id
string
title
string
description
string
cpes
list
cvss_v4_0
float64
cvss_v3_1
float64
cvss_v3_0
float64
cvss_v2_0
float64
patch_commit_url
string
GHSA-gr87-q8xh-gq3c
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
[]
null
8.6
null
null
null
GHSA-hwwp-f5jr-p8g6
Barco ClickShare Button R9861500D01 devices before 1.9.0 have Improper Following of a Certificate's Chain of Trust. The embedded 'dongle_bridge' program used to expose the functionalities of the ClickShare Button to a USB host, does not properly validate the whole certificate chain.
[]
null
null
null
null
null
GHSA-hfqm-jfc6-rh2f
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
[]
null
8.3
null
null
null
ICSA-18-088-02
Siemens TIM 1531 IRC
A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.
[]
null
9.8
null
null
null
GHSA-4276-cm8c-788h
Mattermost Fails to Properly Validate Team Role Modification
Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail to properly validate authorization for team scheme role modifications which allows Team Admins to demote Team Members to Guests via the PUT /api/v4/teams/team-id/members/user-id/schemeRoles API endpoint.
[]
null
3.8
null
null
null
CVE-2020-27459
Chronoforeum 2.0.11 allows Stored XSS vulnerabilities when inserting a crafted payload into a post. If any user sees the post, the inserted XSS code is executed.
[ "cpe:2.3:a:chronoengine:chronoforums:2.0.11:*:*:*:*:joomla:*:*" ]
null
6.1
null
4.3
null
CVE-2018-9373
In TdlsexRxFrameHandle of the MTK WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
8.8
null
null
null
CVE-2007-0978
Buffer overflow in swcons in IBM AIX 5.3 allows local users to gain privileges via long input data.
[ "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-whx6-754g-3x5v
An open redirect flaw was found in Kibana versions before 7.13.0 and 6.8.16. If a logged in user visits a maliciously crafted URL, it could result in Kibana redirecting the user to an arbitrary website.
[]
null
6.1
null
null
null
GHSA-34h5-p5c9-pjw6
libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
[]
null
null
null
null
null
GHSA-cxgc-jm76-g3rq
Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device.
[]
null
9.8
null
null
null
GHSA-cc2p-6hmp-4729
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.
[]
null
10
null
null
null
CVE-2023-0459
Copy_from_user Spectre-V1 Gadget in Linux Kernel
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2022-1297
Out-of-bounds Read in r_bin_ne_get_entrypoints function in radareorg/radare2
Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.
[ "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*" ]
null
null
6.6
null
null
CVE-2007-5635
Multiple unspecified vulnerabilities in Salford Software Support Incident Tracker (SiT!) before 3.30 have unknown impact and attack vectors.
[ "cpe:2.3:a:sitracker:support_incident_tracker:*:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:1.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:2.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.03:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.03a:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.04a:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.05:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.06:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07.1:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07.2:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07.3:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.08:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.08.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.09:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.14:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.15:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.16:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.17:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.18:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.19:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.22:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.22pl1:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.23:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta-2:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta2:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:10.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:11.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:14.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:16.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:17.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:18.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:21.8.00:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2017-12180
xorg-x11-server before 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-9r5h-92x4-fxx8
A vulnerability in SonicWall Global Management System (GMS), allow a remote user to gain access to the appliance using existing SSH key. This vulnerability affects GMS versions 9.1, 9.0, 8.7, 8.6, 8.4, 8.3 and earlier.
[]
null
null
null
null
null
GHSA-66vp-2r7p-72g5
LibreNMS v1.54 has XSS in the Create User, Inventory, Add Device, Notifications, Alert Rule, Create Maintenance, and Alert Template sections of the admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account.
[]
null
null
5.4
null
null
GHSA-6m79-wr3w-fx7c
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 1.7.1001 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2023-6456
WP Review Slider < 13.0 - Admin+ Stored XSS
The WP Review Slider WordPress plugin before 13.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:ljapps:wp_review_slider:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
null
GHSA-h9h6-5fw6-j683
In the Linux kernel, the following vulnerability has been resolved:cifs: Fix integer overflow while processing acdirmax mount optionUser-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow.Found by Linux Verification Center (linuxtesting.org) with SVACE.
[]
null
5.5
null
null
null
GHSA-3vc7-3jff-2j8g
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.
[]
null
null
null
null
null
CVE-2019-2192
In call of SliceProvider.java, there is a possible permissions bypass due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-138441555
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2001-0083
Windows Media Unicast Service in Windows Media Services 4.0 and 4.1 does not properly shut down some types of connections, producing a memory leak that allows remote attackers to cause a denial of service via a series of severed connections, aka the "Severed Windows Media Server Connection" vulnerability.
[ "cpe:2.3:a:microsoft:windows_media_services:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_media_services:4.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-xr9p-qj4x-c6c7
The ICQ Webserver allows remote attackers to use .. to access arbitrary files outside of the user's personal directory.
[]
null
null
null
null
null
GHSA-vccg-pg4r-fjxh
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozy Vision SMS Alert Order Notifications – WooCommerce allows SQL Injection. This issue affects SMS Alert Order Notifications – WooCommerce: from n/a through 3.7.8.
[]
null
9.3
null
null
null
GHSA-g7rj-q722-245g
jsreport vulnerable to code injection
jsreport prior to 3.11.3 had a version of vm2 vulnerable to CVE-2023-29017 hard coded in the package.json of the jsreport-core component. An attacker can use this vulnerability to obtain the authority of the jsreport playground server, or construct a malicious webpage/html file and send it to the user to attack the installed jsreport client.
[]
null
10
null
null
null
CVE-2023-49771
WordPress Smart External Link Click Monitor [Link Log] Plugin <= 5.0.2 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Raschendorfer Smart External Link Click Monitor [Link Log] allows Reflected XSS.This issue affects Smart External Link Click Monitor [Link Log]: from n/a through 5.0.2.
[ "cpe:2.3:a:petersplugins:link_log:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
GHSA-gm5x-fp34-xg96
In Resource Power Manager (RPM) in all Android releases from CAF using the Linux kernel, an Improper Access Control vulnerability could potentially exist.
[]
null
null
7.8
null
null
GHSA-7j3m-w8mw-wq27
IBM QRadar 7.2 could allow a remote attacker to consume all resources on the server due to not properly restricting the size or amount of resources requested by an actor. IBM Reference #: 1999556.
[]
null
null
7.5
null
null
CVE-2011-2292
Unspecified vulnerability in Oracle Solaris 9 and 11 Express allows local users to affect confidentiality and integrity via unknown vectors related to xscreensaver.
[ "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11_express:*:*:*:*:*:*:*" ]
null
null
null
2.4
null
CVE-2023-40400
This issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. A remote user may cause an unexpected app termination or arbitrary code execution.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-mmv2-mgrh-jx77
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are Prior to 5.0.34 and Prior to 5.1.16. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N).
[]
null
null
7.5
null
null
GHSA-798p-53r7-mgw9
Jenkins HipChat Plugin allows attackers with Overall/Read access to obtain credential IDs
An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins. As of version 2.2.1, an enumeration of credentials IDs in this plugin requires Overall/Administer permission.
[]
null
null
6.5
null
null
GHSA-vxc2-696q-6c9j
fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
[]
null
5.5
null
null
null
RHSA-2014:0563
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update
JBossSX/PicketBox: World readable audit.log file
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
null
CVE-2024-11060
Jinher Network Collaborative Management Platform 金和数字化智能办公平台 AcceptShow.aspx sql injection
A vulnerability classified as critical has been found in Jinher Network Collaborative Management Platform 金和数字化智能办公平台 1.0. Affected is an unknown function of the file /C6/JHSoft.Web.AcceptAip/AcceptShow.aspx/. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:jinher_network:collaborative_management_platform:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
GHSA-82f7-mq8m-2w9x
An authentication-bypass issue was discovered on D-Link DAP-1522 devices 1.4x before 1.10b04Beta02. There exist a few pages that are directly accessible by any unauthorized user, e.g., logout.php and login.php. This occurs because of checking the value of NO_NEED_AUTH. If the value of NO_NEED_AUTH is 1, the user has direct access to the webpage without any authentication. By appending a query string NO_NEED_AUTH with the value of 1 to any protected URL, any unauthorized user can access the application directly, as demonstrated by bsc_lan.php?NO_NEED_AUTH=1.
[]
null
null
null
null
null
GHSA-p92q-7fhh-mq35
Cross-Site Request Forgery in Jenkins
Jenkins 2.329 and earlier, LTS 2.319.1 and earlier does not require POST requests for the HTTP endpoint handling manual build requests when no security realm is set, resulting in a cross-site request forgery (CSRF) vulnerability.This vulnerability allows attackers to trigger build of job without parameters.Jenkins 2.330, LTS 2.319.2 requires POST requests for the affected HTTP endpoint.
[]
null
4.3
null
null
null
GHSA-2fjm-5v6j-7r68
NETGEAR ProSAFE Network Management System saveNodeLabel Cross-Site Scripting Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Minimal user interaction is required to exploit this vulnerability.The specific flaw exists within the saveNodeLabel method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-21838.
[]
null
null
8
null
null
CVE-2005-3436
Cross-site scripting (XSS) vulnerability in Nuked-Klan 1.7 allows remote attackers to inject arbitrary web script or HTML via the (1) Search module, (2) certain edit fields in Guestbook, (3) the title in the Forum module, and (4) Textbox.
[ "cpe:2.3:a:nuked-klan:nuked-klan:1.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-8rp7-48wf-f389
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
6.1
null
null
null
CVE-2015-0304
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
[ "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-hhqj-m4pc-9w3p
In Joomla! 1.5.0 through 3.6.5 (fixed in 3.7.0), mail sent using the JMail API leaked the used PHPMailer version in the mail headers.
[]
null
null
5.3
null
null
CVE-2024-3766
slowlyo OwlAdmin Image File Upload upload_image cross site scripting
A vulnerability, which was classified as problematic, has been found in slowlyo OwlAdmin up to 3.5.7. Affected by this issue is some unknown functionality of the file /admin-api/upload_image of the component Image File Upload. The manipulation of the argument file leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-260606 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:slowlyo:owladmin:3.5.7:*:*:*:*:*:*:*" ]
null
2.4
2.4
3.3
null
GHSA-fjj7-rgph-3r38
AuraCMS 2.3 allows XSS via a Bukutamu -> AddGuestbook action.
[]
null
null
5.4
null
null
CVE-2017-2842
In the web management interface in Foscam C1 Indoor HD Camera running application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary data in the "msmtprc" configuration file resulting in command execution. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
[ "cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*", "cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2014-5198
Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.1.x before 6.1.3 allows remote attackers to inject arbitrary web script or HTML via the Referer HTTP header.
[ "cpe:2.3:a:splunk:splunk:6.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:splunk:splunk:6.1.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:splunk:splunk:6.1.2:*:*:*:enterprise:*:*:*" ]
null
null
null
4.3
null
CVE-2020-5863
In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API can create unprivileged user accounts. The user which is created is only able to upload a new license to the system but cannot view or modify any other components of the system.
[ "cpe:2.3:a:f5:nginx_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:nginx_controller:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*" ]
null
8.6
null
7.5
null
GHSA-475v-6wxg-c2rx
In Webgalamb through 7.0, system/ajax.php functionality is supposed to be available only to the administrator. However, by using one of the bgsend, atment_sddd1xGz, or xls_bgimport query parameters, most of these methods become available to unauthenticated users.
[]
null
null
9.8
null
null
GHSA-33rc-m7p4-wf36
An issue was discovered on Samsung mobile devices with N(7.1), O(8.x), and P(9.0) software. Gallery has uninitialized memory disclosure. The Samsung ID is SVE-2018-13060 (February 2019).
[]
null
null
null
null
null
CVE-2021-30015
There is a Null Pointer Dereference in function filter_core/filter_pck.c:gf_filter_pck_new_alloc_internal in GPAC 1.0.1. The pid comes from function av1dmx_parse_flush_sample, the ctx.opid maybe NULL. The result is a crash in gf_filter_pck_new_alloc_internal.
[ "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2020-10702
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2014:1881
Red Hat Security Advisory: java-1.5.0-ibm security update
JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
null
GHSA-xqvg-mhw9-7644
In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion.
[]
null
null
null
null
null
RHSA-2021:0719
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.0.8 security and bug fix update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:acm:2.0::el8" ]
null
8.6
null
null
null
CVE-2024-11343
Telerik Document Processing Path Traversal
In Progress® Telerik® Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access.
[]
null
8.3
null
null
null
GHSA-f4vr-vf84-mp3m
The AForms Eats plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.3.1. This is due the /vendor/aura/payload-interface/phpunit.php file being publicly accessible and displaying error messages. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
[]
null
5.3
null
null
null
GHSA-v5wh-r46x-75cp
Memory corruption while processing TPC target power table in FTM TPC.
[]
null
8.4
null
null
null
CVE-2024-28682
DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /dede/sys_cache_up.php.
[ "cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
GHSA-hj84-vp9x-mmqq
Untrusted search path vulnerability in CDisplay 1.8.1 allows local users to gain privileges via a Trojan horse TRACE32.DLL file in the current working directory, as demonstrated by a directory that contains a .cba file. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
ICSA-19-260-03
Honeywell Performance IP Cameras and Performance NVRs
The integrated web server of the affected devices could allow remote attackers to obtain web configuration data in JSON format for IP cameras and NVRs (Network Video Recorders), which can be accessed without authentication over the network.CVE-2019-13523 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
5.3
null
null
CVE-2013-2622
Cross-site Scripting (XSS) in UebiMiau 2.7.11 and earlier allows remote attackers to inject arbitrary web script or HTML via the "selected_theme" parameter in error.php.
[ "cpe:2.3:a:uebimiau:uebimiau:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2022-1095
Mihdan: No External Links < 5.0.2 - Admin+ Stored Cross-Site Scripting
The Mihdan: No External Links WordPress plugin before 5.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:mihdan\\:_no_external_links_project:mihdan\\:_no_external_links:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
null
GHSA-g25r-jvm6-wcv9
Memory corruption while reading a type value from a buffer controlled by the Guest Virtual Machine.
[]
null
7.8
null
null
null
CVE-2024-5787
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) <= 2.7.20 - Authenticated (Contributor+) Stored Cross-Site Scripting via Link Effects Widget
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's Link Effects widget in all versions up to, and including, 2.7.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
null
GHSA-gwgp-7jjg-774v
SAP NetWeaver Application Server ABAP allows an unauthenticated attacker with network access to read files from the server, which otherwise would be restricted.This attack is possible only if a Web Dispatcher or some sort of Proxy Server is in use and the file in question was previously opened or downloaded in an application based on SAP GUI for HTML Technology. This will not compromise the application's integrity or availability.
[]
null
4.3
null
null
null
CVE-2024-38073
Windows Remote Desktop Licensing Service Denial of Service Vulnerability
Windows Remote Desktop Licensing Service Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2023-1424
Denial-of-Service and Remote Code Execution Vulnerability in MELSEC Series CPU module
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.
[ "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\\/dss_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\\/dss:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\\/es_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\\/es:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\\/ess_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\\/ess:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mt\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\\/dss_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mt\\/dss:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\\/es_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mt\\/es:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\\/ess_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mt\\/ess:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mr\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mr\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mr\\/dss_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mr\\/dss:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mr\\/es_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mr\\/es:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mr\\/ess_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mr\\/ess:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mt\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mt\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mt\\/dss_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mt\\/dss:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mt\\/es_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mt\\/es:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-64mt\\/ess_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-64mt\\/ess:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mr\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mr\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mr\\/dss_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mr\\/dss:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mr\\/es_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mr\\/es:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mr\\/ess_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mr\\/ess:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mt\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mt\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mt\\/dss_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mt\\/dss:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mt\\/es_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mt\\/es:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-80mt\\/ess_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-80mt\\/ess:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-32mr\\/dds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-32mr\\/dds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-32mr\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-32mr\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-32mr\\/ds-ts_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-32mr\\/ds-ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-32mt\\/dds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-32mt\\/dds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-32mt\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-32mt\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-32mt\\/dss-ts_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-32mt\\/dss-ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-32mt\\/ds-ts_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-32mt\\/ds-ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-64mr\\/dds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-64mr\\/dds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-64mr\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-64mr\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-64mt\\/dds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-64mt\\/dds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-64mt\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-64mt\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-96mr\\/dds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-96mr\\/dds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-96mr\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-96mr\\/ds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-96mt\\/dds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-96mt\\/dds:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-fx5uc-96mt\\/ds_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-fx5uc-96mt\\/ds:-:*:*:*:*:*:*:*" ]
null
10
null
null
null
GHSA-6wfm-7hqx-39wg
libxml2, possibly before 2.5.0, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, aka the "billion laughs attack."
[]
null
6.5
null
null
null
CVE-2024-8676
Cri-o: checkpoint restore can be triggered from different namespaces
A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift:4.16::el8", "cpe:/a:redhat:openshift:4.16::el9", "cpe:/a:redhat:openshift:4.17::el9", "cpe:/a:redhat:openshift:4.18::el8", "cpe:/a:redhat:openshift:4.18::el9", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9", "cpe:/a:redhat:openshift:3.11", "cpe:/a:redhat:openshift:4" ]
null
7.4
null
null
null
GHSA-44mr-8vmm-wjhg
Wasmtime out of bounds read/write with zero-memory-pages configuration
ImpactThere is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration the virtual memory mapping for WebAssembly memories did not meet the compiler-required configuration requirements for safely executing WebAssembly modules. Wasmtime's default settings require virtual memory page faults to indicate that wasm reads/writes are out-of-bounds, but the pooling allocator's configuration would not create an appropriate virtual memory mapping for this meaning out of bounds reads/writes can successfully read/write memory unrelated to the wasm sandbox within range of the base address of the memory mapping created by the pooling allocator.This bug can only be triggered by setting [`InstanceLimits::memory_pages`](https://docs.rs/wasmtime/2.0.1/wasmtime/struct.InstanceLimits.html#structfield.memory_pages) to zero. This is expected to be a very rare configuration since this means that wasm modules cannot allocate any pages of linear memory. All wasm modules produced by all current toolchains are highly likely to use linear memory, so it's expected to be unlikely that this configuration is set to zero by any production embedding of Wasmtime, hence the low severity of this bug despite the critical consequences.PatchesThis bug has been patched and users should upgrade to Wasmtime 2.0.2.WorkaroundsOne way to mitigate this issue is to disable usage of the pooling allocator. Note that the pooling allocator is not enabled by default.This bug can also only be worked around by increasing the `memory_pages` allotment when configuring the pooling allocator to a value greater than zero. If an embedding wishes to still prevent memory from actually being used then the `Store::limiter` method can be used to dynamically disallow growth of memory beyond 0 bytes large. Note that the default `memory_pages` value is greater than zero.This bug is not applicable with the default settings of the `wasmtime` crate.References[`Config::allocation_strategy`](https://docs.rs/wasmtime/2.0.1/wasmtime/struct.Config.html#method.allocation_strategy) - configuration required to enable the pooling allocator.[`InstanceLimits::memory_pages`](https://docs.rs/wasmtime/2.0.1/wasmtime/struct.InstanceLimits.html#structfield.memory_pages) - configuration field that, when zero, exhibits this bug.[`Store::limiter`](https://docs.rs/wasmtime/2.0.1/wasmtime/struct.Store.html#method.limiter) - means of limiting memory without using `memory_pages`[Mailing list announcement](https://groups.google.com/a/bytecodealliance.org/g/sec-announce/c/c1HBDDJwNPA)[Patch for the `release-2.0.0` branch](https://github.com/bytecodealliance/wasmtime/commit/e60c3742904ccbb3e26da201c9221c38a4981d72)For more informationIf you have any questions or comments about this advisory:Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)Open an issue in [the bytecodealliance/wasmtime repository](https://github.com/bytecodealliance/wasmtime/)
[]
null
5.9
null
null
null
CVE-2020-15919
A Reflected Cross Site Scripting (XSS) vulnerability was discovered in Mida eFramework through 2.9.0.
[ "cpe:2.3:a:midasolutions:eframework:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2025-8793
LitmusChaos Litmus resource injection
A vulnerability classified as problematic was found in LitmusChaos Litmus up to 3.19.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument projectID leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
4.3
4
null
CVE-2025-25897
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'ip' parameter at /userRpm/WanStaticIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
[]
null
7.5
null
null
null
CVE-2025-22562
WordPress Title Experiments Free plugin <= 9.0.4 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Jason Funk Title Experiments Free allows Cross Site Request Forgery.This issue affects Title Experiments Free: from n/a through 9.0.4.
[]
null
4.3
null
null
null
GHSA-pxrp-mf2c-8q6p
The adsense-plugin (aka Google AdSense) plugin before 1.44 for WordPress has multiple XSS issues.
[]
null
null
6.1
null
null
GHSA-5cr2-3qp3-5h49
Moxa MGate MB3180 before 1.8, MGate MB3280 before 2.7, MGate MB3480 before 2.6, MGate MB3170 before 2.5, and MGate MB3270 before 2.7 use weak encryption, which allows remote attackers to bypass authentication via a brute-force series of guesses for a parameter value.
[]
null
9.8
null
null
null
CVE-2001-0607
asecure as included with HP-UX 10.01 through 11.00 can allow a local attacker to create a denial of service and gain additional privileges via unsafe permissions on the asecure program, a different vulnerability than CVE-2000-0083.
[ "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2017-6320
A remote command injection vulnerability exists in the Barracuda Load Balancer product line (confirmed on v5.4.0.004 (2015-11-26) and v6.0.1.006 (2016-08-19); fixed in 6.1.0.003 (2017-01-17)) in which an authenticated user can execute arbitrary shell commands and gain root privileges. The vulnerability stems from unsanitized data being processed in a system call when the delete_assessment command is issued.
[ "cpe:2.3:a:barracuda:load_balancer_adc:*:*:*:*:*:*:*:*" ]
null
8.8
null
9
null
GHSA-xfjm-p2hj-x3rp
Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HLink record in an Excel file, aka "Excel Buffer Overwrite Vulnerability."
[]
null
null
null
null
null
CVE-2012-5963
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that lacks a :: (colon colon) in a UDP packet.
[ "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.3.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2022-44731
A vulnerability has been identified in SIMATIC WinCC OA V3.15 (All versions < V3.15 P038), SIMATIC WinCC OA V3.16 (All versions < V3.16 P035), SIMATIC WinCC OA V3.17 (All versions < V3.17 P024), SIMATIC WinCC OA V3.18 (All versions < V3.18 P014). The affected component allows to inject custom arguments to the Ultralight Client backend application under certain circumstances. This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attacker's credentials or start a Ctrl script).
[ "cpe:2.3:a:siemens:simatic_wincc_oa:3.15:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_oa:3.16:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_oa:3.17:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_oa:3.18:-:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2025-23642
WordPress Sidebar-Content from Shortcode plugin <= 2.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pflonk Sidebar-Content from Shortcode allows DOM-Based XSS.This issue affects Sidebar-Content from Shortcode: from n/a through 2.0.
[]
null
6.5
null
null
null
cisco-sa-cmxpe-75Asy9k
Cisco Connected Mobile Experiences Privilege Escalation Vulnerability
A vulnerability in Cisco Connected Mobile Experiences (CMX) could allow a remote, authenticated attacker without administrative privileges to alter the password of any user on an affected system. The vulnerability is due to incorrect handling of authorization checks for changing a password. An authenticated attacker without administrative privileges could exploit this vulnerability by sending a modified HTTP request to an affected device. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
8.8
null
null
null
GHSA-h29g-wjxj-4f3f
Stack-based buffer overflow in Triologic Media Player 8.0.0.0 allows user-assisted remote attackers to execute arbitrary code via a long string in a .m3l playlist file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-rxrh-5q44-42x7
An issue was discovered in zzcms 8.3. SQL Injection exists in zs/zs_list.php via a pxzs cookie.
[]
null
null
9.8
null
null
CVE-2011-4900
TYPO3 before 4.5.4 allows Information Disclosure in the backend.
[ "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
GHSA-wjx9-grq7-pwj2
Vulnerability in iPlanet Web Server 4 included in Virtualvault Operating System (VVOS) 4.0 running HP-UX 11.04 could allow attackers to corrupt data.
[]
null
null
null
null
null
GHSA-6jpg-grj3-vm57
Unspecified vulnerability in the SIP implementation in Cisco IOS 12.3 and 12.4 allows remote attackers to execute arbitrary code via a malformed SIP message, aka Bug ID CSCsz89904, the "SIP Packet Parsing Arbitrary Code Execution Vulnerability."
[]
null
null
null
null
null
GHSA-37rp-g4f8-jx53
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.4.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
null
5.3
null
null
null
CVE-2006-2888
PHP remote file inclusion vulnerability in _wk/wk_lang.php in Wikiwig 4.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the WK[wkPath] parameter.
[ "cpe:2.3:a:wikiwig:wikiwig:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wikiwig:wikiwig:4.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-3948
Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM.
[ "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2005-1606
H-Sphere Winbox 2.4.2 and 2.4.3 RC1 stores sensitive information such as username and password in plaintext in world-readable log files, which allows local users to gain privileges.
[ "cpe:2.3:a:positive_software:h-sphere_winbox:2.4.2_patch_4:*:*:*:*:*:*:*", "cpe:2.3:a:positive_software:h-sphere_winbox:2.4.3_rc1:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-5crj-p3wq-23w2
Simulation models for KUKA.Sim Pro version 3.1 are hosted by a server maintained by KUKA. When these devices request a model, the server transmits the model in plaintext.
[]
null
null
null
null
null
GHSA-7589-56rw-w69r
Cross-Site Request Forgery (CSRF) vulnerability in Overt Software Solutions LTD EZPZ SAML SP Single Sign On (SSO) allows Cross Site Request Forgery. This issue affects EZPZ SAML SP Single Sign On (SSO): from n/a through 1.2.5.
[]
null
7.1
null
null
null
CVE-2023-6966
The Moneytizer <= 9.5.20 - Missing Authorization via multiple AJAX actions
The The Moneytizer plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to a missing capability check on multiple AJAX functions in the /core/core_ajax.php file in all versions up to, and including, 9.5.20. This makes it possible for authenticated attackers, with subscriber access and above, to update and retrieve billing and bank details, update and reset the plugin's settings, and update languages as well as other lower-severity actions.
[ "cpe:2.3:a:themoneytizer:the_moneytizer:*:*:*:*:*:wordpress:*:*" ]
null
8.1
null
null
null
GHSA-cf33-pffv-xfpm
FastTrack Admin By Request 6.1.0.0 supports group policies that are supposed to allow only a select range of users to elevate to Administrator privilege at will. When a user requests elevation using the AdminByRequest.exe interface, the interface communicates with the underlying service (Audckq32.exe) using a .NET named pipe. If the underlying service responds that a user is permitted access to the elevation feature, the client then reinitiates communication with the underlying service and requests elevation. This elevation request has no local checks in the service, and depends on client-side validation in the AdminByRequest.exe interface, i.e., it is a vulnerable exposed functionality in the service. By communicating directly with the underlying service, any user can request elevation and obtain Administrator privilege regardless of group policies or permissions.
[]
null
7.8
null
null
null
CVE-2025-32532
WordPress UXsniff Plugin <= 1.2.4 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pei Yong Goh UXsniff allows Reflected XSS. This issue affects UXsniff: from n/a through 1.2.4.
[]
null
7.1
null
null
null
CVE-2021-23174
WordPress Download Monitor plugin <= 4.4.6 - Auth. Stored Cross-Site Scripting (XSS) vulnerability
Authenticated (admin+) Persistent Cross-Site Scripting (XSS) vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6) Vulnerable parameters: &post_title, &downloadable_file_version[0].
[ "cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*" ]
null
3.4
null
null
null