id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2013-5673
|
SQL injection vulnerability in testimonial.php in the IndiaNIC Testimonial plugin 2.2 for WordPress allows remote attackers to execute arbitrary SQL commands via the custom_query parameter in a testimonial_add action to wp-admin/admin-ajax.php.
|
[
"cpe:2.3:a:indianic:testimonial_plugin:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-x9xj-pqmv-8jf7
|
Cross-site Scripting (XSS) in pimcore via DataObject Class date fields
|
ImpactThis vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.PatchesUpdate to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patchWorkaroundsApply patch https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patch manually.Referenceshttps://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6/
|
[] | null | null | 4 | null | null |
CVE-2020-3810
|
Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.
|
[
"cpe:2.3:a:debian:apt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-qgwf-v74m-338m
|
Multiple versions of GitLab expose sensitive user credentials when assigning a user to an issue or merge request. A fix was included in versions 8.15.8, 8.16.7, and 8.17.4, which were released on March 20th 2017 at 23:59 UTC.
|
[] | null | null | 6.3 | null | null |
|
GHSA-54g4-5cf6-hjp3
|
Apache Hive Information Exposure and Observable Timing Discrepancy
|
Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
|
[] | null | 5.9 | null | null | null |
GHSA-prm4-7jr7-cm97
|
LB-LINK BL-WR 1300H v.1.0.4 contains hardcoded credentials stored in /etc/shadow which are easily guessable.
|
[] | null | 9.8 | null | null | null |
|
GHSA-48fh-jxxv-q7v2
|
SlimFTPd 3.17 allows remote attackers to cause a denial of service (crash) via certain (1) USER and (2) PASS commands, possibly due to a buffer overflow or off-by-one error.
|
[] | null | null | null | null | null |
|
GHSA-3x59-4xhf-3r9c
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CBB Team Content Blocks Builder allows Stored XSS.This issue affects Content Blocks Builder: from n/a through 2.7.6.
|
[] | null | 6.5 | null | null | null |
|
GHSA-v32m-vc38-632r
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockBufferingSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
|
[] | 8.7 | 8.8 | null | null | null |
|
CVE-2011-0770
|
Cross-site scripting (XSS) vulnerability in Windows Event Log SmartConnector in HP ArcSight Connector Appliance before 6.1 allows remote attackers to inject arbitrary web script or HTML via the Windows XP variable in a file.
|
[
"cpe:2.3:a:hp:windows_event_log_smartconnector:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_c1000_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_c1300_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_c3200_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_c3400_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_c5200_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:arcsight_c5400_appliance:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-h6hv-h4xf-gmgh
|
A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.
|
[] | null | 4.4 | null | null | null |
|
CVE-2024-4895
|
wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin <= 3.4.2.12 - Unauthenticated Stored Cross-Site Scripting via CSV Import
|
The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the CSV import functionality in all versions up to, and including, 3.4.2.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 4.7 | null | null | null |
GHSA-8phr-8wxp-777p
|
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2023:0822
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null | null |
CVE-2006-0818
|
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
|
[
"cpe:2.3:a:deerfield:visnetic_mail_server:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:icewarp:web_mail:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:merak:mail_server:8.3.8r:*:windows:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2011-3464
|
Off-by-one error in the png_formatted_warning function in pngerror.c in libpng 1.5.4 through 1.5.7 might allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors, which trigger a stack-based buffer overflow.
|
[
"cpe:2.3:a:libpng:libpng:1.5.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.7:beta:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-m267-8vw8-g9w3
|
The WooCommerce PDF Invoices & Packing Slips WordPress plugin before 3.0.1 does not sanitise and escape some parameters before outputting them back in an attributes of an admin page, leading to Reflected Cross-Site Scripting.
|
[] | null | 6.1 | null | null | null |
|
CVE-2012-4991
|
Multiple directory traversal vulnerabilities in Axway SecureTransport 5.1 SP2 and earlier allow remote authenticated users to (1) read, (2) delete, or (3) create files, or (4) list directories, via a ..%5C (encoded dot dot backslash) in a URI.
|
[
"cpe:2.3:a:axway:securetransport:*:sp2:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
CVE-2008-5252
|
Cross-site request forgery (CSRF) vulnerability in the Special:Import feature in MediaWiki 1.3.0 through 1.6.10, 1.12.x before 1.12.2, and 1.13.x before 1.13.3 allows remote attackers to perform unspecified actions as authenticated users via unknown vectors.
|
[
"cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.13.2:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
cisco-sa-asaftd-sipdos-3DGvdjvg
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SIP Denial of Service Vulnerability
|
Update from October 22nd, 2020: Cisco has become aware of a new Cisco Adaptive Security Appliance vulnerability that could affect the fixed releases recommended for code trains 9.13 and 9.14 in the Fixed Software ["#fs"] section of this advisory. See the Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy"] for additional information.
A vulnerability in the SIP inspection process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.
The vulnerability is due to a watchdog timeout and crash during the cleanup of threads that are associated with a SIP connection that is being deleted from the connection list. An attacker could exploit this vulnerability by sending a high rate of crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a watchdog timeout and crash, resulting in a crash and reload of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.8 | null | null | null |
CVE-2006-1078
|
Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
|
[
"cpe:2.3:a:acme_labs:thttpd:2.25b:*:*:*:*:*:*:*"
] | null | 8.4 | null | 7.2 | null |
|
CVE-2021-3976
|
Cross-Site Request Forgery (CSRF) in kevinpapst/kimai2
|
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF)
|
[
"cpe:2.3:a:kimai:kimai_2:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
CVE-2010-1860
|
The html_entity_decode function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal call, related to the call time pass by reference feature.
|
[
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-w82p-4ch4-2pv5
|
The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘res_width_value’ parameter within the plugin's tp_page_scroll widget in all versions up to, and including, 5.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2024-29789
|
WordPress OneClick Chat to Order plugin <= 1.0.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Walter Pinem OneClick Chat to Order allows Stored XSS.This issue affects OneClick Chat to Order: from n/a through 1.0.5.
|
[] | null | 6.5 | null | null | null |
CVE-2025-26961
|
WordPress Fresh Framework plugin <= 1.70.0 - Unauthenticated Broken Access Control vulnerability
|
Missing Authorization vulnerability in NotFound Fresh Framework allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Fresh Framework: from n/a through 1.70.0.
|
[] | null | 8.6 | null | null | null |
GHSA-2q27-4jj5-ppf3
|
IBM Maximo Mobile 8.7 and 8.8 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 237407.
|
[] | null | 5.5 | null | null | null |
|
GHSA-f922-pj6q-349r
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
CVE-2017-15801
|
XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dll file that is mishandled during an attempt to render the DLL icon, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77310000!LdrpResSearchResourceInsideDirectory+0x000000000000029e."
|
[
"cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-76mc-v2gg-8554
|
Multiple buffer overflows in purity 1-16 allow local users to gain privileges and modify high scores tables.
|
[] | null | null | null | null | null |
|
GHSA-cw5c-p8h6-gfwg
|
Heap-based buffer overflow in elcsoft.exe in Eaton ELCSoft 2.4.01 and earlier allows remote authenticated users to execute arbitrary code via a crafted file.
|
[] | null | null | 6 | null | null |
|
CVE-2024-52430
|
WordPress Lis Video Gallery plugin <= 0.2.1 - PHP Object Injection vulnerability
|
Deserialization of Untrusted Data vulnerability in Lis Lis Video Gallery allows Object Injection.This issue affects Lis Video Gallery: from n/a through 0.2.1.
|
[
"cpe:2.3:a:lis:video_gallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lis:video_gallery:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
GHSA-c25p-4rwf-hhq6
|
An issue was discovered on Samsung mobile devices with any (before September 2019 for SMP1300 Exynos modem chipsets) software. Attackers can trigger stack corruption in the Shannon modem via a crafted RP-Originator/Destination address. The Samsung ID is SVE-2019-14858 (September 2019).
|
[] | null | null | null | null | null |
|
CVE-2015-6685
|
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) by using the Format action for unspecified fields, a different vulnerability than CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2025:2449
|
Red Hat Security Advisory: OpenShift Container Platform 4.18.4 security update
|
mholt/archiver: path traversal vulnerability buildah: Buildah allows arbitrary directory mount golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html kernel: HID: core: zero-initialize the report buffer distribution: Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT
|
[
"cpe:/a:redhat:openshift:4.18::el9"
] | null | 6.5 | null | null | null |
GHSA-qxjg-jhgw-qhrv
|
org.xwiki.platform:xwiki-platform-panels-ui vulnerable to Eval Injection
|
ImpactAny user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of UIX parametersA proof of concept exploit is to log in, add an `XWiki.UIExtensionClass` xobject to the user profile page, with an Extension Parameters content of:Then, navigating to `PanelsCode.ApplicationsPanelConfigurationSheet` (i.e., `<xwiki-host>/xwiki/bin/view/PanelsCode/ApplicationsPanelConfigurationSheet` where `<xwiki-host>` is the URL of your XWiki installation) should not execute the Groovy script. If it does, you will see `Hello from groovy!` displayed on the screen.PatchesThe vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1WorkaroundsThe issue can be fixed by editing the `PanelsCode.ApplicationsPanelConfigurationSheet` wiki page and making the same modifications as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc) for this issue.Referenceshttps://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dchttps://jira.xwiki.org/browse/XWIKI-20294For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[] | null | 9.9 | null | null | null |
CVE-2017-14618
|
Cross-site scripting (XSS) vulnerability in inc/PMF/Faq.php in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the Questions field in an "Add New FAQ" action.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2016-0060
|
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0061, CVE-2016-0063, CVE-2016-0067, and CVE-2016-0072.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
CVE-2023-34060
|
VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 10.5 from
an older version. On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with network access to the appliance can bypass login
restrictions when authenticating on port 22 (ssh) or port 5480 (appliance management console) . This bypass is not present on port 443 (VCD provider
and tenant login). On a new installation of VMware Cloud Director Appliance 10.5, the bypass is not present. VMware Cloud Director Appliance is impacted since it uses an affected version of sssd from the underlying Photon OS. The sssd issue is no longer present in versions of Photon OS that ship with sssd-2.8.1-11 or higher (Photon OS 3) or sssd-2.8.2-9 or higher (Photon OS 4 and 5).
|
[
"cpe:2.3:a:vmware:cloud_director:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:photon_os:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-jjcj-5hm4-fh8v
|
win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2381.
|
[] | null | null | null | null | null |
|
CVE-2018-11130
|
The header::add_FORMAT_descriptor function in header.cpp in VCFtools 0.1.15 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted vcf file.
|
[
"cpe:2.3:a:vcftools_project:vcftools:0.1.15:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
RHSA-2022:8847
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (protobuf) security update
|
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null | null |
GHSA-mjg9-3572-g437
|
Tenda AX12 V22.03.01.21_CN is vulnerable to Buffer Overflow. This overflow is triggered in the sub_42FDE4 function, which satisfies the request of the upper-level interface function sub_430124, that is, handles the post request under /goform/SetIpMacBind.
|
[] | null | 5.5 | null | null | null |
|
GHSA-475x-m5p2-cpmx
|
The Admin CP in vBulletin 5.6.3 allows XSS via an Announcement Title to Channel Manager.
|
[] | null | null | null | null | null |
|
CVE-2024-24801
|
WordPress OWL Carousel Plugin <= 1.4.0 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LogicHunt OWL Carousel – WordPress Owl Carousel Slider allows Stored XSS.This issue affects OWL Carousel – WordPress Owl Carousel Slider: from n/a through 1.4.0.
|
[
"cpe:2.3:a:logichunt:owl_carousel:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-9vr5-w737-m66g
|
Nomad Enterprise (“Nomad”) jobs using the policy override option are bypassing the mandatory sentinel policies. This vulnerability, identified as CVE-2025-3744, is fixed in Nomad Enterprise 1.10.1, 1.9.9, and 1.8.13.
|
[] | null | 7.6 | null | null | null |
|
GHSA-884f-qmw7-8v2m
|
SQL injection vulnerability in productdetails.php in iScripts MultiCart 2.0 allows remote authenticated users to execute arbitrary SQL commands via the productid parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-49795
|
rethook: fix a potential memleak in rethook_alloc()
|
In the Linux kernel, the following vulnerability has been resolved:
rethook: fix a potential memleak in rethook_alloc()
In rethook_alloc(), the variable rh is not freed or passed out
if handler is NULL, which could lead to a memleak, fix it.
[Masami: Add "rethook:" tag to the title.]
Acke-by: Masami Hiramatsu (Google) <mhiramat@kernel.org>
|
[] | null | null | null | null | null |
GHSA-4fvr-x23f-jwc4
|
An issue was discovered in the HTTP2 implementation in Qt before 5.15.17, 6.x before 6.2.11, 6.3.x through 6.5.x before 6.5.4, and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check.
|
[] | null | 9.8 | null | null | null |
|
GHSA-59cr-vcc4-mpf4
|
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Monitoring-Setup.php tet parameter.
|
[] | null | null | null | null | null |
|
GHSA-94r3-gpvr-mxj8
|
A vulnerability in the Cisco IOS Software forwarding queue of Cisco 2960X and 3750X switches could allow an unauthenticated, adjacent attacker to cause a memory leak in the software forwarding queue that would eventually lead to a partial denial of service (DoS) condition. More Information: CSCva72252. Known Affected Releases: 15.2(2)E3 15.2(4)E1. Known Fixed Releases: 15.2(2)E6 15.2(4)E3 15.2(5)E1 15.2(5.3.28i)E1 15.2(6.0.49i)E 3.9(1)E.
|
[] | null | null | 4.7 | null | null |
|
GHSA-qwwg-7j2c-jv6p
|
Vulnerability in the Oracle Social Network component of Oracle Fusion Middleware (subcomponent: Android Client). The supported version that is affected is prior to 11.1.12.0.0 (17019101). Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Social Network. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Social Network accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 7.5 | null | null |
|
PYSEC-2021-761
| null |
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/to_tf_record_op.cc#L93-L102) assumes that all records in the dataset are of string type. However, there is no check for that, and the example given above uses numeric types. We have patched the issue in GitHub commit e0b6e58c328059829c3eb968136f17aa72b6c876. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
GHSA-w6g3-r938-vj7f
|
Insufficiently protected credentials in DAV server settings in 1C-Bitrix Bitrix24 23.300.100 allows remote administrators to read Exchange account passwords via HTTP GET request.
|
[] | null | 6.8 | null | null | null |
|
CVE-2023-52353
|
An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_session_reset, the maximum negotiable TLS version is mishandled. For example, if the last connection negotiated TLS 1.2, then 1.2 becomes the new maximum.
|
[
"cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2020-16234
|
FATEK Automation PLC WinProladder
|
In PLC WinProladder Version 3.28 and prior, a stack-based buffer overflow vulnerability can be exploited when a valid user opens a specially crafted file, which may allow an attacker to remotely execute arbitrary code.
|
[
"cpe:2.3:a:fatek:winproladder:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
CVE-2022-4243
|
ImageInject <= 1.17 - Admin+ Stored XSS
|
The ImageInject WordPress plugin through 1.17 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:wpscoop:imageinject:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null | null |
CVE-2024-4596
|
Kimai Session information disclosure
|
A vulnerability was found in Kimai up to 2.15.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Session Handler. The manipulation of the argument PHPSESSIONID leads to information disclosure. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 2.16.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-263318 is the identifier assigned to this vulnerability.
|
[] | null | 3.7 | 3.7 | 2.6 |
https://github.com/kimai/kimai/releases/tag/2.16.0
|
RHSA-2018:0057
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 9.0 (Mitaka).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:redhat:openstack:9::el7"
] | null | null | null | null | null |
CVE-2025-22113
|
ext4: avoid journaling sb update on error if journal is destroying
|
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid journaling sb update on error if journal is destroying
Presently we always BUG_ON if trying to start a transaction on a journal marked
with JBD2_UNMOUNT, since this should never happen. However, while ltp running
stress tests, it was observed that in case of some error handling paths, it is
possible for update_super_work to start a transaction after the journal is
destroyed eg:
(umount)
ext4_kill_sb
kill_block_super
generic_shutdown_super
sync_filesystem /* commits all txns */
evict_inodes
/* might start a new txn */
ext4_put_super
flush_work(&sbi->s_sb_upd_work) /* flush the workqueue */
jbd2_journal_destroy
journal_kill_thread
journal->j_flags |= JBD2_UNMOUNT;
jbd2_journal_commit_transaction
jbd2_journal_get_descriptor_buffer
jbd2_journal_bmap
ext4_journal_bmap
ext4_map_blocks
...
ext4_inode_error
ext4_handle_error
schedule_work(&sbi->s_sb_upd_work)
/* work queue kicks in */
update_super_work
jbd2_journal_start
start_this_handle
BUG_ON(journal->j_flags &
JBD2_UNMOUNT)
Hence, introduce a new mount flag to indicate journal is destroying and only do
a journaled (and deferred) update of sb if this flag is not set. Otherwise, just
fallback to an un-journaled commit.
Further, in the journal destroy path, we have the following sequence:
1. Set mount flag indicating journal is destroying
2. force a commit and wait for it
3. flush pending sb updates
This sequence is important as it ensures that, after this point, there is no sb
update that might be journaled so it is safe to update the sb outside the
journal. (To avoid race discussed in 2d01ddc86606)
Also, we don't need a similar check in ext4_grp_locked_error since it is only
called from mballoc and AFAICT it would be always valid to schedule work here.
|
[] | null | null | null | null | null |
CVE-2016-0769
|
Multiple SQL injection vulnerabilities in eshop-orders.php in the eShop plugin 6.3.14 for WordPress allow (1) remote administrators to execute arbitrary SQL commands via the delid parameter or remote authenticated users to execute arbitrary SQL commands via the (2) view, (3) mark, or (4) change parameter.
|
[
"cpe:2.3:a:elfden:eshop_plugin:6.3.14:*:*:*:*:wordpress:*:*"
] | null | null | 8.8 | 6.5 | null |
|
GHSA-hh4j-jwjv-8726
|
When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6.
|
[] | null | 7.7 | null | null | null |
|
GHSA-gvpv-mmxx-g3g2
|
Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
|
[] | null | null | null | null | null |
|
CVE-2025-4758
|
PHPGurukul Beauty Parlour Management System contact.php sql injection
|
A vulnerability classified as critical has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected is an unknown function of the file /contact.php. The manipulation of the argument fname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2024-54116
|
Out-of-bounds read vulnerability in the M3U8 module
Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.
|
[
"cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
CVE-2023-32784
|
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
|
[
"cpe:2.3:a:keepass:keepass:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-cmfh-jgfm-976r
|
Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted navigation to blob URLs with non-canonical origins, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.
|
[] | null | null | 6.5 | null | null |
|
CVE-2021-45622
|
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, EAX20 before 1.0.0.58, EAX80 before 1.0.1.68, EX7500 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6400 before 1.0.1.70, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.38, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, XR1000 before 1.0.0.58, and XR300 before 1.0.3.68.
|
[
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax35v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax35v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax40v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax40v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null | null |
|
GHSA-f3xm-77gw-ff6m
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force WP Remote Site Search allows Stored XSS.This issue affects WP Remote Site Search: from n/a through 1.0.4.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-25737
|
An invalid downcast from <code>nsTextNode</code> to <code>SVGElement</code> could have lead to undefined behavior. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-4862
|
WPBITS Addons For Elementor Page Builder <= 1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Widgets
|
The WPBITS Addons For Elementor Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-vr22-43gj-rx3f
|
omniauth-weibo-oauth2 included a code-execution backdoor inserted by a third party
|
The omniauth-weibo-oauth2 gem 0.4.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions through 0.4.5, and 0.5.1 and later, are unaffected.
|
[] | null | 9.8 | null | null | null |
GHSA-gghw-gggj-qg54
|
Buffer overflow in MyWeb 3.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request.
|
[] | null | null | null | null | null |
|
GHSA-6rhm-fw89-rh2q
|
It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.
|
[] | null | 9.8 | null | null | null |
|
GHSA-hr49-vp2p-pwx4
|
Realm CMS 2.3 and earlier allows remote attackers to obtain sensitive information via a direct request to _db/compact.asp, which reveals the database path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-3jf9-v66x-vj9v
|
Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.
|
[] | null | null | null | null | null |
|
GHSA-fp6q-7cxg-f24x
|
The issue was addressed with improved input validation. This issue is fixed in watchOS 11.5, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-14734
|
drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
GHSA-j59v-5r8g-r37v
|
The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.
|
[] | null | null | null | null | null |
|
GHSA-p488-8qx8-6w78
|
There is potential for memory corruption in the RIL daemon due to de reference of memory outside the allocated array length in RIL in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in versions MDM9206, MDM9607, MDM9635M, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM439, SDM630, SDM660, ZZ_QCS605.
|
[] | null | null | 7.8 | null | null |
|
GHSA-x52m-rpmj-3vrc
|
A design flaw in the Trane ComfortLink II SCC firmware version 2.0.2 service allows remote attackers to take complete control of the system.
|
[] | null | null | 9.8 | null | null |
|
CVE-2025-53512
|
Sensitive log retrieval in Juju
|
The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.
|
[] | null | 6.5 | null | null | null |
CVE-2020-13167
|
Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
|
[
"cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2014-3093
|
IBM PowerVC 1.2.0 before FP3 and 1.2.1 before FP2 uses cleartext passwords in (1) api-paste.ini, (2) debug logs, (3) the installation process, (4) environment checks, (5) powervc-ldap-config, (6) powervc-restore, and (7) powervc-diag, which allows local users to obtain sensitive information by entering a ps command or reading a file.
|
[
"cpe:2.3:a:ibm:powervc:1.2.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.1:*:*:*:standard:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-994h-393c-95jf
|
Vanilla before 2.6.1 allows XSS via the email field of a profile.
|
[] | null | null | 6.1 | null | null |
|
GHSA-rj52-34h2-2r62
|
Improper permissions in the installer for the Intel(R) Mailbox Interface driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
GHSA-5r6p-p9r6-r326
|
Improper Encoding or Escaping of Output in Jenkins Configuration as Code Plugin
|
Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.
|
[] | null | 5.4 | null | null | null |
CVE-2017-8560
|
Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability". This CVE ID is unique from CVE-2017-8559.
|
[
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_16:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_5:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-8267-5rqr-mwq9
|
Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the cmd parameter in the bs_SetCmd function.
|
[] | null | 9.8 | null | null | null |
|
GHSA-g5f8-w583-m28g
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Swings Membership For WooCommerce allows DOM-Based XSS. This issue affects Membership For WooCommerce: from n/a through 2.8.0.
|
[] | null | 6.5 | null | null | null |
|
RHEA-2013:1032
|
Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Node Release Advisory
|
stapler-adjunct-zeroclipboard: XSS via copying XSS payload into buffer Jenkins: Build Description XSS Jenkins: Multiple CSRF in MavenAbstractArtifactRecord.doRedeploy and Jenkins.doEval
|
[
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null | null |
CVE-2019-20166
|
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_dump() in isomedia/box_dump.c.
|
[
"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gpac:gpac:0.9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2021-27430
|
GE UR family hardcoded credentials
|
GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR.
|
[
"cpe:2.3:a:ge:ur_bootloader_binary:7.00:*:*:*:*:*:*:*",
"cpe:2.3:a:ge:ur_bootloader_binary:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:ge:ur_bootloader_binary:7.02:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
GHSA-92qx-6hh4-6pcx
|
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Setting the user's name to JS code makes that code execute when selecting that user's "Templates" folder from OX Documents settings. This requires the folder to be shared to the victim. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
|
[] | null | null | 6.1 | null | null |
|
CVE-2007-4571
|
The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-p572-p2rj-q5f4
|
Umbraco Forms components vulnerable to Stored Cross-site Scripting
|
ImpactAuthenticated user that has access to edit Forms may inject unsafe code into Forms components.PatchesIssue can be mitigated by configuring TitleAndDescription:AllowUnsafeHtmlRendering after upgrading to patched versions (13.0.1, 12.2.2, 10.5.3, 8.13.13).Referenceshttps://docs.umbraco.com/umbraco-forms/release-notes#id-13.0.1-january-16th-2024
https://docs.umbraco.com/umbraco-forms/v/12.forms.latest/release-notes#id-12.2.2-january-16th-2024
https://docs.umbraco.com/umbraco-forms/v/10.forms.latest/release-notes
https://docs.umbraco.com/umbraco-forms/developer/configuration#editing-configuration-values
|
[] | null | 2.7 | null | null | null |
GHSA-r5p4-93xq-wq75
|
The Function bind implementation in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623.
|
[] | null | null | null | null | null |
|
CVE-2021-29794
|
IBM Tivoli Netcool/Impact 7.1.0.20 and 7.1.0.21 uses an insecure SSH server configuration which enables weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 203556.
|
[
"cpe:2.3:a:ibm:tivoli_netcool\\/impact:7.1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_netcool\\/impact:7.1.0.21:*:*:*:*:*:*:*"
] | null | null | 5.9 | null | null |
|
GHSA-7mq7-qj57-fvfw
|
Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt data, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors.
|
[] | null | null | 5.3 | null | null |
|
CVE-2005-2094
|
Sun SunONE web server 6.1 SP1 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes SunONE to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
|
[
"cpe:2.3:a:sun:one_web_server:6.1:sp1:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.