id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-p8w6-99p9-6m6r
Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable denial of service via local access.
[]
null
null
null
null
GHSA-j49f-932x-4prx
Netscape Navigator 7.1 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
[]
null
null
null
null
CVE-2011-0462
Multiple cross-site scripting (XSS) vulnerabilities in the login page in the webui component in SUSE openSUSE Build Service (OBS) before 2.1.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:novell:opensuse_build_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.9.90:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.9.91:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:1.9.92:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.103:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.104:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.0.106:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:novell:opensuse_build_service:2.1.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-6qc8-cw69-rg9r
Buffer overflow in the cmd_usr function in ftp-gw in TIS Internet Firewall Toolkit (FWTK) allows remote attackers to execute arbitrary code via a long destination hostname (dest).
[]
null
null
null
null
GHSA-m6q2-9pfm-2wvr
Malicious Package in wallet-address-vaildator
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
null
9.1
null
null
GHSA-rghx-h57g-p3xm
Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to error handling for Cascading Style Sheets (CSS) token-sequence data.
[]
null
null
null
null
CVE-2024-9408
In Eclipse GlassFish since version 6.2.5 it is possible to perform a Server Side Request Forgery attack in specific endpoints.
[]
8.9
null
null
null
CVE-2009-1450
PHP remote file inclusion vulnerability in format.php in SMA-DB 0.3.12 allows remote attackers to execute arbitrary PHP code via a URL in the _page_content parameter.
[ "cpe:2.3:a:bluevirus-design:sma-db:0.3.12:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-38716
IBM Cloud Pak System information disclosure
IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, and 2.3.4.0 could disclose sensitive information about the system that could aid in further attacks against the system.
[ "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:ifix1:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:ifix2:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:ifix1:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_system:2.3.4.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2016-4210
Integer overflow in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-rpjx-w3gx-pgp2
PEGA Platform 8.3.0 is vulnerable to Information disclosure via a direct prweb/sso/random_token/!STANDARD?pyStream=MyAlerts request to get Audit Log information while using a low-privilege account.
[]
null
4.3
null
null
CVE-2005-3053
The sys_set_mempolicy function in mempolicy.c in Linux kernel 2.6.x allows local users to cause a denial of service (kernel BUG()) via a negative first argument.
[ "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2017-3195
Commvault Edge Communication Service (cvd) prior to version 11 SP7 or version 11 SP6 with hotfix 590 is prone to a stack-based buffer overflow vulnerability that could lead to arbitrary code execution with administrative privileges.
[ "cpe:2.3:a:commvault:edge:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:commvault:edge:11.0.0:service_pack1:*:*:*:*:*:*", "cpe:2.3:a:commvault:edge:11.0.0:service_pack2:*:*:*:*:*:*", "cpe:2.3:a:commvault:edge:11.0.0:service_pack3:*:*:*:*:*:*", "cpe:2.3:a:commvault:edge:11.0.0:service_pack4:*:*:*:*:*:*", "cpe:2.3:a:commvault:edge:11.0.0:service_pack5:*:*:*:*:*:*", "cpe:2.3:a:commvault:edge:11.0.0:service_pack6:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2013-7292
VASCO IDENTIKEY Authentication Server (IAS) 3.4.x allows remote authenticated users to bypass Active Directory (AD) authentication by entering only a DIGIPASS one-time password, instead of the intended combination of this one-time password and a multiple-time AD password.
[ "cpe:2.3:a:vasco:identikey_authentication_server:3.4:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2024-4278
Incorrect Synchronization in GitLab
An information disclosure issue has been discovered in GitLab EE affecting all versions starting from 16.5 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. A maintainer could obtain a Dependency Proxy password by editing a certain Dependency Proxy setting.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:17.4.0:*:*:*:enterprise:*:*:*" ]
null
5.5
null
null
CVE-2018-7811
An Unverified Password Change vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 which could allow an unauthenticated remote user to access the change password function of the web server
[ "cpe:2.3:o:schneider-electric:modicom_m340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicom_m340:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:modicom_premium_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicom_premium:*:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:modicom_quantum_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicom_quantum:*:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:modicom_bmxnor0200h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:modicom_bmxnor0200h:-:*:*:*:*:*:*:*" ]
null
null
9.8
5
GHSA-jjw8-r4h6-8x47
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Send DTBCLK disable message on first commit[Why] Previous patch to allow DTBCLK disable didn't address boot case. Driver thinks DTBCLK is disabled by default, so we don't send disable message to PMFW. DTBCLK is then enabled at idle desktop on boot, burning power.[How] Set dtbclk_en to true on boot so that disable message is sent during first commit.
[]
null
null
null
null
CVE-2023-47123
iTop vulnerable to XSS vulnerability in n:n relations "tagset" widget
iTop is an IT service management platform. By filling malicious code in an object friendlyname / complementary name, an XSS attack can be performed when this object will displayed as an n:n relation item in another object. This vulnerability is fixed in 3.1.1 and 3.2.0.
[ "cpe:2.3:a:combodo:itop:*:-:*:*:*:*:*:*", "cpe:2.3:a:combodo:itop:*:*:*:*:-:*:*:*" ]
null
8.7
null
null
CVE-2020-10778
In Red Hat CloudForms 4.7 and 5, the read only widgets can be edited by inspecting the forms and dropping the disabled attribute from the fields since there is no server-side validation. This business logic flaw violate the expected behavior.
[ "cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms:5.0.0:*:*:*:*:*:*:*" ]
null
6
null
6.5
CVE-2024-40543
PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage.
[ "cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*", "cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*" ]
null
6.4
null
null
GHSA-2237-fvgv-wpg8
Directory traversal vulnerability in the dotTailLogServlet in dotCMS before 3.5.1 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the fileName parameter.
[]
null
null
2.7
null
CVE-2017-9074
The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-9vp3-7qwq-83r9
Server-Side Request Forgery in FUXA
A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server.
[]
null
7.5
null
null
GHSA-249c-5cfq-cwqh
There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below that may allow a remote, authenticated attacker to impersonate another account.
[]
null
8.8
null
null
GHSA-m373-x696-qcxc
This issue was addressed with improved checks. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing a maliciously crafted image may lead to arbitrary code execution.
[]
null
null
null
null
CVE-2019-19663
A CSRF vulnerability exists in the Folder Sets Settings of Web File Manager in Rumpus FTP 8.2.9.1. This allows an attacker to Create/Delete Folders after exploiting it at RAPR/FolderSetsSet.html.
[ "cpe:2.3:a:maxum:rumpus:8.2.9.1:*:*:*:*:*:*:*" ]
null
6.5
null
5.8
CVE-2021-42242
A command execution vulnerability exists in jfinal_cms 5.0.1 via com.jflyfox.component.controller.Ueditor.
[ "cpe:2.3:a:jflyfox:jfinal_cms:5.0.1:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2024-45279
Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server for ABAP (CRM Blueprint Application Builder Panel)
Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
[]
null
6.1
null
null
CVE-2017-8246
In function msm_pcm_playback_close() in all Android releases from CAF using the Linux kernel, prtd is assigned substream->runtime->private_data. Later, prtd is freed. However, prtd is not sanitized and set to NULL, resulting in a dangling pointer. There are other functions that access the same memory (substream->runtime->private_data) with a NULL check, such as msm_pcm_volume_ctl_put(), which means this freed memory could be used.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2015-9306
The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS.
[ "cpe:2.3:a:smackcoders:import_all_pages\\,_post_types\\,_products\\,_orders\\,_and_users_as_xml_\\&_csv:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
GHSA-gg2h-7m29-p3rh
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.
[]
null
8.8
null
null
RHSA-2024:2877
Red Hat Security Advisory: OpenShift Container Platform 4.13.42 packages and security update
buildah: full container escape at build time jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
4.3
null
null
GHSA-46hx-7mg5-6vx7
Cross-site scripting (XSS) vulnerability in the template preview function in Foreman before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted provisioning template.
[]
null
null
null
null
GHSA-qr2g-34w7-h29g
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
[]
null
6.5
null
null
GHSA-c645-fmpg-c8q7
BlueStacks App Player 2, 3, and 4 before 4.90 allows DNS Rebinding for attacks on exposed IPC functions.
[]
null
null
8
null
CVE-2025-2547
D-Link DIR-618/DIR-605L formAdvNetwork access control
A vulnerability, which was classified as problematic, has been found in D-Link DIR-618 and DIR-605L 2.02/3.02. This issue affects some unknown processing of the file /goform/formAdvNetwork. The manipulation leads to improper access controls. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
[]
5.3
4.3
4.3
3.3
GHSA-48rx-m5j5-4gf3
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-3126.
[]
null
null
null
null
GHSA-qcxv-vf88-qqj3
Dell SupportAssist for Home PCs (version 3.11.2 and prior) contain Overly Permissive Cross-domain Whitelist vulnerability. An authenticated non-admin user could potentially exploit the issue and obtain sensitive information.
[]
null
6.5
null
null
CVE-2019-2844
Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: LDAP Client Tools). The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
[ "cpe:2.3:o:oracle:solaris:11.4:*:*:*:*:*:*:*" ]
null
null
8.8
4.6
CVE-2008-3184
Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 3.6.10 PL2 and earlier, and 3.7.2 and earlier 3.7.x versions, allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO (PHP_SELF) or (2) the do parameter, as demonstrated by requests to upload/admincp/faq.php. NOTE: this issue can be leveraged to execute arbitrary PHP code.
[ "cpe:2.3:a:vbulletin:vbulletin:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.6.10:pl1:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.7.1:gold:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.7.1:pl1:*:*:*:*:*:*", "cpe:2.3:a:vbulletin:vbulletin:3.7.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-57686
A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "pagetitle" parameter.
[]
null
9.8
null
null
RHSA-2023:5691
Red Hat Security Advisory: bind security update
bind: stack exhaustion in control channel code may lead to DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
CVE-2004-0351
Spider Sales shopping cart stores the private key in the same database and table as the public key, which allows local users with access to the database to decrypt data.
[ "cpe:2.3:a:spidersales:spidersales:2.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-1999-0937
BNBForm allows remote attackers to read arbitrary files via the automessage hidden form variable.
[]
null
null
null
10
GHSA-4c87-7rj9-cwg4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in totalprocessing Nomupay Payment Processing Gateway allows Reflected XSS. This issue affects Nomupay Payment Processing Gateway: from n/a through 7.1.6.
[]
null
7.1
null
null
GHSA-9xwx-qcqw-ppm5
CData RSB Connect v22.0.8336 was discovered to contain a Server-Side Request Forgery (SSRF).
[]
null
7.5
null
null
GHSA-8h69-rhj2-r69p
The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
[]
null
5.3
null
null
CVE-2025-41362
Code injection vulnerability in IDF and ZLF
Code injection vulnerability in IDF v0.10.0-0C03-03 and ZLF v0.10.0-0C03-04. This vulnerability allows an attacker to store malicious payload in software that will run in the victim's browser. Exploiting this vulnerability requires authenticating to the device and executing certain commands that can be executed with view permission.
[]
5.3
null
null
null
GHSA-wq2p-x6v8-v53j
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
[]
null
7.5
null
null
GHSA-658h-q8jw-6rcq
The mosgetparam implementation in Joomla! before 1.0.10, does not set a variable's data type to integer when the variable's default value is numeric, which has unspecified impact and attack vectors, which may permit SQL injection attacks.
[]
null
null
null
null
GHSA-x9f3-r8x7-5xm5
Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.8.0 allows remote attackers to affect integrity via unknown vectors related to WebCenter Spaces Application.
[]
null
null
null
null
CVE-2022-33698
Exposure of Sensitive Information in Telecom application prior to SMR Jul-2022 Release 1 allows local attackers to access ICCID via log.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2023-21327
In Permission Manager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2011-3067
Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to replacement of IFRAME elements.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-c833-h92x-3p97
IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.17 uses a weak WS-Security XML encryption algorithm, which makes it easier for remote attackers to obtain plaintext data from a (1) JAX-RPC or (2) JAX-WS Web Services request via unspecified vectors related to a "decryption attack."
[]
null
null
null
null
GHSA-7qgj-r27p-g6hh
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks CRM Perks allows Reflected XSS. This issue affects CRM Perks: from n/a through 1.1.7.
[]
null
7.1
null
null
CVE-2025-23131
dlm: prevent NPD when writing a positive value to event_done
In the Linux kernel, the following vulnerability has been resolved: dlm: prevent NPD when writing a positive value to event_done do_uevent returns the value written to event_done. In case it is a positive value, new_lockspace would undo all the work, and lockspace would not be set. __dlm_new_lockspace, however, would treat that positive value as a success due to commit 8511a2728ab8 ("dlm: fix use count with multiple joins"). Down the line, device_create_lockspace would pass that NULL lockspace to dlm_find_lockspace_local, leading to a NULL pointer dereference. Treating such positive values as successes prevents the problem. Given this has been broken for so long, this is unlikely to break userspace expectations.
[]
null
null
null
null
CVE-2008-1113
Cisco Unified Wireless IP Phone 7921, when using Protected Extensible Authentication Protocol (PEAP), does not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.
[ "cpe:2.3:h:cisco:7921_wireless_ip_phone:*:*:*:*:*:*:*:*", "cpe:2.3:a:vocera_communications:vocera_communications_badge:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-2x78-vqg2-8q7r
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Peter Keung Peter’s Custom Anti-Spam plugin <= 3.2.2 versions.
[]
null
7.1
null
null
CVE-2020-24903
Cute Editor for ASP.NET 6.4 is vulnerable to reflected cross-site scripting (XSS) caused by improper validation of user supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
[ "cpe:2.3:a:cutesoft:cute_editor:6.4:*:*:*:*:asp.net:*:*" ]
null
6.1
null
4.3
GHSA-qxrc-mpfr-xpp8
PHP remote file inclusion vulnerability in common.php in E-GADS! before 2.2.7 allows remote attackers to execute arbitrary PHP code via a URL in the locale parameter.
[]
null
null
null
null
GHSA-5xfh-rrx5-67m4
The ElementsKit Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.6 via the 'render_raw' function. This can allow authenticated attackers, with Contributor-level permissions and above, to extract sensitive data including private, future, and draft posts.
[]
null
4.3
null
null
RHSA-2020:3911
Red Hat Security Advisory: python security update
python: XSS vulnerability in the documentation XML-RPC server in server_title field
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
null
null
CVE-2018-5954
phpFreeChat 1.7 and earlier allows remote attackers to cause a denial of service by sending a large number of connect commands.
[ "cpe:2.3:a:phpfreechat:phpfreechat:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
ICSA-15-300-03A
Rockwell Automation Micrologix 1100 and 1400 PLC Systems Vulnerabilities (Update A)
Stack-based buffer overflow on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices through B FRN 15.003 allows remote attackers to execute arbitrary code via unspecified vectors. Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allow remote attackers to cause a denial of service (memory corruption and device crash) via a crafted HTTP request. Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allow remote authenticated users to insert the content of an arbitrary file into a FRAME element via unspecified vectors. Cross-site scripting (XSS) vulnerability in the web server on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. SQL injection vulnerability on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
3.7
null
GHSA-892q-vr75-r4j3
When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
8.7
7.5
null
null
CVE-2024-57225
Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function.
[]
null
9.8
null
null
GHSA-r5q5-ggcw-9wg5
Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.
[]
null
null
null
null
RHSA-2016:0502
Red Hat Security Advisory: python-django security update
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
GHSA-4v6v-34r8-27m4
IrfanView WBZ plugin WB1 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WB1 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22718.
[]
null
null
7.8
null
CVE-2024-6497
SEO Plugin by Squirrly SEO <= 12.3.19 - Authenticated (Contributor+) SQL Injection via url Parameter
The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 12.3.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:cifi:seo_plugin_by_squirrley_seo:12.3.19:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2018-21053
An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. There is Clipboard access in the lockscreen state via a physical keyboard. The Samsung ID is SVE-2018-12684 (October 2018).
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
4.6
null
2.1
GHSA-cgfm-xwp7-2cvr
Sanitize-html Vulnerable To REDoS Attacks
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
[]
null
7.5
null
null
CVE-2020-28365
Sentrifugo 3.2 allows Stored Cross-Site Scripting (XSS) vulnerability by inserting a payload within the X-Forwarded-For HTTP header during the login process. When an administrator looks at logs, the payload is executed. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[ "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-c3px-v9c7-m734
Prototype Pollution in mithril
Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`.RecommendationIf you are using mithril 2.x, upgrade to version 2.0.2 or later. If you are using mithril 1.x, upgrade to version 1.1.7 or later.
[]
null
null
null
null
GHSA-9v4v-7vv2-wr82
The Listeo WordPress theme before 1.6.11 did not properly sanitise some parameters in its Search, Booking Confirmation and Personal Message pages, leading to Cross-Site Scripting issues
[]
null
null
null
null
GHSA-jf2x-r8ch-mw45
Group-Office before 2.16-13 does not properly validate user IDs, which allows remote attackers to obtain sensitive information via certain requests for (1) message.php and (2) messages.php in modules/email/. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2021-40126
Cisco Umbrella Email Enumeration Vulnerability
A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user's email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system.
[ "cpe:2.3:a:cisco:umbrella:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-q3mg-hh3m-f7pm
A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua (users endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to enumerate users via crafted HTTP requests.
[]
null
6.5
null
null
GHSA-g3hw-q3c8-4mq9
The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.
[]
null
null
null
null
CVE-2021-24296
WP Customer Reviews < 3.5.6 - Authenticated Stored Cross-Site Scripting (XSS)
The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled
[ "cpe:2.3:a:gowebsolutions:wp_customer_reviews:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
GHSA-p838-m8cm-w2xf
On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, or 12.1.0-12.1.3.7, or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
[]
null
null
7.2
null
CVE-2008-2565
Multiple SQL injection vulnerabilities in PHP Address Book 3.1.5 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) view.php and (2) edit.php. NOTE: it was later reported that 4.0.x is also affected.
[ "cpe:2.3:a:php-address_book:php-address_book:*:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php-address_book:php-address_book:3.4.8:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-4289
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 176332.
[ "cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.5:*:*:*:*:*:*:*" ]
null
null
5.3
null
GHSA-x42j-7wwr-wxrm
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.
[]
null
null
null
null
CVE-2001-0464
Buffer overflow in websync.exe in Cyberscheduler allows remote attackers to execute arbitrary commands via a long tzs (timezone) parameter.
[ "cpe:2.3:a:crosswind:cyberscheduler:2.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-8xmp-x69h-8jfq
An issue was discovered on D-Link 6600-AP, DWL-3600AP, and DWL-8610AP Ax 4.2.0.14 21/03/2019 devices. There is post-authenticated Certificate and RSA Private Key extraction through an insecure sslcert-get.cgi HTTP command.
[]
null
null
null
null
CVE-2017-2871
Insufficient security checks exist in the recovery procedure used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. An attacker who is in the same subnetwork of the camera or has remote administrator access can fully compromise the device by performing a firmware recovery using a custom image.
[ "cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*", "cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*" ]
null
null
9.6
null
RHSA-2024:0005
Red Hat Security Advisory: thunderbird security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
GHSA-q97c-6vfp-vgp5
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
[]
null
null
null
null
CVE-2023-6984
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
CVE-2022-2785
Arbitrary Memory read in BPF Linux Kernel
There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2024-49393
Mutt: neomutt: to and cc email header fields are not protected by cryptographic signing
In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.
[ "cpe:/o:redhat:enterprise_linux:10", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9", "cpe:2.3:a:mutt:mutt:-:*:*:*:*:*:*:*", "cpe:2.3:a:neomutt:neomutt:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-mr27-qqp8-73rc
Cross-site scripting (XSS) vulnerability in SemanticScuttle before 0.90 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to the (1) username and (2) profile page.
[]
null
null
null
null
CVE-2024-44217
A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in iOS 18 and iPadOS 18. Password autofill may fill in passwords after failing authentication.
[ "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
GHSA-pg2w-hcm2-5fww
The File Gallery plugin before 1.7.9.2 for WordPress does not properly escape strings, which allows remote administrators to execute arbitrary PHP code via a \' (backslash quote) in the setting fields to /wp-admin/options-media.php, related to the create_function function.
[]
null
null
null
null
RHSA-2014:0305
Red Hat Security Advisory: samba security update
samba: clickjacking vulnerability in SWAT samba: cross-site request forgery vulnerability in SWAT samba: DoS via integer overflow when reading an EA list
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2022-27785
Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
null
null
7.8
null
CVE-2018-15752
An issue was discovered in the MensaMax (aka com.breustedt.mensamax) application 4.3 for Android. Cleartext Transmission of Sensitive Information allows man-in-the-middle attackers to eavesdrop authentication information between the application and the server.
[ "cpe:2.3:a:mensamax:mensamax:4.3:*:*:*:*:android:*:*" ]
null
null
8.1
4.3
CVE-2018-20566
An issue was discovered in DouCo DouPHP 1.5 20181221. It allows full path disclosure in "Smarty error: unable to read resource" error messages for a crafted installation page.
[ "cpe:2.3:a:douco:douphp:1.5:20181221:*:*:*:*:*:*" ]
null
null
5.3
5