id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2020-19850 | An issue found in Directus API v.2.2.0 allows a remote attacker to cause a denial of service via a great amount of HTTP requests. | [
"cpe:2.3:a:monospace:directus:2.2.0:*:*:*:*:-:*:*"
]
| null | 6.5 | null | null |
|
GHSA-h6g8-26w8-pwgp | NVIDIA Virtual GPU Manager and the guest drivers contain a vulnerability in vGPU plugin, in which there is the potential to execute privileged operations, which may lead to denial of service. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3). | []
| null | null | null | null |
|
CVE-2025-0063 | SQL Injection vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform | SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability. | []
| null | 8.8 | null | null |
CVE-2020-4461 | IBM Security Access Manager Appliance 9.0.7.1 could allow an authenticated user to bypass security by allowing id_token claims manipulation without verification. IBM X-Force ID: 181481. | [
"cpe:2.3:a:ibm:security_access_manager:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
|
CVE-2015-6523 | Cross-site request forgery (CSRF) vulnerability in the Portfolio plugin before 1.05 for WordPress allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via a request to the instagram-portfolio page in wp-admin/options-general.php. | [
"cpe:2.3:a:portfolio_project:portfolio:*:*:*:*:*:wordpress:*:*"
]
| null | null | null | 6.8 |
|
GHSA-7w62-3gcr-qh6w | The wp-customer-reviews plugin before 3.0.9 for WordPress has XSS in the admin tools. | []
| null | null | null | null |
|
GHSA-wpgx-q62h-3583 | Unspecified vulnerability in the Oracle Forms component in Oracle Application Server 10.1.2.2 and E-Business Suite 12.0.3 allows remote attackers to affect integrity via unknown vectors, aka AS04. | []
| null | null | null | null |
|
ICSA-23-353-03 | EFACEC UC 500E | An attacker with network access could perform a man-in-the-middle (MitM) attack and capture sensitive information to gain unauthorized access to the application. An attacker could construct a URL within the application that causes a redirection to an arbitrary external domain and could be leveraged to facilitate phishing attacks against application users. An attacker could create malicious requests to obtain sensitive information about the web server. A user without administrator permissions with access to the UC500 windows system could perform a memory dump of the running processes and extract clear credentials or valid session tokens. | []
| null | null | 4.1 | null |
GHSA-55p7-xf3g-w3ch | Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function. | []
| null | 7.5 | null | null |
|
GHSA-r278-g84p-6h4c | ExamSys 9150244 allows SQL Injection via the /Support/action/Pages.php s_score2 parameter. | []
| null | 7.5 | null | null |
|
CVE-2020-28646 | ownCloud owncloud/client before 2.7 allows DLL Injection. The desktop client loaded development plugins from certain directories when they were present. | [
"cpe:2.3:a:owncloud:owncloud_desktop_client:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.4 |
|
GHSA-g85f-p8cx-jgq6 | Microsoft Word 2003 SP2 and SP3 on Windows XP SP3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed .doc file containing an embedded image, as demonstrated by word2003forkbomb.doc, related to a "fork bomb" issue. | []
| null | null | null | null |
|
CVE-2024-20669 | Secure Boot Security Feature Bypass Vulnerability | Secure Boot Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
CVE-2024-1316 | Event Tickets and Registration < 5.8.1 - Contributor+ Arbitrary Events Access | The Event Tickets and Registration WordPress plugin before 5.8.1, Events Tickets Plus WordPress plugin before 5.9.1 does not prevent users with at least the contributor role from leaking the existence of certain events they shouldn't have access to. (e.g. draft, private, pending review, pw-protected, and trashed events). | [
"cpe:2.3:a:theeventscalendar:eventbrite_tickets:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2017-13005 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-99w4-659f-342w | lib/codebook.c in libvorbis before 1.3.6, as used in StepMania 5.0.12 and other products, has insufficient array bounds checking via a crafted OGG file. | []
| null | 6.5 | null | null |
|
CVE-2023-51210 | SQL injection vulnerability in Webkul Bundle Product 6.0.1 allows a remote attacker to execute arbitrary code via the id_product parameters in the UpdateProductQuantity function. | [
"cpe:2.3:a:webkul:bundle_product:6.0.1:*:*:*:*:prestashop:*:*"
]
| null | 9.8 | null | null |
|
GHSA-hqjf-gj2q-64ch | Inappropriate implementation in BFCache in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially obtain user information via a crafted HTML page. (Chromium security severity: Medium) | []
| null | 5.4 | null | null |
|
GHSA-p4g5-x4m6-rpr2 | Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations. | []
| null | null | null | null |
|
CVE-2024-3823 | Base64 Encoder/Decoder <= 0.9.2 - Stored XSS via CSRF | The Base64 Encoder/Decoder WordPress plugin through 0.9.2 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | []
| null | 2.4 | null | null |
CVE-2024-3439 | SourceCodester Prison Management System login.php sql injection | A vulnerability was found in SourceCodester Prison Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /Account/login.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259692. | [
"cpe:2.3:a:prison_management_system_project:prison_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 7.3 | 7.3 | 7.5 |
CVE-2006-0668 | SQL injection vulnerability in index.php in PwsPHP 1.2.3 allows remote attackers to execute arbitrary SQL commands via the id parameter, possibly in message.php in the espace_membre module. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:pwsphp:pwsphp:1.2.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2018:1463 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) JDK: unspecified vulnerability fixed in 7u171, 8u161, and 9.0.4 (JavaFX) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Installer) OpenJDK: GSS context use-after-free (JGSS, 8186212) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142) | [
"cpe:/a:redhat:network_satellite:5.8::el6"
]
| null | null | 4.3 | null |
CVE-2019-16771 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria | Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97.0. Potential impacts of this vulnerability include cross-user defacement, cache poisoning, Cross-site scripting (XSS), and page hijacking. | [
"cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*"
]
| null | 4.8 | null | null |
CVE-2018-20499 | An issue was discovered in GitLab Community and Enterprise Edition before 11.x before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows SSRF. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
]
| null | 7.2 | null | 6.4 |
|
CVE-2024-12793 | PbootCMS IndexController.php path traversal | A vulnerability, which was classified as problematic, has been found in PbootCMS up to 5.2.3. Affected by this issue is some unknown functionality of the file apps/home/controller/IndexController.php. The manipulation of the argument tag leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.2.4 is able to address this issue. It is recommended to upgrade the affected component. | [
"cpe:2.3:a:pbootcms:pbootcms:*:*:*:*:*:*:*:*"
]
| 5.3 | 4.3 | 4.3 | 4 |
CVE-2020-15849 | Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework's bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488). | [
"cpe:2.3:a:re-desk:re\\:desk:2.3:*:*:*:*:*:*:*"
]
| null | 7.2 | null | 6.5 |
|
GHSA-777h-w3h9-x4qv | ntpd will crash if the server is not NTS-enabled (no certificate) and it receives an NTS-enabled client request (mode 3). | []
| null | 7.5 | null | null |
|
CVE-2012-4417 | GlusterFS 3.3.0, as used in Red Hat Storage server 2.0, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names. | [
"cpe:2.3:a:gluster:glusterfs:3.3.0:*:*:*:*:*:*:*"
]
| null | null | null | 3.6 |
|
GHSA-hvrj-g9mx-rqcq | Multiple SQL injection vulnerabilities in TeamPass before 2.1.20 allow remote attackers to execute arbitrary SQL commands via the login parameter in a (1) send_pw_by_email or (2) generate_new_password action in sources/main.queries.php; iDisplayStart parameter to (3) datatable.logs.php or (4) a file in source/datatable/; or iDisplayLength parameter to (5) datatable.logs.php or (6) a file in source/datatable/; or allow remote authenticated users to execute arbitrary SQL commands via a sSortDir_ parameter to (7) datatable.logs.php or (8) a file in source/datatable/. | []
| null | null | null | null |
|
GHSA-w4j8-vf5m-3g67 | A CWE-79 Improper Neutralization of Input During Web Page Generation vulnerability
exists that could cause compromise of a user’s browser when an attacker with admin privileges
has modified system values. | []
| null | 4.8 | null | null |
|
RHSA-2014:0792 | Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update | Seam: RCE via unsafe logging in AuthenticationFilter | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
]
| null | null | null | null |
CVE-2023-37733 | An arbitrary file upload vulnerability in tduck-platform v4.0 allows attackers to execute arbitrary code via a crafted HTML file. | [
"cpe:2.3:a:tduckcloud:tduck-platform:4.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-f76r-m7g3-x93v | Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111. | []
| null | null | null | null |
|
CVE-2021-30633 | Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
| null | 9.6 | null | 6.8 |
|
CVE-2005-3837 | Cross-site scripting (XSS) vulnerability in the search module in sCssBoard 1.2 and 1.12, and earlier versions, allows remote attackers to inject arbitrary web script or HTML via the search_term parameter. | [
"cpe:2.3:a:scssboard:scssboard:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:scssboard:scssboard:1.12:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2021-4344 | The Frontend File Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to, and including, 18.2. This is due to lacking mishandling the use of user IDs that is accessible by the visitor. This makes it possible for unauthenticated or authenticated attackers to access the information and privileges of other users, including 'guest users', in their own category (authenticated, or unauthenticated guests). | [
"cpe:2.3:a:najeebmedia:frontend_file_manager_plugin:*:*:*:*:*:wordpress:*:*"
]
| null | 6.4 | null | null |
|
CVE-2023-51592 | BlueZ Audio Profile AVRCP parse_media_folder Out-Of-Bounds Read Information Disclosure Vulnerability | BlueZ Audio Profile AVRCP parse_media_folder Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device.
The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20854. | [
"cpe:2.3:a:bluez:bluez:5.66:*:*:*:*:*:*:*"
]
| null | null | 5.4 | null |
GHSA-f2fp-44fh-jxwr | SQL injection vulnerability in index.php in Mambo Open Source 4.5 stable 1.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. | []
| null | null | null | null |
|
CVE-2024-7967 | Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-25fx-mxc2-76g7 | Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS | ImpactURL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last name.
Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication.PatchesThe problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1**WorkaroundsOne can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method.
Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback.For more informationIf you have any questions or comments about this advisory:Open an issue in Sylius/PayPalPlugin issuesEmail us at security at sylius dot com | []
| null | 7.5 | null | null |
GHSA-668r-v4cc-q5m6 | CCCSoftware CCC PHP script allows remote attackers to include arbitrary files from remote web sites via an HTTP request that sets the includedir variable. | []
| null | null | null | null |
|
GHSA-cx5r-83xq-rv5h | An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the "kext tools" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app that performs kext loading. | []
| null | null | 7.8 | null |
|
GHSA-hc82-w9v8-83pr | Witness Block Parsing DoS Vulnerability | ImpactAll lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected.This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC.PatchesA patch is available starting with lnd `v0.15.4`.WorkaroundsNodes can use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.Referenceshttps://github.com/lightningnetwork/lnd/issues/7096https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta | []
| null | 8.2 | null | null |
GHSA-vxf6-w9mp-95hm | Puppet supports use of IP addresses in certnames without warning of potential risks | `lib/puppet/network/authstore.rb` in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address. | []
| null | null | null | null |
CVE-2017-3512 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
]
| null | null | 8.3 | 5.1 |
|
CVE-2025-21003 | Insecure storage of sensitive information in Emergency SOS prior to SMR Jul-2025 Release 1 allows local attackers to access sensitive information. | []
| null | 4 | null | null |
|
GHSA-468j-4h4j-8vv2 | Buffer overflow in sar for SCO OpenServer 5.0.0 through 5.0.5 may allow local users to gain root privileges via a long -f parameter, a different vulnerability than CVE-1999-1570. | []
| null | null | null | null |
|
GHSA-8p7m-hxqm-w38g | The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file. | []
| null | null | null | null |
|
CVE-2015-1522 | analyzer/protocol/dnp3/DNP3.cc in Bro before 2.3.2 does not reject certain non-zero values of a packet length, which allows remote attackers to cause a denial of service (buffer overflow or buffer over-read) via a crafted DNP3 packet. | [
"cpe:2.3:a:bro:bro:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2025-1971 | Export and Import Users and Customers <= 2.6.2 - Authenticated (Admin+) PHP Object Injection via form_data Parameter | The Export and Import Users and Customers plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.2 via deserialization of untrusted input from the 'form_data' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. | []
| null | 7.2 | null | null |
GHSA-rhxq-r8cj-hcwj | The parse_command function in Genecys 0.2 and earlier allows remote attackers to cause a denial of service (crash) via a command with a missing ":" (colon) separator, which triggers a null dereference. | []
| null | null | null | null |
|
CVE-2015-1550 | Directory traversal vulnerability in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allows remote administrators to execute arbitrary files via unspecified vectors. | [
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*"
]
| null | null | null | 9 |
|
CVE-2007-2796 | Arris Cadant C3 CMTS allows remote attackers to cause a denial of service (service termination) via a malformed IP packet with an invalid IP option. | [
"cpe:2.3:h:arris:cadant_c3_cmts:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-c7fc-cm7p-92r2 | Openstack ironic-inspector has SQL injection vulnerability in node_cache | A vulnerability was found in openstack-ironic-inspector all versions excluding 5.0.2, 6.0.3, 7.2.4, 8.0.3 and 8.2.1. A SQL-injection vulnerability was found in openstack-ironic-inspector's node_cache.find_node(). This function makes a SQL query using unfiltered data from a server reporting inspection results (by a POST to the /v1/continue endpoint). Because the API is unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening. Because of how ironic-inspector uses the query results, it is unlikely that data could be obtained. However, the attacker could pass malicious data and create a denial of service. | []
| 7.2 | null | 8.3 | null |
CVE-2022-39198 | Apache Dubbo Hession Deserialization Vulnerability Gadgets Bypass | A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and prior versions; Apache Dubbo 3.1.x version 3.1.0 and prior versions. | [
"cpe:2.3:a:apache:dubbo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:dubbo:3.1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
GHSA-qh38-wrgf-cj2c | Directory Traversal in iter-server | Affected versions of `iter-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | []
| null | null | 7.5 | null |
GHSA-cgp6-x5pm-9pmp | The kernel in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an authenticated attacker to obtain memory contents via a specially crafted application. | []
| null | null | 4.7 | null |
|
GHSA-46q2-93hm-52p5 | Directory Traversal in serverlyr | Affected versions of `serverlyr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | []
| null | null | 7.5 | null |
CVE-2023-24807 | Undici vulnerable to Regular Expression Denial of Service in Headers | Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available. | [
"cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*"
]
| null | 7.5 | null | null |
GHSA-v5h5-2h64-r835 | Vulnerability in the Oracle Hospitality Guest Access component of Oracle Hospitality Applications (subcomponent: Base). Supported versions that are affected are 4.2.0.0 and 4.2.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Guest Access. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality Guest Access accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | []
| null | null | 4.3 | null |
|
RHSA-2022:5771 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 7.5 | 6.1 | null |
CVE-2011-1823 | The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
GHSA-v8qf-v8xc-74m3 | ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c. | []
| null | null | 6.5 | null |
|
GHSA-m4hj-8g93-8hh4 | Various VIVOTEK FD8*, FD9*, FE9*, IB8*, IB9*, IP9*, IZ9*, MS9*, SD9*, and other devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code. | []
| null | null | 8.8 | null |
|
CVE-2007-4653 | SQL injection vulnerability in links.php in the Links MOD 1.2.2 and earlier for phpBB 2.0.22 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter in a search action. | [
"cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-wrgm-3c24-9q9r | Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses credentials for the smb functionality of the device. Usernames and passwords for all smb users are revealed in plaintext on the smbserver.asp page. | []
| null | null | null | null |
|
CVE-2023-39512 | Stored Cross-site Scripting on data_sources.php device name view in Cacti | Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `data_sources.php` displays the data source management information (e.g. data source path, polling configuration, device name related to the datasource etc.) for different data visualizations of the _cacti_ app. _CENSUS_ found that an adversary that is able to configure a malicious device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output. | [
"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
RHSA-2024:1686 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 for OpenShift image security update | libmaxminddb: improper initialization in dump_entry_data_list() in maxminddb.c nss: vulnerable to Minerva side-channel information leak pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE | [
"cpe:/a:redhat:rhosemc:1.0::el8"
]
| null | 9.8 | null | null |
CVE-2022-22189 | Contrail Service Orchestration: An authenticated local user may have their permissions elevated via the device via management interface without authentication | An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0. | [
"cpe:2.3:a:juniper:contrail_service_orchestration:6.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:juniper:contrail_service_orchestration:6.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:juniper:contrail_service_orchestration:6.0.0:patch2:*:*:*:*:*:*"
]
| null | 7.3 | null | null |
GHSA-64hj-h2vf-7vhp | Icinga Web 2 before 2.6.2 allows parameters that break navigation dashlets, as demonstrated by a single '$' character as the Name of a Navigation item. | []
| null | null | 7.5 | null |
|
GHSA-pm69-5gmj-rpc4 | An SMI handler input validation vulnerability in the ThinkPad X1 Fold Gen 1 could allow an attacker with local access and elevated privileges to execute arbitrary code. | []
| null | 6.7 | null | null |
|
GHSA-gvhr-pgjg-87rj | Airties 5444 1.0.0.18 and 5444TT 1.0.0.18 devices allow XSS. | []
| null | null | 6.1 | null |
|
GHSA-52qc-vfpc-9q7h | The Website Toolbox Community plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘websitetoolbox_username’ parameter in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
|
GHSA-6x3m-hh2g-4gwp | A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further privileges on the ClearPass instance. | []
| null | 6.5 | null | null |
|
GHSA-xqc9-88mp-rfhw | Aria Operations for Networks contains a cross site scripting vulnerability. A malicious actor with admin privileges can inject a malicious payload into the login banner and takeover the user account. | []
| null | 4.3 | null | null |
|
CVE-2023-42147 | An issue in CloudExplorer Lite 1.3.1 allows an attacker to obtain sensitive information via the login key component. | [
"cpe:2.3:a:fit2cloud:cloudexplorer_lite:1.3.1:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2021-36961 | Windows Installer Denial of Service Vulnerability | Windows Installer Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:-:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:-:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20120:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25712:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20120:*:*:*:*:*:x64:*"
]
| null | 5.5 | null | null |
CVE-2024-23918 | Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:h:intel:3rd_generation_intel_xeon_scalable_processor_family:606a6:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f7:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f8:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:5th_generation_intel_xeon_processor_scalable_family:c06f2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d_processor:606c1:*:*:*:*:*:*:*"
]
| 8.8 | 8.8 | null | null |
|
GHSA-368q-3gfm-fh6f | Netskope was made aware of a security vulnerability in Netskope Endpoint DLP’s Content Control Driver where a double-fetch issue leads to heap overflow. The vulnerability arises from the fact that the NumberOfBytes argument to ExAllocatePoolWithTag, and the Length argument for RtlCopyMemory, both independently dereference their value from the user supplied input buffer inside the EpdlpSetUsbAction function, known as a double-fetch. If this length value grows to a higher value in between these two calls, it will result in the RtlCopyMemory call copying user-supplied memory contents outside the range of the allocated buffer, resulting in a heap overflow. A malicious attacker will need admin privileges to exploit the issue.
This issue affects Endpoint DLP version below R119. | []
| 5.6 | null | null | null |
|
GHSA-g5gh-w2mq-pjxv | A reflected XSS vulnerability was discovered in the Proforms Basic component for Joomla. | []
| null | 6.1 | null | null |
|
GHSA-f226-8488-rr3p | WebConnect 6.5, 6.4.4, and possibly earlier versions allows remote attackers to cause a denial of service (hang) via a URL containing an MS-DOS device name such as (1) AUX, (2) CON, (3) PRN, (4) COM1, or (5) LPT1. | []
| null | null | null | null |
|
RHSA-2025:8294 | Red Hat Security Advisory: varnish:6 security update | varnish: request smuggling attacks | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 8.1 | null | null |
CVE-2020-11715 | Panasonic P99 devices through 2020-04-10 have Incorrect Access Control. NOTE: the vendor states that all affected products are at "End-of-software-support." | [
"cpe:2.3:o:panasonic:p99_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:panasonic:p99:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2005-0486 | Tarantella Secure Global Desktop Enterprise Edition 4.00 and 3.42, and Tarantella Enterprise 3 3.40 and 3.30, when using RSA SecurID and multiple users have the same username, reveals sensitive information during authentication, which allows remote attackers to identify valid usernames and the authentication scheme. | [
"cpe:2.3:a:tarantella:secure_global_desktop:enterprise_3.42:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:secure_global_desktop:enterprise_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2012-0645 | Siri in Apple iOS before 5.1 does not properly restrict the ability of Mail.app to handle voice commands, which allows physically proximate attackers to bypass the locked state via a command that forwards an active e-mail message to an arbitrary recipient. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
]
| null | null | null | 1.2 |
|
CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.9 |
|
GHSA-p79r-6c8h-57c9 | Multiple cross-site request forgery (CSRF) vulnerabilities in uddigui/navigateTree.do in the UDDI user console in IBM WebSphere Application Server (WAS) before 6.1.0 Fix Pack 13 (6.1.0.13) allow remote attackers to perform some actions as WAS UDDI users via the (1) keyField, (2) nameField, (3) valueField, and (4) frameReturn parameters. | []
| null | null | null | null |
|
GHSA-3mhr-8gcj-264p | Cross-site scripting (XSS) issue in mail module in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted channel names. | []
| null | null | null | null |
|
GHSA-j9xr-q95m-m875 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface.
For more information about these vulnerabilities, see the Details section of this advisory. | []
| null | null | null | null |
|
CVE-2025-49883 | WordPress Greenmart theme <= 4.2.3 - Local File Inclusion Vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Greenmart allows PHP Local File Inclusion. This issue affects Greenmart: from n/a through 4.2.3. | []
| null | 8.1 | null | null |
CVE-2025-27685 | Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA & Private Key V-2022-001. | []
| null | 7.5 | null | null |
|
GHSA-p269-cjrj-rq9c | There is a pointer double free vulnerability in Taurus-AL00A 10.0.0.1(C00E1R1P1). There is a lack of muti-thread protection when a function is called. Attackers can exploit this vulnerability by performing malicious operation to cause pointer double free. This may lead to module crash, compromising normal service. | []
| null | null | null | null |
|
GHSA-v9fj-qg8h-9mv2 | Multiple unspecified vulnerabilities in Ethereal 0.8.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via the (1) Sniffer capture or (2) SMB PIPE dissector. | []
| null | null | null | null |
|
CVE-2025-53599 | Whale browser for iOS before 3.9.1.4206 allow an attacker to execute malicious scripts in the browser via a crafted javascript scheme. | []
| null | 9.8 | null | null |
|
GHSA-2pcw-j73g-x4xv | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | []
| null | 8.8 | null | null |
|
CVE-2021-4023 | A flaw was found in the io-workqueue implementation in the Linux kernel versions prior to 5.15-rc1. The kernel can panic when an improper cancellation operation triggers the submission of new io-uring operations during a shortage of free space. This flaw allows a local user with permissions to execute io-uring requests to possibly crash the system. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.9 |
|
CVE-2010-4271 | SQL injection vulnerability in ImpressCMS before 1.2.3 RC2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:impresscms:impresscms:*:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.1:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.2:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.3:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.1:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.3:beta:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2007-0556 | The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a "previously made query plan," which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an "ALTER COLUMN TYPE" SQL statement, which can be leveraged to read arbitrary memory from the server. | [
"cpe:2.3:a:postgresql:postgresql:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:1.09:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.6 |
|
CVE-2021-24804 | Simple JWT Login < 3.2.1 - Arbitrary Settings Update to Site Takeover via CSRF | The Simple JWT Login WordPress plugin before 3.2.1 does not have nonce checks when saving its settings, allowing attackers to make a logged in admin changed them. Settings such as HMAC verification secret, account registering and default user roles can be updated, which could result in site takeover. | [
"cpe:2.3:a:simple_jwt_login_project:simple_jwt_login:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | 6.8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.