0. This vulnerability could be exploited locally by a user with high privileges to execute malware that may lead to a loss of confidentiality, integrity, and availability. HPE has provided software updates to resolve the vulnerability in HPE Agentless Management Service for Windows.
[ "cpe:2.3:a:hpe:agentless_management:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*", "cpe:2.3:a:hpe:proliant_agentless_management:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_20:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_2000_gen_10_plus:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_6500:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_80:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_dl:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:proliant_ml:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_480_gen9:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_620_gen9:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_660_gen9:-:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:synergy_680_gen9:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
null
CVE-2025-51863
Self Cross Site Scripting (XSS) vulnerability in ChatGPT Unli (ChatGPTUnli.com) thru 2025-05-26 allows attackers to execute arbitrary code via a crafted SVG file to the chat interface.
[]
null
6.1
null
null
null
CVE-2022-40687
WordPress Creative Mail plugin <= 1.5.4 - Cross-Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Creative Mail plugin <= 1.5.4 on WordPress.
[ "cpe:2.3:a:constantcontact:creative_mail:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-vg7f-w97j-m6x9
Open Faculty Evaluation System 5.6 for PHP 5.6 allows submit_feedback.php SQL Injection, a different vulnerability than CVE-2018-18758.
[]
null
null
9.8
null
null
GHSA-pfc4-45pm-vm6j
The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579.
[]
null
null
null
null
null
GHSA-pg93-pcp9-c63j
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls Code Flow starting at STDUJBIG2File!DllGetClassObject+0x0000000000002f35."
[]
null
null
7.8
null
null
CVE-2001-0897
Cross-site scripting vulnerability in Infopop Ultimate Bulletin Board (UBB) before 5.47e allows remote attackers to steal user cookies via an [IMG] tag that references an about: URL with an onerror field.
[ "cpe:2.3:a:infopop:ultimate_bulletin_board:-:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.75:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.03:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.04:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.05:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.06:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.07:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.50:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.51:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.52:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.53:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.75:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.80:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.81:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.82:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.83:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.84:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.85:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.86:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.00:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.08:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.17:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.18:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.19:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.20:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.25:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.26:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.27:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.28:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.31:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.32:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.33:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.35:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.37:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:d:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.40:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:d:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:d:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-21848
Users maintain access to active call after being removed from a channel
Improper Access Control in Mattermost Server versions 8.1.x before 8.1.11 allows an attacker that is in a channel with an active call to keep participating in the call even if they are removed from the channel
[ "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
null
CVE-2005-1188
Cross-site scripting (XSS) vulnerability in comersus_searchItem.asp in Comersus 3.90 to 4.51 allows remote attackers to inject arbitrary web script or HTML via the curPage parameter.
[ "cpe:2.3:a:comersus_open_technologies:comersus_cart:3.90:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.00:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.14:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.20b:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.23:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.27:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.28:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.29:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.36:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.47:*:*:*:*:*:*:*", "cpe:2.3:a:comersus_open_technologies:comersus_cart:4.051:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-h2w9-3qj3-7rf9
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.
[]
null
null
null
null
null
CVE-2022-2263
Online Hotel Booking System Room edit_room_cat.php sql injection
A vulnerability was found in Online Hotel Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file edit_room_cat.php of the component Room Handler. The manipulation of the argument roomname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:online_hotel_booking_project:online_hotel_booking:1.0:*:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-6xvx-4wxq-vvfv
The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to SQL Injection via the 'search' parameter in all versions up to, and including, 6.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
6.5
null
null
null
GHSA-pqhp-4xfc-hjgq
An issue was discovered in Couchbase Sync Gateway before 3.2.6. In sgcollect_info_options.log and sync_gateway.log, there are cleartext passwords in redacted and unredacted output.
[]
null
7.3
null
null
null
CVE-2023-36531
WordPress LiquidPoll plugin <= 3.3.68 - Broken Access Control vulnerability
Missing Authorization vulnerability in LiquidPoll LiquidPoll – Advanced Polls for Creators and Brands allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LiquidPoll – Advanced Polls for Creators and Brands: from n/a through 3.3.68.
[]
null
4.3
null
null
null
CVE-2023-45650
WordPress HTML5 Maps Plugin <= 1.7.1.4 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin <= 1.7.1.4 versions.
[ "cpe:2.3:a:fla-shop:html5_maps:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null