id
stringlengths
12
47
title
stringlengths
0
256
βŒ€
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
βŒ€
cvss_v3_1
float64
0
10
βŒ€
cvss_v3_0
float64
0
10
βŒ€
cvss_v2_0
float64
0
10
βŒ€
patch_commit_url
stringlengths
38
232
βŒ€
CVE-2021-27595
When a user opens manipulated Portable Document Format (.PDF) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
null
4.3
null
null
RHSA-2019:2571
Red Hat Security Advisory: pango security update
pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
null
CVE-2017-10369
Vulnerability in the Oracle Virtual Directory component of Oracle Fusion Middleware (subcomponent: Virtual Directory Server). Supported versions that are affected are 11.1.1.7.0 and 11.1.1.9.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Virtual Directory. Successful attacks of this vulnerability can result in takeover of Oracle Virtual Directory. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:virtual_directory:11.1.1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:virtual_directory:11.1.1.9.0:*:*:*:*:*:*:*" ]
null
null
7.5
6
null
CVE-2015-8698
CA Release Automation (formerly LISA Release Automation) 5.0.2 before 5.0.2-227, 5.5.1 before 5.5.1-1616, 5.5.2 before 5.5.2-434, and 6.1.0 before 6.1.0-1026 allows remote attackers to read arbitrary files or cause a denial of service via a request containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[ "cpe:2.3:a:broadcom:release_automation:*:*:*:*:*:*:*:*" ]
null
null
7.1
3.6
null
GHSA-h3fr-2rfg-m24c
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the PNG image parser. Successful exploitation could lead to arbitrary code execution.
[]
null
null
9.8
null
null
CVE-2004-0882
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.
[ "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" ]
null
null
null
10
null
GHSA-4qfm-5553-w9fg
IBM Security Directory Server 6.4.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 165814.
[]
null
null
null
null
null
CVE-2021-32101
The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient.
[ "cpe:2.3:a:open-emr:openemr:5.0.2.1:*:*:*:*:*:*:*" ]
null
8.2
null
6.4
null
CVE-2022-2433
The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to deserialization of untrusted input via the 'alm_repeaters_export' parameter in versions up to, and including 5.5.3. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
[ "cpe:2.3:a:connekthq:ajax_load_more:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
null
CVE-2025-21020
Out-of-bounds write in creating bitmap images in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory.
[]
null
5.7
null
null
null
GHSA-944p-q32m-rghv
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[]
null
7.8
null
null
null
CVE-2014-0815
The intent: URL implementation in Opera before 18 on Android allows attackers to read local files by leveraging an interaction error, as demonstrated by reading stored cookies.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.20:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.52.1100:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.60:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.65:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.66:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.67:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.13:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.14:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:12.15:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:15.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:15.00:next:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:16.00:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-24363
The HL7 FHIR IG publisher may potentially expose GitHub repo user and credential information
The HL7 FHIR IG publisher is a tool to take a set of inputs and create a standard FHIR IG. Prior to version 1.8.9, in CI contexts, the IG Publisher CLI uses git commands to determine the URL of the originating repo. If the repo was cloned, or otherwise set to use a repo that uses a username and credential based URL, the entire URL will be included in the built Implementation Guide, exposing username and credential. This does not impact users that clone public repos without credentials, such as those using the auto-ig-build continuous integration infrastructure. This problem has been patched in release 1.8.9. Some workarounds are available. Users should ensure the IG repo they are publishing does not have username or credentials included in the `origin` URL. Running the command `git remote origin url` should return a URL that contains no username, password, or token; or users should run the IG Publisher CLI with the `-repo` parameter and specify a URL that contains no username, password, or token.
[]
null
4.2
null
null
null
GHSA-mxh9-fhfx-h2jh
Kbase Doc v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /web/IndexController.java.
[]
null
9.1
null
null
null
GHSA-hcc5-5wqj-6mg5
The SibRaRecoverableSiXaResource class in the Default Messaging Component in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.41 does not properly handle a Service Integration Bus (SIB) dump operation involving the First Failure Data Capture (FFDC) introspection code, which allows local users to obtain sensitive information by reading the FFDC log file.
[]
null
null
null
null
null
CVE-2024-4798
SourceCodester Online Computer and Laptop Store manage_brand.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /admin/maintenance/manage_brand.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263918 is the identifier assigned to this vulnerability.
[]
5.3
6.3
6.3
6.5
null
GHSA-f982-vxqp-wp2r
ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may be used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)This issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2.
[]
null
7.5
null
null
null
GHSA-j347-f3mw-c7pr
Cross-site scripting (XSS) vulnerability in the Taxonomy Breadcrumb module 5.x before 5.x-1.5 and 6.x before 6.x-1.1 for Drupal allows remote authenticated users, with administer taxonomy permissions, to inject arbitrary web script or HTML via the taxonomy term name in a Breadcrumb display.
[]
null
null
null
null
null
GHSA-xp9c-c3h6-pg4m
An issue in the box_div function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
[]
null
7.5
null
null
null
GHSA-fcvr-5v45-3j27
The Web Administrator service (STEMWADM.EXE) in Websense Personal Email Manager 7.1 before Hotfix 4 and Email Security 7.1 before Hotfix 4 allows remote attackers to cause a denial of service (crash) by sending a HTTP GET request to TCP port 8181 and closing the socket before the service can send a response.
[]
null
null
null
null
null
CVE-2004-1278
Buffer overflow in the switch_voice function in parse.c for jcabc2ps 20040902 allows remote attackers to execute arbitrary code via a crafted ABC file.
[ "cpe:2.3:a:abc2ps:abc2ps:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:john_chambers:jcabc2ps:2004-09-02:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2024-4447
In the System β†’ Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess "Sign In As" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users. While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable β€” including those admins who have not been granted this ability β€” such as by using a session ID to generate an API token. Fixed in:Β 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS
[]
null
4.9
null
null
null
GHSA-mmv3-4w98-p7xj
jce.php in the JCE Admin Component in Ryan Demmer Joomla Content Editor (JCE) 1.1.0 beta 2 and earlier for Joomla! (com_jce) allows remote attackers to include and possibly execute arbitrary local files via the (1) plugin or (2) file parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-32w9-cgpf-p2wf
Missing authentication in all versions of GitLab CE/EE since version 7.11.0 allows an attacker with access to a victim's session to disable two-factor authentication
[]
null
null
null
null
null
CVE-2013-1036
Safari in Apple iOS before 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2018-14055
ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.
[ "cpe:2.3:a:znc:znc:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
CVE-2019-10761
Sandbox Bypass
This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code.
[ "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*" ]
null
8.3
null
null
null
CVE-2000-0656
Buffer overflow in AnalogX proxy server 4.04 and earlier allows remote attackers to cause a denial of service via a long USER command in the FTP protocol.
[ "cpe:2.3:a:analogx:proxy:4.4:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-8268
Frontend Dashboard <= 2.2.4 - Authenticated (Subscriber+) Arbitrary Function Call
The Frontend Dashboard plugin for WordPress is vulnerable to unauthorized code execution due to insufficient filtering on callable methods/functions via the ajax_request() function in all versions up to, and including, 2.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to call arbitrary functions that can be leverage for privilege escalation by changing user's passwords.
[ "cpe:2.3:a:buffercode:frontend_dashboard:*:*:*:*:*:*:*:*", "cpe:2.3:a:buffercode:frontend_dashboard:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
null
CVE-2023-47703
IBM Security Guardium Key Lifecycle Manager information disclosure
IBM Security Guardium Key Lifecycle Manager 4.3 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 271197.
[ "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-h5p3-6ppq-r5h3
FUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items.
[]
null
9.8
null
null
null
CVE-2014-2406
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to "Advisor" and "Select Any Dictionary" privileges.
[ "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*" ]
null
null
null
8.5
null
CVE-2017-0286
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Windows Graphics Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.
[ "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*" ]
null
5
null
1.9
null
GHSA-2369-v4cc-9249
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
[]
null
null
9.6
null
null
GHSA-hx3m-959f-v849
ZendFramework local file inclusion vector in `Zend_View::setScriptPath()` and `render()`
Zend_View is a component that utilizes PHP as a templating language. To utilize it, you specify "script paths" that contain view scripts, and then `render()` view scripts by specifying subdirectories within those script paths; the output is then returned as a string value which may be cached or directly output.`Zend_View::setScriptPath()` in versions up to and including 1.7.4 include a potential Local File Inclusion vulnerability. If untrusted input is used to specify the script path and/or view script itself, a malicious attacker could potentially specify a system directory and thus render a system file.As an example, if the user-supplied string `/etc/passwd` or a relative path that resolved to that file, was supplied to `Zend_View::render()`, that file would be rendered.
[]
null
7.5
null
null
null
CVE-2014-9393
Multiple cross-site request forgery (CSRF) vulnerabilities in the Post to Twitter plugin 0.7 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) idptt_twitter_username or (2) idptt_tweet_prefix parameter to wp-admin/options-general.php.
[ "cpe:2.3:a:post_to_twitter_project:post_to_twitter:*:*:*:*:*:wordpress:*:*" ]
null
null
null
6.8
null
GHSA-5qc2-rg7j-mvjw
D-Link device D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetStaticRouteSettings. This vulnerability allows attackers to execute arbitrary commands via the staticroute_list parameter.
[]
null
9.8
null
null
null
GHSA-538q-pgq4-6rw9
Out-of-bounds read in Microsoft Office Outlook allows an unauthorized attacker to execute code locally.
[]
null
7.8
null
null
null
cisco-sa-20190227-rmi-cmd-ex
Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex"]
[]
null
null
9.8
null
null
GHSA-cm85-g485-h29f
Multiple unspecified vulnerabilities in libXtsol in Oracle Solaris 10 and 11.1 have unspecified impact and attack vectors related to "Buffer errors."
[]
null
null
null
null
null
CVE-2025-1304
NewsBlogger <= 0.2.5.1 - Authenticated (Subscriber+) Arbitrary File Upload
The NewsBlogger theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the newsblogger_install_and_activate_plugin() function in all versions up to, and including, 0.2.5.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
8.8
null
null
null
GHSA-55v6-ppr3-q8jr
MicroNews allows remote attackers to bypass authentication and gain administrative privileges via a direct request to admin.php.
[]
null
null
null
null
null
GHSA-vxmx-924q-mx8w
mediaserver in Android before 2016-10-05 on Nexus 9 and Pixel C devices allows attackers to gain privileges via a crafted application, aka internal bug 29421408.
[]
null
null
7.8
null
null
GHSA-6mhm-gcpf-5gr8
SQL Injection in Admin Search Find API
ImpactSQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access.In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. It was observed that the reported API endpoint accessible by an authenticated administrator user and is vulnerable to SQL injection via the "fields[]" GET parameter. The parameter is not sanitized properly and is used in a SQL statement in an unsafe manner, resulting in SQL injection.PatchesUpdate to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3.patchWorkaroundsApply patch https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3.patch manually.Referenceshttps://github.com/pimcore/pimcore/pull/14972
[]
null
8.8
null
null
null
CVE-2025-1098
ingress-nginx controller - configuration injection via unsanitized mirror annotations
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
[]
null
8.8
null
null
null
GHSA-23m4-p6hq-h69h
airhost.exe in Zoom Client for Meetings 4.6.11 uses 3423423432325249 as the Initialization Vector (IV) for AES-256 CBC encryption.
[]
null
7.5
null
null
null
GHSA-vfc8-9qjc-87vq
Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
[]
null
null
null
null
null
CVE-2023-35879
WordPress WooCommerce Product Vendors Plugin <= 2.1.78 is vulnerable to SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WooCommerce Product Vendors allows SQL Injection.This issue affects Product Vendors: from n/a through 2.1.78.
[ "cpe:2.3:a:woo:product_vendors:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
null
CVE-2017-0435
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31906657. References: QC-CR#1078000.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*" ]
null
null
7
7.6
null
CVE-2025-22149
JWK Set's HTTP client only overwrites and appends JWK to local cache during refresh
JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value).
[]
2.1
null
null
null
null
CVE-2021-29627
In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free.
[ "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2024-40071
Sourcecodester Online ID Generator System 1.0 was discovered to contain an arbitrary file upload vulnerability via id_generator/classes/SystemSettings.php?f=update_settings. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[]
null
9.8
null
null
null
CVE-2005-1993
Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.
[ "cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*", "cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*" ]
null
null
null
3.7
null
GHSA-7j7j-cjf4-3c2x
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
[]
null
5.5
null
null
null
GHSA-7hvp-684m-pr7g
The BadgeOS WordPress plugin before 3.7.1.3 does not sanitise and escape parameters before using them in SQL statements via AJAX actions available to any authenticated users, leading to SQL Injections
[]
null
8.8
null
null
null
CVE-2018-7651
index.js in the ssri module before 5.2.2 for Node.js is prone to a regular expression denial of service vulnerability in strict mode functionality via a long base64 hash string.
[ "cpe:2.3:a:ssri_project:ssri:*:*:*:*:*:node.js:*:*" ]
null
null
5.9
4.3
null
CVE-2019-6726
The WP Fastest Cache plugin through 0.8.9.0 for WordPress allows remote attackers to delete arbitrary files because wp_postratings_clear_fastest_cache and rm_folder_recursively in wpFastestCache.php mishandle ../ in an HTTP Referer header.
[ "cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*" ]
null
null
6.5
5.8
null
GHSA-fhqj-wxhm-vfh3
Buffer overflow in queue.c in a support script for sympa 3.3.3, when running setuid, allows local users to execute arbitrary code.
[]
null
null
null
null
null
GHSA-p8rh-j2f6-9wmr
Buffer overflow in tibemsd in the server in TIBCO Enterprise Message Service (EMS) before 8.3.0 and EMS Appliance before 2.4.0 allows remote authenticated users to cause a denial of service or possibly execute arbitrary code via crafted inbound data.
[]
null
null
8.8
null
null
CVE-2023-33132
Microsoft SharePoint Server Spoofing Vulnerability
Microsoft SharePoint Server Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2024-24887
WordPress Contest Gallery Plugin <= 21.2.8.4 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Contest Gallery Photos and Files Contest Gallery – Contact Form, Upload Form, Social Share and Voting Plugin for WordPress.This issue affects Photos and Files Contest Gallery – Contact Form, Upload Form, Social Share and Voting Plugin for WordPress: from n/a through 21.2.8.4.
[ "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2022-24774
Improper Input Validation leading to Path Traversal in CycloneDX BOM Repository Server
CycloneDX BOM Repository Server is a bill of materials (BOM) repository server for distributing CycloneDX BOMs. CycloneDX BOM Repository Server before version 2.0.1 has an improper input validation vulnerability leading to path traversal. A malicious user may potentially exploit this vulnerability to create arbitrary directories or a denial of service by deleting arbitrary directories. The vulnerability is resolved in version 2.0.1. The vulnerability is not exploitable with the default configuration with the post and delete methods disabled. This can be configured by modifying the `appsettings.json` file, or alternatively, setting the environment variables `ALLOWEDMETHODS__POST` and `ALLOWEDMETHODS__DELETE` to `false`.
[ "cpe:2.3:a:cyclonedx:bill_of_materials_repository_server:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-752f-2m5c-7473
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
[]
null
null
5.5
null
null
CVE-2023-35965
Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function.
[ "cpe:2.3:o:yifanwireless:yf325_firmware:1.0_20221108:*:*:*:*:*:*:*", "cpe:2.3:h:yifanwireless:yf325:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-hrw4-vr8h-245c
The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.6, tvOS 17.6, Safari 17.6, macOS Sonoma 14.6, visionOS 1.3, iOS 17.6 and iPadOS 17.6. Processing web content may lead to a denial-of-service.
[]
null
7.5
null
null
null
CVE-2018-20541
There is a heap-based buffer overflow in libxsmm_sparse_csc_reader at generator_spgemm_csc_reader.c in LIBXSMM 1.10, a different vulnerability than CVE-2018-20542 (which is in a different part of the source code and is seen at different addresses).
[ "cpe:2.3:a:libxsmm_project:libxsmm:1.10:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
RHSA-2009:1649
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
null
GHSA-c354-v653-2qqr
Opera 8.50 allows remote attackers to cause a denial of service (crash) via a Java applet with a large string argument to the removeMember JNI method for the com.opera.JSObject class.
[]
null
null
null
null
null
GHSA-48w8-mmwr-cpgc
IBM Tivoli Storage Manager Server 7.1 could allow an authenticated user with TSM administrator privileges to cause a buffer overflow using a specially crafted SQL query and execute arbitrary code on the server. IBM Reference #: 1998747.
[]
null
null
7.2
null
null
GHSA-vcqf-8qmf-qc2r
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Blocks allows DOM-Based XSS. This issue affects SKT Blocks: from n/a through 2.2.
[]
null
6.5
null
null
null
CVE-2007-6004
Multiple SQL injection vulnerabilities in index.php in Toko Instan 7.6 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter in an artikel action or (2) the katid parameter in a produk action.
[ "cpe:2.3:a:toko:instan:7.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2024:1412
Red Hat Security Advisory: gmp update
gmp: Integer overflow and resultant buffer overflow via crafted input
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.2
null
null
null
GHSA-339p-cxqq-7j6j
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Content Access SDK, Image Export SDK, PDF Export SDK, HTML Export SDK). The supported version that is affected is 8.5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
[]
null
6.3
null
null
null
CVE-2022-22585
An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, macOS Monterey 12.2, macOS Big Sur 11.6.3. An application may be able to access a user's files.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-j7j4-q68q-86wr
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Sebastian Krysmanski Upload File Type Settings pluginΒ <= 1.1 versions.
[]
null
5.9
null
null
null
GHSA-rq9g-66h8-929m
Unspecified vulnerability in ReactOS 0.3.1 has unknown impact and attack vectors, related to a fix for "dozens of win32k bugs and failures," in which the fix itself introduces a vulnerability, possibly related to user-mode and kernel-mode copy failures.
[]
null
null
null
null
null
GHSA-c3pr-h96w-2jjg
Moodle XML import of ddwtos could lead to intentional remote code execution
moodle before versions 3.5.2, 3.4.5, 3.3.8, 3.1.14 is vulnerable to an XML import of ddwtos could lead to intentional remote code execution. When importing legacy 'drag and drop into text' (ddwtos) type quiz questions, it was possible to inject and execute PHP code from within the imported questions, either intentionally or by importing questions from an untrusted source.
[]
null
null
8.8
null
null
GHSA-8wf4-vh2f-5v75
The RAKP protocol support in the Intelligent Platform Management Interface (IPMI) implementation in Integrated Management Module (IMM) and Integrated Management Module II (IMM2) on IBM BladeCenter, Flex System, System x iDataPlex, and System x3### servers sends a password hash to the client, which makes it easier for remote attackers to obtain access via a brute-force attack.
[]
null
null
null
null
null
GHSA-x4m5-7h4q-f244
An issue in HNAP1/GetMultipleHNAPs of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to access the components GetStationSettings, GetWebsiteFilterSettings and GetNetworkSettings without authentication.
[]
null
null
null
null
null
CVE-2025-31932
Deserialization of untrusted data issue exists in BizRobo! all versions. If this vulnerability is exploited, an arbitrary code is executed on the Management Console. The vendor provides the workaround information and recommends to apply it to the deployment environment.
[]
null
null
8.8
null
null
GHSA-hj32-9mcw-5cwh
Missing permission check in Jenkins Project Inheritance Plugin
Jenkins limits access to job configuration XML data (`config.xml`) to users with Job/ExtendedRead permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL `/job/…​/getConfigAsXML` for its Inheritance Project job type that does something similar.Project Inheritance Plugin 21.04.03 and earlier does not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.Additionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the `config.xml` API for users without Job/Configure permission.
[]
null
4.3
null
null
null
CVE-2018-0319
A vulnerability in the password recovery function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password recovery request. An attacker could exploit this vulnerability by submitting a password recovery request and changing the password for any user on an affected system. An exploit could allow the attacker to gain administrative-level privileges on the affected system. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 11.6 and prior. Cisco Bug IDs: CSCvd07253.
[ "cpe:2.3:a:cisco:prime_collaboration:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_collaboration_provisioning:*:*:*:*:*:*:*:*" ]
null
null
9.8
5
null
GHSA-7wm3-575h-7pxh
In the System UI, there is a possible system crash due to an uncaught exception. This could lead to local permanent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-33646131
[]
null
null
null
null
null
GHSA-cg99-4rfx-5jw8
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check on integer overflow while calculating memory can lead to Buffer overflow in WLAN ext scan handler.
[]
null
null
7.8
null
null
CVE-2025-7816
PHPGurukul Apartment Visitors Management System HTTP POST Request visitor-detail.php cross site scripting
A vulnerability, which was classified as problematic, was found in PHPGurukul Apartment Visitors Management System 1.0. Affected is an unknown function of the file /visitor-detail.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
3.5
3.5
4
null
CVE-2024-44278
An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. A sandboxed app may be able to access sensitive user data in system logs.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-778h-9p26-f2p8
Cross-site request forgery (CSRF) vulnerability in core/admin/modules/users/create.php in BigTree CMS 4.0 RC2 and earlier allows remote attackers to hijack the authentication of administrators for requests that create an administrative user via an add user action to index.php.
[]
null
null
null
null
null
CVE-2023-51406
WordPress FastDup Plugin <= 2.1.7 is vulnerable to Sensitive Data Exposure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Ninja Team FastDup – Fastest WordPress Migration & Duplicator.This issue affects FastDup – Fastest WordPress Migration & Duplicator: from n/a through 2.1.7.
[ "cpe:2.3:a:ninjateam:fastdup:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
GHSA-v2vw-5j5p-f93j
In the Linux kernel, the following vulnerability has been resolved:x86/kprobes: Update kcb status flag after singlesteppingFix kprobes to update kcb (kprobes control block) status flag to KPROBE_HIT_SSDONE even if the kp->post_handler is not set.This bug may cause a kernel panic if another INT3 user runs right after kprobes because kprobe_int3_handler() misunderstands the INT3 is kprobe's single stepping INT3.
[]
null
null
null
null
null
GHSA-6839-6jhx-rcv7
Redmine before 4.2.9 and 5.0.x before 5.0.4 allows persistent XSS in its Textile formatter due to improper sanitization in Redcloth3 Textile-formatted fields. Depending on the configuration, this may require login as a registered user.
[]
null
6.1
null
null
null
GHSA-x3f9-4w7w-5mj9
Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
null
null
null
null
GHSA-q4rf-5mrc-hgw8
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
[]
null
3.1
null
null
null
CVE-2021-32976
Moxa NPort IAW5000A-I/O Series Serial Device Server Stack-based Buffer Overflow
Five buffer overflows in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to initiate a denial-of-service attack and execute arbitrary code.
[ "cpe:2.3:o:moxa:nport_iaw5150a-6i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5150a-6i\\/o:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_iaw5150a-12i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5150a-12i\\/o:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_iaw5250a-6i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5250a-6i\\/o:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_iaw5250a-12i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5250a-12i\\/o:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-cxv9-h4hx-92c5
Cross Site Scripting (XSS) vulnerability in Query Report feature in Zoho ManageEngine Password Manager Pro version 11001, allows remote attackers to execute arbitrary code and steal cookies via crafted JavaScript payload.
[]
null
6.1
null
null
null
CVE-2014-1358
Integer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application.
[ "cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-w43r-j6cg-v39w
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
4.9
null
null
GHSA-6cfc-j55p-2wvq
Insufficient policy enforcement in performance APIs in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
[]
null
null
null
null
null
CVE-2015-4328
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS commands via crafted HTTP requests, as demonstrated by read or write operations on the Unified Communications lookup page, aka Bug ID CSCuv12552.
[ "cpe:2.3:a:cisco:telepresence_video_communication_server_software:x8.5.2:*:*:*:expressway:*:*:*" ]
null
null
null
4
null
GHSA-vmc9-g8g4-xwg3
In CommCell in Commvault before 14.68, 15.x before 15.58, 16.x before 16.44, 17.x before 17.29, and 18.x before 18.13, Directory Traversal can occur such that an attempt to view a log file can instead view a file outside of the log-files folder.
[]
null
null
null
null
null
RHSA-2020:0812
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
undertow: AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
7.6
null
null
null