id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-p8w6-99p9-6m6r
|
Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable denial of service via local access.
|
[] | null | null | null | null |
|
GHSA-j49f-932x-4prx
|
Netscape Navigator 7.1 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
|
[] | null | null | null | null |
|
CVE-2011-0462
|
Multiple cross-site scripting (XSS) vulnerabilities in the login page in the webui component in SUSE openSUSE Build Service (OBS) before 2.1.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:novell:opensuse_build_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.9.90:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.9.91:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:1.9.92:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.103:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.104:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.0.106:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:opensuse_build_service:2.1.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-6qc8-cw69-rg9r
|
Buffer overflow in the cmd_usr function in ftp-gw in TIS Internet Firewall Toolkit (FWTK) allows remote attackers to execute arbitrary code via a long destination hostname (dest).
|
[] | null | null | null | null |
|
GHSA-m6q2-9pfm-2wvr
|
Malicious Package in wallet-address-vaildator
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
[] | null | 9.1 | null | null |
GHSA-rghx-h57g-p3xm
|
Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to error handling for Cascading Style Sheets (CSS) token-sequence data.
|
[] | null | null | null | null |
|
CVE-2024-9408
|
In Eclipse GlassFish since version 6.2.5 it is possible to perform a Server Side Request Forgery attack in specific endpoints.
|
[] | 8.9 | null | null | null |
|
CVE-2009-1450
|
PHP remote file inclusion vulnerability in format.php in SMA-DB 0.3.12 allows remote attackers to execute arbitrary PHP code via a URL in the _page_content parameter.
|
[
"cpe:2.3:a:bluevirus-design:sma-db:0.3.12:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-38716
|
IBM Cloud Pak System information disclosure
|
IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, and 2.3.4.0 could disclose sensitive information about the system that could aid in further attacks against the system.
|
[
"cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:ifix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:ifix2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:ifix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_system:2.3.4.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2016-4210
|
Integer overflow in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-rpjx-w3gx-pgp2
|
PEGA Platform 8.3.0 is vulnerable to Information disclosure via a direct prweb/sso/random_token/!STANDARD?pyStream=MyAlerts request to get Audit Log information while using a low-privilege account.
|
[] | null | 4.3 | null | null |
|
CVE-2005-3053
|
The sys_set_mempolicy function in mempolicy.c in Linux kernel 2.6.x allows local users to cause a denial of service (kernel BUG()) via a negative first argument.
|
[
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2017-3195
|
Commvault Edge Communication Service (cvd) prior to version 11 SP7 or version 11 SP6 with hotfix 590 is prone to a stack-based buffer overflow vulnerability that could lead to arbitrary code execution with administrative privileges.
|
[
"cpe:2.3:a:commvault:edge:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:commvault:edge:11.0.0:service_pack1:*:*:*:*:*:*",
"cpe:2.3:a:commvault:edge:11.0.0:service_pack2:*:*:*:*:*:*",
"cpe:2.3:a:commvault:edge:11.0.0:service_pack3:*:*:*:*:*:*",
"cpe:2.3:a:commvault:edge:11.0.0:service_pack4:*:*:*:*:*:*",
"cpe:2.3:a:commvault:edge:11.0.0:service_pack5:*:*:*:*:*:*",
"cpe:2.3:a:commvault:edge:11.0.0:service_pack6:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2013-7292
|
VASCO IDENTIKEY Authentication Server (IAS) 3.4.x allows remote authenticated users to bypass Active Directory (AD) authentication by entering only a DIGIPASS one-time password, instead of the intended combination of this one-time password and a multiple-time AD password.
|
[
"cpe:2.3:a:vasco:identikey_authentication_server:3.4:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2024-4278
|
Incorrect Synchronization in GitLab
|
An information disclosure issue has been discovered in GitLab EE affecting all versions starting from 16.5 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. A maintainer could obtain a Dependency Proxy password by editing a certain Dependency Proxy setting.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:17.4.0:*:*:*:enterprise:*:*:*"
] | null | 5.5 | null | null |
CVE-2018-7811
|
An Unverified Password Change vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 which could allow an unauthenticated remote user to access the change password function of the web server
|
[
"cpe:2.3:o:schneider-electric:modicom_m340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_m340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicom_premium_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_premium:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicom_quantum_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_quantum:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicom_bmxnor0200h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicom_bmxnor0200h:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-jjw8-r4h6-8x47
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Send DTBCLK disable message on first commit[Why]
Previous patch to allow DTBCLK disable didn't address boot case. Driver
thinks DTBCLK is disabled by default, so we don't send disable message to
PMFW. DTBCLK is then enabled at idle desktop on boot, burning power.[How]
Set dtbclk_en to true on boot so that disable message is sent during first
commit.
|
[] | null | null | null | null |
|
CVE-2023-47123
|
iTop vulnerable to XSS vulnerability in n:n relations "tagset" widget
|
iTop is an IT service management platform. By filling malicious code in an object friendlyname / complementary name, an XSS attack can be performed when this object will displayed as an n:n relation item in another object. This vulnerability is fixed in 3.1.1 and 3.2.0.
|
[
"cpe:2.3:a:combodo:itop:*:-:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:*:*:*:*:-:*:*:*"
] | null | 8.7 | null | null |
CVE-2020-10778
|
In Red Hat CloudForms 4.7 and 5, the read only widgets can be edited by inspecting the forms and dropping the disabled attribute from the fields since there is no server-side validation. This business logic flaw violate the expected behavior.
|
[
"cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms:5.0.0:*:*:*:*:*:*:*"
] | null | 6 | null | 6.5 |
|
CVE-2024-40543
|
PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage.
|
[
"cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*",
"cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
GHSA-2237-fvgv-wpg8
|
Directory traversal vulnerability in the dotTailLogServlet in dotCMS before 3.5.1 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the fileName parameter.
|
[] | null | null | 2.7 | null |
|
CVE-2017-9074
|
The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-9vp3-7qwq-83r9
|
Server-Side Request Forgery in FUXA
|
A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server.
|
[] | null | 7.5 | null | null |
GHSA-249c-5cfq-cwqh
|
There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below that may allow a remote, authenticated attacker to impersonate another account.
|
[] | null | 8.8 | null | null |
|
GHSA-m373-x696-qcxc
|
This issue was addressed with improved checks. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing a maliciously crafted image may lead to arbitrary code execution.
|
[] | null | null | null | null |
|
CVE-2019-19663
|
A CSRF vulnerability exists in the Folder Sets Settings of Web File Manager in Rumpus FTP 8.2.9.1. This allows an attacker to Create/Delete Folders after exploiting it at RAPR/FolderSetsSet.html.
|
[
"cpe:2.3:a:maxum:rumpus:8.2.9.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | 5.8 |
|
CVE-2021-42242
|
A command execution vulnerability exists in jfinal_cms 5.0.1 via com.jflyfox.component.controller.Ueditor.
|
[
"cpe:2.3:a:jflyfox:jfinal_cms:5.0.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-45279
|
Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server for ABAP (CRM Blueprint Application Builder Panel)
|
Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
|
[] | null | 6.1 | null | null |
CVE-2017-8246
|
In function msm_pcm_playback_close() in all Android releases from CAF using the Linux kernel, prtd is assigned substream->runtime->private_data. Later, prtd is freed. However, prtd is not sanitized and set to NULL, resulting in a dangling pointer. There are other functions that access the same memory (substream->runtime->private_data) with a NULL check, such as msm_pcm_volume_ctl_put(), which means this freed memory could be used.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2015-9306
|
The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS.
|
[
"cpe:2.3:a:smackcoders:import_all_pages\\,_post_types\\,_products\\,_orders\\,_and_users_as_xml_\\&_csv:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-gg2h-7m29-p3rh
|
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.
|
[] | null | 8.8 | null | null |
|
RHSA-2024:2877
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.42 packages and security update
|
buildah: full container escape at build time jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.3 | null | null |
GHSA-46hx-7mg5-6vx7
|
Cross-site scripting (XSS) vulnerability in the template preview function in Foreman before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted provisioning template.
|
[] | null | null | null | null |
|
GHSA-qr2g-34w7-h29g
|
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
|
[] | null | 6.5 | null | null |
|
GHSA-c645-fmpg-c8q7
|
BlueStacks App Player 2, 3, and 4 before 4.90 allows DNS Rebinding for attacks on exposed IPC functions.
|
[] | null | null | 8 | null |
|
CVE-2025-2547
|
D-Link DIR-618/DIR-605L formAdvNetwork access control
|
A vulnerability, which was classified as problematic, has been found in D-Link DIR-618 and DIR-605L 2.02/3.02. This issue affects some unknown processing of the file /goform/formAdvNetwork. The manipulation leads to improper access controls. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | 5.3 | 4.3 | 4.3 | 3.3 |
GHSA-48rx-m5j5-4gf3
|
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-3126.
|
[] | null | null | null | null |
|
GHSA-qcxv-vf88-qqj3
|
Dell SupportAssist for Home PCs (version 3.11.2 and prior) contain Overly Permissive Cross-domain Whitelist vulnerability. An authenticated non-admin user could potentially exploit the issue and obtain sensitive information.
|
[] | null | 6.5 | null | null |
|
CVE-2019-2844
|
Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: LDAP Client Tools). The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:o:oracle:solaris:11.4:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4.6 |
|
CVE-2008-3184
|
Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 3.6.10 PL2 and earlier, and 3.7.2 and earlier 3.7.x versions, allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO (PHP_SELF) or (2) the do parameter, as demonstrated by requests to upload/admincp/faq.php. NOTE: this issue can be leveraged to execute arbitrary PHP code.
|
[
"cpe:2.3:a:vbulletin:vbulletin:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.10:pl1:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.7.1:gold:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.7.1:pl1:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.7.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-57686
|
A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "pagetitle" parameter.
|
[] | null | 9.8 | null | null |
|
RHSA-2023:5691
|
Red Hat Security Advisory: bind security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
CVE-2004-0351
|
Spider Sales shopping cart stores the private key in the same database and table as the public key, which allows local users with access to the database to decrypt data.
|
[
"cpe:2.3:a:spidersales:spidersales:2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-1999-0937
|
BNBForm allows remote attackers to read arbitrary files via the automessage hidden form variable.
|
[] | null | null | null | 10 |
|
GHSA-4c87-7rj9-cwg4
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in totalprocessing Nomupay Payment Processing Gateway allows Reflected XSS. This issue affects Nomupay Payment Processing Gateway: from n/a through 7.1.6.
|
[] | null | 7.1 | null | null |
|
GHSA-9xwx-qcqw-ppm5
|
CData RSB Connect v22.0.8336 was discovered to contain a Server-Side Request Forgery (SSRF).
|
[] | null | 7.5 | null | null |
|
GHSA-8h69-rhj2-r69p
|
The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
|
[] | null | 5.3 | null | null |
|
CVE-2025-41362
|
Code injection vulnerability in IDF and ZLF
|
Code injection vulnerability in IDF v0.10.0-0C03-03 and ZLF v0.10.0-0C03-04. This vulnerability allows an attacker to store malicious payload in software that will run in the victim's browser. Exploiting this vulnerability requires authenticating to the device and executing certain commands that can be executed with view permission.
|
[] | 5.3 | null | null | null |
GHSA-wq2p-x6v8-v53j
|
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
|
[] | null | 7.5 | null | null |
|
GHSA-658h-q8jw-6rcq
|
The mosgetparam implementation in Joomla! before 1.0.10, does not set a variable's data type to integer when the variable's default value is numeric, which has unspecified impact and attack vectors, which may permit SQL injection attacks.
|
[] | null | null | null | null |
|
GHSA-x9f3-r8x7-5xm5
|
Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.8.0 allows remote attackers to affect integrity via unknown vectors related to WebCenter Spaces Application.
|
[] | null | null | null | null |
|
CVE-2022-33698
|
Exposure of Sensitive Information in Telecom application prior to SMR Jul-2022 Release 1 allows local attackers to access ICCID via log.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2023-21327
|
In Permission Manager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2011-3067
|
Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to replacement of IFRAME elements.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-c833-h92x-3p97
|
IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.17 uses a weak WS-Security XML encryption algorithm, which makes it easier for remote attackers to obtain plaintext data from a (1) JAX-RPC or (2) JAX-WS Web Services request via unspecified vectors related to a "decryption attack."
|
[] | null | null | null | null |
|
GHSA-7qgj-r27p-g6hh
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks CRM Perks allows Reflected XSS. This issue affects CRM Perks: from n/a through 1.1.7.
|
[] | null | 7.1 | null | null |
|
CVE-2025-23131
|
dlm: prevent NPD when writing a positive value to event_done
|
In the Linux kernel, the following vulnerability has been resolved:
dlm: prevent NPD when writing a positive value to event_done
do_uevent returns the value written to event_done. In case it is a
positive value, new_lockspace would undo all the work, and lockspace
would not be set. __dlm_new_lockspace, however, would treat that
positive value as a success due to commit 8511a2728ab8 ("dlm: fix use
count with multiple joins").
Down the line, device_create_lockspace would pass that NULL lockspace to
dlm_find_lockspace_local, leading to a NULL pointer dereference.
Treating such positive values as successes prevents the problem. Given
this has been broken for so long, this is unlikely to break userspace
expectations.
|
[] | null | null | null | null |
CVE-2008-1113
|
Cisco Unified Wireless IP Phone 7921, when using Protected Extensible Authentication Protocol (PEAP), does not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.
|
[
"cpe:2.3:h:cisco:7921_wireless_ip_phone:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vocera_communications:vocera_communications_badge:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-2x78-vqg2-8q7r
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Peter Keung Peter’s Custom Anti-Spam plugin <= 3.2.2 versions.
|
[] | null | 7.1 | null | null |
|
CVE-2020-24903
|
Cute Editor for ASP.NET 6.4 is vulnerable to reflected cross-site scripting (XSS) caused by improper validation of user supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
|
[
"cpe:2.3:a:cutesoft:cute_editor:6.4:*:*:*:*:asp.net:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-qxrc-mpfr-xpp8
|
PHP remote file inclusion vulnerability in common.php in E-GADS! before 2.2.7 allows remote attackers to execute arbitrary PHP code via a URL in the locale parameter.
|
[] | null | null | null | null |
|
GHSA-5xfh-rrx5-67m4
|
The ElementsKit Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.6 via the 'render_raw' function. This can allow authenticated attackers, with Contributor-level permissions and above, to extract sensitive data including private, future, and draft posts.
|
[] | null | 4.3 | null | null |
|
RHSA-2020:3911
|
Red Hat Security Advisory: python security update
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | null | null |
CVE-2018-5954
|
phpFreeChat 1.7 and earlier allows remote attackers to cause a denial of service by sending a large number of connect commands.
|
[
"cpe:2.3:a:phpfreechat:phpfreechat:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
ICSA-15-300-03A
|
Rockwell Automation Micrologix 1100 and 1400 PLC Systems Vulnerabilities (Update A)
|
Stack-based buffer overflow on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices through B FRN 15.003 allows remote attackers to execute arbitrary code via unspecified vectors. Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allow remote attackers to cause a denial of service (memory corruption and device crash) via a crafted HTTP request. Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allow remote authenticated users to insert the content of an arbitrary file into a FRAME element via unspecified vectors. Cross-site scripting (XSS) vulnerability in the web server on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. SQL injection vulnerability on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | 3.7 | null |
GHSA-892q-vr75-r4j3
|
When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[] | 8.7 | 7.5 | null | null |
|
CVE-2024-57225
|
Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function.
|
[] | null | 9.8 | null | null |
|
GHSA-r5q5-ggcw-9wg5
|
Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.
|
[] | null | null | null | null |
|
RHSA-2016:0502
|
Red Hat Security Advisory: python-django security update
|
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
GHSA-4v6v-34r8-27m4
|
IrfanView WBZ plugin WB1 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WB1 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22718.
|
[] | null | null | 7.8 | null |
|
CVE-2024-6497
|
SEO Plugin by Squirrly SEO <= 12.3.19 - Authenticated (Contributor+) SQL Injection via url Parameter
|
The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 12.3.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:cifi:seo_plugin_by_squirrley_seo:12.3.19:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2018-21053
|
An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. There is Clipboard access in the lockscreen state via a physical keyboard. The Samsung ID is SVE-2018-12684 (October 2018).
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | 4.6 | null | 2.1 |
|
GHSA-cgfm-xwp7-2cvr
|
Sanitize-html Vulnerable To REDoS Attacks
|
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
|
[] | null | 7.5 | null | null |
CVE-2020-28365
|
Sentrifugo 3.2 allows Stored Cross-Site Scripting (XSS) vulnerability by inserting a payload within the X-Forwarded-For HTTP header during the login process. When an administrator looks at logs, the payload is executed. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
[
"cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-c3px-v9c7-m734
|
Prototype Pollution in mithril
|
Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`.RecommendationIf you are using mithril 2.x, upgrade to version 2.0.2 or later.
If you are using mithril 1.x, upgrade to version 1.1.7 or later.
|
[] | null | null | null | null |
GHSA-9v4v-7vv2-wr82
|
The Listeo WordPress theme before 1.6.11 did not properly sanitise some parameters in its Search, Booking Confirmation and Personal Message pages, leading to Cross-Site Scripting issues
|
[] | null | null | null | null |
|
GHSA-jf2x-r8ch-mw45
|
Group-Office before 2.16-13 does not properly validate user IDs, which allows remote attackers to obtain sensitive information via certain requests for (1) message.php and (2) messages.php in modules/email/. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null |
|
CVE-2021-40126
|
Cisco Umbrella Email Enumeration Vulnerability
|
A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user's email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system.
|
[
"cpe:2.3:a:cisco:umbrella:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-q3mg-hh3m-f7pm
|
A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua (users endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to enumerate users via crafted HTTP requests.
|
[] | null | 6.5 | null | null |
|
GHSA-g3hw-q3c8-4mq9
|
The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.
|
[] | null | null | null | null |
|
CVE-2021-24296
|
WP Customer Reviews < 3.5.6 - Authenticated Stored Cross-Site Scripting (XSS)
|
The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled
|
[
"cpe:2.3:a:gowebsolutions:wp_customer_reviews:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
GHSA-p838-m8cm-w2xf
|
On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, or 12.1.0-12.1.3.7, or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
|
[] | null | null | 7.2 | null |
|
CVE-2008-2565
|
Multiple SQL injection vulnerabilities in PHP Address Book 3.1.5 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) view.php and (2) edit.php. NOTE: it was later reported that 4.0.x is also affected.
|
[
"cpe:2.3:a:php-address_book:php-address_book:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php-address_book:php-address_book:3.4.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-4289
|
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 176332.
|
[
"cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.5:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
GHSA-x42j-7wwr-wxrm
|
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.
|
[] | null | null | null | null |
|
CVE-2001-0464
|
Buffer overflow in websync.exe in Cyberscheduler allows remote attackers to execute arbitrary commands via a long tzs (timezone) parameter.
|
[
"cpe:2.3:a:crosswind:cyberscheduler:2.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-8xmp-x69h-8jfq
|
An issue was discovered on D-Link 6600-AP, DWL-3600AP, and DWL-8610AP Ax 4.2.0.14 21/03/2019 devices. There is post-authenticated Certificate and RSA Private Key extraction through an insecure sslcert-get.cgi HTTP command.
|
[] | null | null | null | null |
|
CVE-2017-2871
|
Insufficient security checks exist in the recovery procedure used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. An attacker who is in the same subnetwork of the camera or has remote administrator access can fully compromise the device by performing a firmware recovery using a custom image.
|
[
"cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*",
"cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*"
] | null | null | 9.6 | null |
|
RHSA-2024:0005
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
GHSA-q97c-6vfp-vgp5
|
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
|
[] | null | null | null | null |
|
CVE-2023-6984
|
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
|
CVE-2022-2785
|
Arbitrary Memory read in BPF Linux Kernel
|
There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
CVE-2024-49393
|
Mutt: neomutt: to and cc email header fields are not protected by cryptographic signing
|
In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.
|
[
"cpe:/o:redhat:enterprise_linux:10",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:2.3:a:mutt:mutt:-:*:*:*:*:*:*:*",
"cpe:2.3:a:neomutt:neomutt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-mr27-qqp8-73rc
|
Cross-site scripting (XSS) vulnerability in SemanticScuttle before 0.90 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to the (1) username and (2) profile page.
|
[] | null | null | null | null |
|
CVE-2024-44217
|
A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in iOS 18 and iPadOS 18. Password autofill may fill in passwords after failing authentication.
|
[
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
GHSA-pg2w-hcm2-5fww
|
The File Gallery plugin before 1.7.9.2 for WordPress does not properly escape strings, which allows remote administrators to execute arbitrary PHP code via a \' (backslash quote) in the setting fields to /wp-admin/options-media.php, related to the create_function function.
|
[] | null | null | null | null |
|
RHSA-2014:0305
|
Red Hat Security Advisory: samba security update
|
samba: clickjacking vulnerability in SWAT samba: cross-site request forgery vulnerability in SWAT samba: DoS via integer overflow when reading an EA list
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2022-27785
|
Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
|
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | null | 7.8 | null |
CVE-2018-15752
|
An issue was discovered in the MensaMax (aka com.breustedt.mensamax) application 4.3 for Android. Cleartext Transmission of Sensitive Information allows man-in-the-middle attackers to eavesdrop authentication information between the application and the server.
|
[
"cpe:2.3:a:mensamax:mensamax:4.3:*:*:*:*:android:*:*"
] | null | null | 8.1 | 4.3 |
|
CVE-2018-20566
|
An issue was discovered in DouCo DouPHP 1.5 20181221. It allows full path disclosure in "Smarty error: unable to read resource" error messages for a crafted installation page.
|
[
"cpe:2.3:a:douco:douphp:1.5:20181221:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.