id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
GHSA-hvf9-xw27-729c
|
A vulnerability in the hardware-based SSL/TLS cryptography functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to an implementation error within the cryptographic functions for SSL/TLS traffic processing when they are offloaded to the hardware. An attacker could exploit this vulnerability by sending a crafted stream of SSL/TLS traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected error in the hardware-based cryptography engine, which could cause the device to reload.
|
[] | null | null | 8.6 | null | null |
|
CVE-2019-15126
|
An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:bcm4389_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm4389:-:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:bcm43012_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm43012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:bcm43013_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm43013:-:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:bcm4375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm4375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:bcm43752_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm43752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:bcm4356_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm4356:-:*:*:*:*:*:*:*"
] | null | 3.1 | null | 2.9 | null |
|
CVE-2006-0974
|
Cross-site scripting (XSS) vulnerability in failure.asp in Battleaxe bttlxeForum 2.0 allows remote attackers to inject arbitrary web script or HTML via the err_txt parameter.
|
[
"cpe:2.3:a:battleaxe_software:bttlxeforum:2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-2006
|
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
PYSEC-2024-13
| null |
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
|
[] | null | null | null | null | null |
CVE-2016-7974
|
The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
|
[
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2025-23822
|
WordPress Category Custom Fields plugin <= 1.0 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Cornea Alexandru Category Custom Fields allows Cross Site Request Forgery.This issue affects Category Custom Fields: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
CVE-2015-3763
|
Safari in Apple iOS before 8.4.1 does not limit the rate of JavaScript alert messages, which allows remote attackers to cause a denial of service (apparent browser locking) via a crafted web site.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-7qh9-cwj4-9h44
|
Buffer overflow in the BFup ActiveX control (BFup.dll) in B21Soft BFup before 1.0.802.29 allows remote attackers to execute arbitrary code via a long FilePath parameter.
|
[] | null | null | null | null | null |
|
GHSA-vf7v-wqw9-gv37
|
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of CGM files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12163)
|
[] | null | null | null | null | null |
|
GHSA-w2r6-3gg9-r2fp
|
SAP EMR Unwired (com.sap.mobile.healthcare.emr.v2) and Clinical Task Tracker (com.sap.mobile.healthcare.ctt) does not properly restrict access, which allows remote attackers to change the backendurl, clientid, ssourl, and infopageurl settings via unspecified vectors, aka SAP Security Note 2117079.
|
[] | null | null | null | null | null |
|
GHSA-96rj-cc48-wqpc
|
setMarkdown in Qt before 5.14.2 has a use-after-free related to QTextMarkdownImporter::insertBlock.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-26524
|
No Rate Limiting Vulnerability in RupeeWeb trading platform
|
This vulnerability exists in RupeeWeb trading platform due to missing rate limiting on OTP requests in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints which could lead to the OTP bombing/ flooding on the targeted system.
|
[] | 5.1 | null | null | null | null |
GHSA-v94g-ggp4-7f34
|
Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of OPC client certificates. The issue results from dereferencing a NULL pointer. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20508.
|
[] | null | null | 7.5 | null | null |
|
CVE-2020-8162
|
A client side enforcement of server side security vulnerability exists in rails < 5.2.4.2 and rails < 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.
|
[
"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-wr6f-rjpp-8f66
|
Google Chrome before 6.0.472.59 on Mac OS X does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. NOTE: this issue exists because of an incorrect fix for CVE-2010-3112 on Mac OS X.
|
[] | null | null | null | null | null |
|
GHSA-wv7x-gv33-fgrm
|
Memory corruption due to ioctl command size was incorrectly set to the size of a pointer and not enough storage is allocated for the copy of the user argument in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
|
[] | null | null | null | null | null |
|
CVE-2025-55156
|
PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter
|
pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issue has been patched in version 0.5.0b3.dev91.
|
[] | 7.8 | null | null | null | null |
CVE-2018-1000826
|
Microweber version <= 1.0.7 contains a Cross Site Scripting (XSS) vulnerability in Admin login form template that can result in Execution of JavaScript code.
|
[
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-xmfc-6x2r-fqv5
|
In the Linux kernel, the following vulnerability has been resolved:virtio-blk: Fix memory leak among suspend/resume procedureThe vblk->vqs should be freed before we call init_vqs()
in virtblk_restore().
|
[] | null | 5.5 | null | null | null |
|
RHSA-2025:11402
|
Red Hat Security Advisory: avahi security update
|
avahi: Avahi Wide-Area DNS Uses Constant Source Port
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null | null |
GHSA-gqwh-h8jw-f265
|
Multiple cross-site scripting (XSS) vulnerabilities in Web4Future News Portal allow remote attackers to inject arbitrary web script or HTML via the ID parameter to (1) comentarii.php or (2) view.php. NOTE: this issue might be resultant from SQL injection.
|
[] | null | null | null | null | null |
|
GHSA-3mh5-q9p2-6cqr
|
RCS module in Huawei ALP-AL00B smart phones with software versions earlier than 8.0.0.129, BLA-AL00B smart phones with software versions earlier than 8.0.0.129 has a remote control vulnerability. An attacker can trick a user to install a malicious application. When the application connects with RCS for the first time, it needs user to manually click to agree. In addition, the attacker needs to obtain the key that RCS uses to authenticate the application. Successful exploitation may cause the attacker to control keyboard remotely.
|
[] | null | null | 4.4 | null | null |
|
CVE-2023-47819
|
WordPress Easy Call Now by ThikShare Plugin <= 1.1.0 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Dang Ngoc Binh Easy Call Now by ThikShare plugin <= 1.1.0 versions.
|
[
"cpe:2.3:a:dangngocbinh:easy_call_now_by_thikshare:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2013-6340
|
epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2018-18353
|
Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2018-9955
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA resolveNode method of Button elements. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5531.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
RHSA-2023:0605
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Revocation status of S/Mime signature certificates was not checked
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null | null |
CVE-2000-1018
|
shred 1.0 file wiping utility does not properly open a file for overwriting or flush its buffers, which prevents shred from properly replacing the file's data and allows local users to recover the file.
|
[
"cpe:2.3:a:mendel_cooper:shred:1.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
RHSA-2002:139
|
Red Hat Security Advisory: : Updated glibc packages fix vulnerabilities in resolver
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null | null |
CVE-2007-5440
|
Multiple PHP remote file inclusion vulnerabilities in CRS Manager allow remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter to (1) index.php or (2) login.php. NOTE: this issue is disputed by CVE, since DOCUMENT_ROOT cannot be modified by an attacker
|
[
"cpe:2.3:a:crs_manager:crs_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-32xr-h3h3-rvqj
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
|
[] | null | 7.8 | null | null | null |
|
GHSA-rmcp-9fhq-58pv
|
Improper permissions handling in MediaWiki AbuseFilter
|
An issue was discovered in the AbuseFilter extension for MediaWiki before 1.39.9, 1.40.x and 1.41.x before 1.41.3, and 1.42.x before 1.42.2. An API caller can match a filter condition against AbuseFilter logs even if the caller is not authorized to view the log details for the filter.
|
[] | null | 5.3 | null | null | null |
CVE-2023-1030
|
SourceCodester/code-projects Online Boat Reservation System POST Parameter login.php cross site scripting
|
A vulnerability has been found in SourceCodester/code-projects Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:online_boat_reservation_system_project:online_boat_reservation_system:1.0:*:*:*:*:*:*:*"
] | 5.1 | 3.5 | 3.5 | 4 | null |
GHSA-m7rc-p9fx-3j84
|
Multiple cross-site scripting vulnerabilities in the (1) Pool or (2) News Modules in Php-Nuke allow remote attackers to inject arbitrary web script or HTML via javascript in the SRC attribute of an IMG tag.
|
[] | null | null | null | null | null |
|
CVE-2013-3823
|
Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
|
[
"cpe:2.3:a:oracle:supply_chain_products_suite:9.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-vh49-hg45-89gx
|
IBM Planning Analytics 2.0 could be vulnerable to cross-site request forgery (CSRF) which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 198241.
|
[] | null | null | null | null | null |
|
GHSA-xq5c-p875-fv6j
|
Telepad allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
[] | null | 5.9 | null | null | null |
|
GHSA-772g-9pc9-6mmj
|
User enumeration is found in PHPJabbers Food Delivery Script v3.1. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
|
[] | null | 9.8 | null | null | null |
|
GHSA-c4x7-5j2r-4346
|
The kernel-mode driver in Microsoft Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
CVE-2017-11132
|
An issue was discovered in heinekingmedia StashCat before 1.5.18 for Android. No certificate pinning is implemented; therefore the attacker could issue a certificate for the backend and the application would not notice it.
|
[
"cpe:2.3:a:heinekingmedia:stashcat:*:*:*:*:*:android:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-rm87-ccvw-q747
|
In TBD of TBD, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.8 | null | null | null |
|
CVE-2017-16332
|
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_event_alarm, at 0x9d01ec34, the value for the `s_aid` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
|
[
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*"
] | null | null | 8.5 | null | null |
|
GHSA-ppcc-8c3j-x247
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in clicklabs® Medienagentur Download Button for Elementor allows Stored XSS.This issue affects Download Button for Elementor: from n/a through 1.2.1.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-10631
|
Countdown Timer <= 1.0.5 - Contributor+ Stored XSS
|
The Countdown Timer for WordPress Block Editor WordPress plugin through 1.0.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[] | null | 6.5 | null | null | null |
GHSA-fq7v-xj92-r9mr
|
An issue was discovered in Zoho ManageEngine Key Manager Plus 6.1.6. A user, with the level Operator, can see all SSH servers (and user information) even if no SSH server or user is associated to the operator.
|
[] | null | 4.3 | null | null | null |
|
CVE-2010-1799
|
Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.
|
[
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:*:*:ja:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:java:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:vista:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:windows_sp_2:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:windows_vista:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:windows_xp:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:windows_xp_sp2:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:windows:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-8fmw-29w8-grr7
|
Unspecified vulnerability in the Oracle iProcurement component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect integrity via unknown vectors related to Redirection.
|
[] | null | null | null | null | null |
|
CVE-2021-42664
|
A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
|
[
"cpe:2.3:a:engineers_online_portal_project:engineers_online_portal:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-fm87-mh9v-3658
|
The Snapshot Backup WordPress plugin through 2.1.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
|
[] | null | 4.7 | null | null | null |
|
GHSA-q7xm-7x78-ppqp
|
The license-installation module in Cisco NX-OS on Nexus 1000V devices allows local users to execute arbitrary commands via crafted "install license" arguments, aka Bug ID CSCuh30824.
|
[] | null | null | null | null | null |
|
GHSA-9mfx-rmx2-gvrc
|
IBM iNotes 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998824.
|
[] | null | null | 6.1 | null | null |
|
GHSA-7p76-mrph-qq8g
|
SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.
|
[] | null | null | 7.5 | null | null |
|
CVE-2021-25659
|
A vulnerability has been identified in Automation License Manager 5 (All versions), Automation License Manager 6 (All versions < V6.0 SP9 Update 2). Sending specially crafted packets to port 4410/tcp of an affected system could lead to extensive memory being consumed and as such could cause a denial-of-service preventing legitimate users from using the system.
|
[
"cpe:2.3:a:siemens:automation_license_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2021-44238
|
AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE) via /aya/module/admin/ust_tab_e.inc.php,
|
[
"cpe:2.3:a:ayacms_project:ayacms:3.1.2:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
GHSA-4pff-25fv-cm83
|
Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
|
[] | null | 5 | null | null | null |
|
GHSA-7pjx-r98g-p4qj
|
The web-based management interfaces in Sourcefire Defense Center (DC) and 3D Sensor before 4.8.2 allow remote authenticated users to gain privileges via a $admin value for the admin parameter in an edit action to admin/user/user.cgi and unspecified other components.
|
[] | null | null | null | null | null |
|
GHSA-whjp-5gj5-fqm7
|
Cisco Wireless LAN Controller (WLC) devices with software 7.5(102.0) and 7.6(1.62) allow remote attackers to cause a denial of service (device crash) by triggering an exception during attempted forwarding of unspecified IPv6 packets to a non-IPv6 device, aka Bug ID CSCuj01046.
|
[] | null | null | null | null | null |
|
CVE-2015-6401
|
Cisco EPC3928 devices with EDVA 5.5.10, 5.5.11, and 5.7.1 allow remote attackers to bypass an intended authentication requirement and execute unspecified administrative functions via a crafted HTTP request, aka Bug ID CSCux24941.
|
[
"cpe:2.3:o:cisco:epc3928_docsis_3.0_8x4_wireless_residential_gateway_with_embedded_digital_voice_adapter:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:epc3928_docsis_3.0_8x4_wireless_residential_gateway_with_embedded_digital_voice_adapter:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:epc3928_docsis_3.0_8x4_wireless_residential_gateway_with_embedded_digital_voice_adapter:5.7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-4633
|
IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.
|
[
"cpe:2.3:a:ibm:resilient_security_orchestration_automation_and_response:38.0:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
CVE-2023-39445
|
Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an unauthenticated attacker to execute arbitrary code by sending a specially crafted file to the product's certain management console.
|
[
"cpe:2.3:h:logitec:lan-wh300n_re:*:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1467ghbk-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1467ghbk-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1467ghbk-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1467ghbk-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1900ghbk-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1900ghbk-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1900ghbk-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1900ghbk-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-600ghbk-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-600ghbk-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-733febk2-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-733febk2-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-f1167acf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-f1167acf2:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-34167
|
Uncontrolled search path for the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*"
] | 5.4 | 6.7 | null | null | null |
|
GHSA-2jpr-j4c2-5fwj
|
SQL injection vulnerability in news.php in gCards version 1.43 allows remote attackers to execute arbitrary SQL commands via the limit parameter.
|
[] | null | null | null | null | null |
|
CVE-2006-4486
|
Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.
|
[
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
CVE-2025-7079
|
mao888 bluebell-plus JWT Token jwt.go hard-coded password
|
A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
|
[] | 6.3 | 3.7 | 3.7 | 2.6 | null |
RHSA-2024:7670
|
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update
|
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication protobuf: StackOverflow vulnerability in Protocol Buffers graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
|
[
"cpe:/a:redhat:quarkus:3.8::el8"
] | null | 8.8 | null | null | null |
cisco-sa-ucs-invcert-eOpRvCKH
|
Cisco Unified Computing System Central Software Improper Certificate Validation Vulnerability
|
A vulnerability in the certificate registration process of Cisco Unified Computing System (UCS) Central Software could allow an authenticated, adjacent attacker to register a rogue Cisco Unified Computing System Manager (UCSM).
This vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to the registration API. A successful exploit could allow the attacker to register a rogue Cisco UCSM and gain access to Cisco UCS Central Software data and Cisco UCSM inventory data.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-invcert-eOpRvCKH ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-invcert-eOpRvCKH"]
|
[] | null | 4.3 | null | null | null |
GHSA-h8g4-6mrj-mfm8
|
In the Linux kernel, the following vulnerability has been resolved:bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queuesWhen running `test_sockmap` selftests, the following warning appears:WARNING: CPU: 2 PID: 197 at net/core/stream.c:205 sk_stream_kill_queues+0xd3/0xf0
Call Trace:
<TASK>
inet_csk_destroy_sock+0x55/0x110
tcp_rcv_state_process+0xd28/0x1380
? tcp_v4_do_rcv+0x77/0x2c0
tcp_v4_do_rcv+0x77/0x2c0
__release_sock+0x106/0x130
__tcp_close+0x1a7/0x4e0
tcp_close+0x20/0x70
inet_release+0x3c/0x80
__sock_release+0x3a/0xb0
sock_close+0x14/0x20
__fput+0xa3/0x260
task_work_run+0x59/0xb0
exit_to_user_mode_prepare+0x1b3/0x1c0
syscall_exit_to_user_mode+0x19/0x50
do_syscall_64+0x48/0x90
entry_SYSCALL_64_after_hwframe+0x44/0xaeThe root case is in commit 84472b436e76 ("bpf, sockmap: Fix more uncharged
while msg has more_data"), where I used msg->sg.size to replace the tosend,
causing breakage:if (msg->apply_bytes && msg->apply_bytes < tosend)
tosend = psock->apply_bytes;
|
[] | null | null | null | null | null |
|
CVE-2023-21451
|
A Stack-based overflow vulnerability in IpcRxEmbmsSessionList in SECRIL prior to Android S(12) allows attacker to cause memory corruptions.
|
[
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-2p82-m3fp-gp3x
|
Execution with Unnecessary Privileges vulnerability in Bitdefender Endpoint Security Tools, Total Security allows a local attacker to elevate to 'NT AUTHORITY\System. Impersonation enables the server thread to perform actions on behalf of the client but within the limits of the client's security context. This issue affects: Bitdefender Endpoint Security Tools versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 25.0.26.
|
[] | null | 7.8 | null | null | null |
|
GHSA-5v7x-9h3r-vmfx
|
Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote authenticated users to bypass intended privilege requirements and list the privileges of arbitrary users via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2021-25673
|
A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, the application could enter an infinite loop, become unresponsive and must be restarted to restore the service.
|
[
"cpe:2.3:a:siemens:simatic_s7-plcsim:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 | null |
|
GHSA-fhhf-3xm2-h9f8
|
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-0822
|
An elevation of privilege vulnerability exists when the Windows Language Pack Installer improperly handles file operations, aka 'Windows Language Pack Installer Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2016-4671
|
An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) via a crafted PDF file.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2023-23886
|
WordPress WP-RecentComments plugin <= 2.2.7 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in mg12 WP-RecentComments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-RecentComments: from n/a through 2.2.7.
|
[] | null | 5.4 | null | null | null |
CVE-2024-53848
|
check-jsonschema default caching for remote schemas allows for cache confusion
|
check-jsonschema is a CLI and set of pre-commit hooks for jsonschema validation. The default cache strategy uses the basename of a remote schema as the name of the file in the cache, e.g. `https://example.org/schema.json` will be stored as `schema.json`. This naming allows for conflicts. If an attacker can get a user to run `check-jsonschema` against a malicious schema URL, e.g., `https://example.evil.org/schema.json`, they can insert their own schema into the cache and it will be picked up and used instead of the appropriate schema. Such a cache confusion attack could be used to allow data to pass validation which should have been rejected. This issue has been patched in version 0.30.0. All users are advised to upgrade. A few workarounds exist: 1. Users can use `--no-cache` to disable caching. 2. Users can use `--cache-filename` to select filenames for use in the cache, or to ensure that other usages do not overwrite the cached schema. (Note: this flag is being deprecated as part of the remediation effort.) 3. Users can explicitly download the schema before use as a local file, as in `curl -LOs https://example.org/schema.json; check-jsonschema --schemafile ./schema.json`
|
[] | null | 7.1 | null | null | null |
GHSA-r8f7-9pfq-mjmv
|
Improper Certificate Validation in node-sass
|
Certificate validation in node-sass 2.0.0 to 6.0.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
|
[] | null | 5.3 | null | null | null |
GHSA-2237-8cw9-xj7q
|
Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.
|
[] | null | null | 9.8 | null | null |
|
CVE-2006-3875
|
Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, and Excel Viewer 2003 allows user-assisted attackers to execute arbitrary code via a crafted COLINFO record in an XLS file, a different vulnerability than CVE-2006-2387 and CVE-2006-3867.
|
[
"cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2004:*:mac_os_x:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:x:*:mac_os_x:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
RHSA-2025:4449
|
Red Hat Security Advisory: xmlrpc-c security update
|
libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.5 | null | null | null |
GHSA-383j-f5vg-3hcm
|
In the Linux kernel, the following vulnerability has been resolved:ext4: check stripe size compatibility on remount as wellWe disable stripe size in __ext4_fill_super if it is not a multiple of
the cluster ratio however this check is missed when trying to remount.
This can leave us with cases where stripe < cluster_ratio after
remount:set making EXT4_B2C(sbi->s_stripe) become 0 that can cause some
unforeseen bugs like divide by 0.Fix that by adding the check in remount path as well.
|
[] | null | 5.5 | null | null | null |
|
GHSA-2w4f-8m3p-jrxr
|
A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
|
[] | null | 6.1 | null | null | null |
|
GHSA-v7v4-vj4g-88wh
|
In older versions of Sendmail, an attacker could use a pipe character to execute root commands.
|
[] | null | null | null | null | null |
|
GHSA-vh98-48jw-fxwj
|
A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.
|
[] | 5.2 | 7 | null | null | null |
|
CVE-2021-29218
|
A local unquoted search path security vulnerability has been identified in HPE Agentless Management Service for Windows version(s): Prior to 1.44.0.0, 10.96.0.0. This vulnerability could be exploited locally by a user with high privileges to execute malware that may lead to a loss of confidentiality, integrity, and availability. HPE has provided software updates to resolve the vulnerability in HPE Agentless Management Service for Windows.
|
[
"cpe:2.3:a:hpe:agentless_management:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*",
"cpe:2.3:a:hpe:proliant_agentless_management:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_2000_gen_10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_480_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_620_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_660_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:synergy_680_gen9:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
CVE-2025-51863
|
Self Cross Site Scripting (XSS) vulnerability in ChatGPT Unli (ChatGPTUnli.com) thru 2025-05-26 allows attackers to execute arbitrary code via a crafted SVG file to the chat interface.
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-40687
|
WordPress Creative Mail plugin <= 1.5.4 - Cross-Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Creative Mail plugin <= 1.5.4 on WordPress.
|
[
"cpe:2.3:a:constantcontact:creative_mail:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-vg7f-w97j-m6x9
|
Open Faculty Evaluation System 5.6 for PHP 5.6 allows submit_feedback.php SQL Injection, a different vulnerability than CVE-2018-18758.
|
[] | null | null | 9.8 | null | null |
|
GHSA-pfc4-45pm-vm6j
|
The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579.
|
[] | null | null | null | null | null |
|
GHSA-pg93-pcp9-c63j
|
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls Code Flow starting at STDUJBIG2File!DllGetClassObject+0x0000000000002f35."
|
[] | null | null | 7.8 | null | null |
|
CVE-2001-0897
|
Cross-site scripting vulnerability in Infopop Ultimate Bulletin Board (UBB) before 5.47e allows remote attackers to steal user cookies via an [IMG] tag that references an about: URL with an onerror field.
|
[
"cpe:2.3:a:infopop:ultimate_bulletin_board:-:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.04:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.05:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.75:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.03:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.04:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.05:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.06:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.07:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.50:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.52:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.53:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.75:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.80:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.81:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.82:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.83:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.84:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.85:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.86:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.00:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.08:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.28:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.35:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.37:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:d:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:d:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:d:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-21848
|
Users maintain access to active call after being removed from a channel
|
Improper Access Control in Mattermost Server versions 8.1.x before 8.1.11 allows an attacker that is in a channel with an active call to keep participating in the call even if they are removed from the channel
|
[
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
CVE-2005-1188
|
Cross-site scripting (XSS) vulnerability in comersus_searchItem.asp in Comersus 3.90 to 4.51 allows remote attackers to inject arbitrary web script or HTML via the curPage parameter.
|
[
"cpe:2.3:a:comersus_open_technologies:comersus_cart:3.90:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.47:*:*:*:*:*:*:*",
"cpe:2.3:a:comersus_open_technologies:comersus_cart:4.051:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-h2w9-3qj3-7rf9
|
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.
|
[] | null | null | null | null | null |
|
CVE-2022-2263
|
Online Hotel Booking System Room edit_room_cat.php sql injection
|
A vulnerability was found in Online Hotel Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file edit_room_cat.php of the component Room Handler. The manipulation of the argument roomname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:online_hotel_booking_project:online_hotel_booking:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
GHSA-6xvx-4wxq-vvfv
|
The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to SQL Injection via the 'search' parameter in all versions up to, and including, 6.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 6.5 | null | null | null |
|
GHSA-pqhp-4xfc-hjgq
|
An issue was discovered in Couchbase Sync Gateway before 3.2.6. In sgcollect_info_options.log and sync_gateway.log, there are cleartext passwords in redacted and unredacted output.
|
[] | null | 7.3 | null | null | null |
|
CVE-2023-36531
|
WordPress LiquidPoll plugin <= 3.3.68 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in LiquidPoll LiquidPoll – Advanced Polls for Creators and Brands allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LiquidPoll – Advanced Polls for Creators and Brands: from n/a through 3.3.68.
|
[] | null | 4.3 | null | null | null |
CVE-2023-45650
|
WordPress HTML5 Maps Plugin <= 1.7.1.4 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin <= 1.7.1.4 versions.
|
[
"cpe:2.3:a:fla-shop:html5_maps:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.