id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2017-20190 | Some Microsoft technologies as used in Windows 8 through 11 allow a temporary client-side performance degradation during processing of multiple Unicode combining characters, aka a "Zalgo text" attack. NOTE: third parties dispute whether the computational cost of interpreting Unicode data should be considered a vulnerability. | [
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | null |
|
CVE-2015-4738 | Unspecified vulnerability in the PeopleSoft Enterprise HCM Candidate Gateway component in Oracle PeopleSoft Products 9.1 and 9.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Security. | [
"cpe:2.3:a:oracle:peoplesoft_products:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_products:9.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
RHSA-2016:0158 | Red Hat Security Advisory: python-django security update | python-django: Information leak through date template filter | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
CVE-2001-1529 | Buffer overflow in rpc.yppasswdd (yppasswd server) in AIX allows attackers to gain unauthorized access via a long string. NOTE: due to lack of details in the vendor advisory, it is not clear if this is the same issue as CVE-2001-0779. | [
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-m88w-qcr5-cq82 | In JetBrains TeamCity before 2024.07 parameters of the "password" type could leak into the build log in some specific cases | [] | null | 6.4 | null | null |
|
GHSA-ppx4-5mpf-6m5m | Cross-site scripting (XSS) vulnerability in settings.inc.php for CubeCart 2.0.0 through 2.0.5, as used in multiple PHP files, allows remote attackers to inject arbitrary HTML or web script via the (1) cat_id, (2) PHPSESSID, (3) view_doc, (4) product, (5) session, (6) catname, (7) search, or (8) page parameters. | [] | null | null | null | null |
|
CVE-2024-5129 | Privilege Escalation Vulnerability in lunary-ai/lunary | A Privilege Escalation Vulnerability exists in lunary-ai/lunary version 1.2.2, where any user can delete any datasets due to missing authorization checks. The vulnerability is present in the dataset deletion functionality, where the application fails to verify if the user requesting the deletion has the appropriate permissions. This allows unauthorized users to send a DELETE request to the server and delete any dataset by specifying its ID. The issue is located in the datasets.delete function within the datasets index file. | [
"cpe:2.3:a:lunary-ai:lunary:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*"
] | null | null | 8.2 | null |
RHSA-2007:0062 | Red Hat Security Advisory: java-1.4.2-ibm security update | openssl signature forgery security flaw security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
CVE-2022-21965 | Microsoft Teams Denial of Service Vulnerability | Microsoft Teams Denial of Service Vulnerability | [
"cpe:2.3:a:microsoft:teams:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:teams:-:*:*:*:*:android:*:*",
"cpe:2.3:a:microsoft:teams:-:*:*:*:*:iphone_os:*:*"
] | null | 7.5 | null | null |
RHSA-2024:3926 | Red Hat Security Advisory: expat security update | expat: parsing large tokens can trigger a denial of service expat: XML Entity Expansion | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
CVE-2018-17050 | The mintToken function of a smart contract implementation for PolyAi (AI), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:polyai_project:polyai:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-jr2q-36h8-7j24 | flatpress 1.3.1 is vulnerable to Cross Site Scripting (XSS) in Administration area via Manage categories. | [] | null | 6.1 | null | null |
|
CVE-2008-7101 | Unspecified vulnerability in DotNetNuke 4.0 through 4.8.4 and 5.0 allows remote attackers to obtain sensitive information (portal number) by accessing the install wizard page via unknown vectors. | [
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2018-0764 | Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765. | [
"cpe:2.3:a:microsoft:.net_core:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_core:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_core:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-78c3-v436-q543 | Zetetic Secure Tool for Recalling Important Passwords (STRIP) 0.5 and earlier for the PalmOS allows a local attacker to recover passwords via a brute force attack. This attack is made feasible by STRIP's use of SysRandom, which is seeded by TimeGetTicks, and an implementation flaw which vastly reduces the password 'search space'. | [] | null | null | null | null |
|
GHSA-q3wq-j7qf-v6g7 | A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout. | [] | null | 7.5 | null | null |
|
GHSA-vj2v-v95r-fcp9 | Cross-site scripting (XSS) vulnerability in FreeStyle Wiki 3.5.7 and WikiLite (FSWikiLite) .10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. | [] | null | null | null | null |
|
CVE-2012-4034 | Multiple SQL injection vulnerabilities in PBBoard 2.1.4 allow remote attackers to execute arbitrary SQL commands via the (1) username parameter to the send page, (2) email parameter to the forget page, (3) password parameter to the forum_archive page, (4) section parameter to the management page, (5) section_id parameter to the managementreply page, (6) member_id parameter to the new_password page, or (7) subjectid parameter to the tags page to index.php. | [
"cpe:2.3:a:pbboard:pbboard:2.1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-14354 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription. | [
"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-7w92-x459-3frj | Windows Authentication Elevation of Privilege Vulnerability | [] | null | 7 | null | null |
|
CVE-2000-0061 | Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading. | [
"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:preview:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2015-0523 | EMC RSA Certificate Manager (RCM) before 6.9 build 558 and RSA Registration Manager (RRM) before 6.9 build 558 allow remote attackers to cause an Administration Server denial of service via an invalid MIME e-mail message with a multipart/* Content-Type header. | [
"cpe:2.3:a:emc:rsa_certificate_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_registration_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-7w72-rhr5-pj94 | An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32094986. References: QC-CR#2002052. | [] | null | null | 7 | null |
|
GHSA-g4m9-9h4j-22xx | Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests. | [] | null | 7.2 | null | null |
|
cisco-sa-dcnm-authbypass-YVJzqgk2 | Cisco Data Center Network Manager Authorization Bypass Vulnerability | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization.
The vulnerability is due to a failure to limit access to resources that are intended for users with Administrator privileges. An attacker could exploit this vulnerability by convincing a user to click a malicious URL. A successful exploit could allow a low-privileged attacker to list, view, create, edit, and delete templates in the same manner as a user with Administrator privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2"] | [] | null | 6.3 | null | null |
CVE-2018-16651 | The admin backend in phpMyFAQ before 2.9.11 allows CSV injection in reports. | [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 |
|
CVE-2017-14572 | STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to a "User Mode Write AV starting at Unknown Symbol @ 0x000000000479049b called from Unknown Symbol @ 0x000000000d89645b." | [
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2022-1303 | Slide Anything < 2.3.44 - Editor+ Stored Cross-Site Scripting | The Slide Anything WordPress plugin before 2.3.44 does not sanitize and escape sliders' description, which could allow high privilege users such as editor and above to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed | [
"cpe:2.3:a:slide_anything_project:slide_anything:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
GHSA-ghwq-7v3r-5433 | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in Microsoft Chakra Core in the way JavaScript engines render when handling objects in memory. aka "Scripting Engine Memory Corruption Vulnerability". This vulnerability is unique from CVE-2017-0223. | [] | null | null | 9.8 | null |
RHSA-2007:0354 | Red Hat Security Advisory: samba security update | samba heap overflows samba code injection | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2025-4852 | TOTOLINK A3002R VPN Page cross site scripting | A vulnerability, which was classified as problematic, has been found in TOTOLINK A3002R 2.1.1-B20230720.1011. This issue affects some unknown processing of the component VPN Page. The manipulation of the argument Comment leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 4.8 | 2.4 | 2.4 | 3.3 |
GHSA-8php-j6f4-5qhg | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in agenwebsite AW WooCommerce Kode Pembayaran allows Reflected XSS. This issue affects AW WooCommerce Kode Pembayaran: from n/a through 1.1.4. | [] | null | 7.1 | null | null |
|
GHSA-78j5-pcgf-qm47 | ControlIT v4.5 and earlier uses weak encryption to store usernames and passwords in an address book. | [] | null | null | null | null |
|
GHSA-8m5x-34vp-mpvw | Cross-site Scripting (XSS) - Generic in GitHub repository jgraph/drawio prior to 20.3.0. | [] | null | 6.1 | null | null |
|
CVE-2024-34832 | Directory Traversal vulnerability in CubeCart v.6.5.5 and before allows an attacker to execute arbitrary code via a crafted file uploaded to the _g and node parameters. | [
"cpe:2.3:a:cubecart:cubecart:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2007-1371 | Multiple buffer overflows in Conquest 8.2a and earlier (1) allow local users to gain privileges by querying a metaserver that sends a long server entry processed by metaGetServerList and allow remote metaservers to execute arbitrary code via a long server entry processed by metaGetServerList; (2) allow attackers to have an unknown impact by exceeding the configured number of metaservers; and allow remote attackers to corrupt memory via a SP_CLIENTSTAT packet with certain values of (3) unum or (4) snum, different vulnerabilities than CVE-2003-0933. | [
"cpe:2.3:a:radscan:conquest:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-62m6-hw85-vr62 | CMS Made Simple Version 2.2.19 is vulnerable to Cross Site Scripting (XSS). This vulnerability resides in the File Manager module of the admin panel. Specifically, the issue arises due to inadequate sanitization of user input in the "New directory" field. | [] | null | 4.8 | null | null |
|
CVE-2025-31821 | WordPress Integration of Zoho CRM and Contact Form 7 plugin <= 1.0.6 - Open Redirection Vulnerability | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in formsintegrations Integration of Zoho CRM and Contact Form 7 allows Phishing. This issue affects Integration of Zoho CRM and Contact Form 7: from n/a through 1.0.6. | [] | null | 4.7 | null | null |
CVE-2019-17316 | SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP object injection in the Import module by a Regular user. | [
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:professional:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:ultimate:*:*:*"
] | null | 8.8 | null | 6.5 |
|
RHSA-2010:0838 | Red Hat Security Advisory: pki security and enhancement update | MD5: MD5 Message-Digest Algorithm is not collision resistant System: unauthenticated user can request SCEP one-time PIN decryption System: SCEP one-time PIN reuse | [
"cpe:/a:redhat:certificate_system:8::el5"
] | null | null | null | null |
GHSA-wpw7-59pp-9vqc | Directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. | [] | null | null | null | null |
|
GHSA-p68c-hfxh-5g9g | In the SDK in Bento4 1.5.0-616, SetItemCount in Core/Ap4StscAtom.h file contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file. | [] | null | null | 7.8 | null |
|
GHSA-7g6w-p3rw-6h75 | In the Linux kernel, the following vulnerability has been resolved:randomize_kstack: Improve entropy diffusionThe kstack_offset variable was really only ever using the low bits for
kernel stack offset entropy. Add a ror32() to increase bit diffusion. | [] | null | null | null | null |
|
CVE-2024-9839 | Uix Slideshow <= 1.6.5 - Unauthenticated Arbitrary Shortcode Execution | The The Uix Slideshow plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | [
"cpe:2.3:a:uiuxlab:uix_slideshow:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
CVE-2020-11173 | u'Two threads running simultaneously from user space can lead to race condition in fastRPC driver' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8053, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9607, MSM8953, Nicobar, QCA6390, QCS404, QCS405, QCS610, Rennell, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM632, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 | [
"cpe:2.3:o:qualcomm:agatti_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:agatti:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:bitra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:bitra:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7 | null | 4.4 |
|
CVE-2024-4335 | Rank Math SEO with AI Best SEO Tools <= 1.0.217 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Rank Math SEO with AI Best SEO Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘textAlign’ parameter in versions up to, and including, 1.0.217 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
ICSA-20-252-07 | Siemens Industrial Products (Update F) | Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | [] | null | 5.5 | null | null |
GHSA-963c-6cxg-3mxf | Xigla Software Absolute Live Support .NET 5.1 allows remote attackers to bypass authentication and gain administrative access by setting a cookie to a certain value. | [] | null | null | null | null |
|
cisco-sa-meraki-config-Ab3Da | Cisco Meraki MR Series Splash Page Insecure Configuration Option | A configuration option for the Splash Page feature (also known as Captive Portal) in Cisco Meraki MR Series devices may allow an administrator to configure an 802.11 WLAN in which traffic policies are not applied to clients that are connecting to the network.
The insecure configuration is determined when an administrator configures a WLAN with Splash Page access control and Captive Portal strength is set to Allow non-HTTP traffic prior to sign-on.
While this setup is intended to provide wireless clients with connectivity before they interact with the Splash Page, traffic policies are applied only after the sign on is completed. A malicious user could take advantage of this insecure configuration to circumvent network policies such as firewall rules, content filtering, and traffic shaping that is configured to restrict traffic within the impacted WLAN.
Cisco Meraki does not consider this to be a vulnerability in Cisco Meraki MR Software or in the Splash Page feature. It is considered a configuration issue.
For more robust network security, Cisco Meraki recommends following the guidance in the Recommendations ["#rec"] section of this advisory to make any appropriate configuration changes.
Note: The option is disabled by default on WLANs that were created through the Cisco Meraki Cloud Management Interface (also known as Dashboard) after December 4, 2020.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-config-Ab3Da ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-config-Ab3Da"] | [] | null | null | null | null |
GHSA-m43c-f4x2-7vmm | Cross-site scripting (XSS) vulnerability in ips_kernel/class_ajax.php in Invision Power Board (IPB or IP.Board) 2.3.1 up to 20070912 allows remote attackers to inject arbitrary web script or HTML into user profile fields via unspecified vectors related to character sets other than iso-8859-1 or utf-8. | [] | null | null | null | null |
|
CVE-2022-40183 | Reflected Cross Site Scripting (XSS) in VIDEOJET multi 4000 | An error in the URL handler of the VIDEOJET multi 4000 may lead to a reflected cross site scripting (XSS) in the web-based interface. An attacker with knowledge of the encoder address can send a crafted link to a user, which will execute JavaScript code in the context of the user. | [
"cpe:2.3:o:bosch:videojet_multi_4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:videojet_multi_4000:-:*:*:*:*:*:*:*"
] | null | 5.8 | null | null |
CVE-2023-21569 | Azure DevOps Server Spoofing Vulnerability | Azure DevOps Server Spoofing Vulnerability | [
"cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2022:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-fxmx-955j-w68g | The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | [] | null | null | null | null |
|
GHSA-rp49-xv9m-r6w5 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. | [] | null | null | null | null |
|
CVE-2018-18608 | DedeCMS 5.7 SP2 allows XSS via the function named GetPageList defined in the include/datalistcp.class.php file that is used to display the page numbers list at the bottom of some templates, as demonstrated by the PATH_INFO to /member/index.php, /member/pm.php, /member/content_list.php, or /plus/feedback.php. | [
"cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-4233-qhc3-4437 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Md. Rajib Dewan Opencart Product in WP allows Reflected XSS.This issue affects Opencart Product in WP: from n/a through 1.0.1. | [] | null | 7.1 | null | null |
|
CVE-2019-15575 | A command injection exists in GitLab CE/EE <v12.3.2, <v12.2.6, and <v12.1.12 that allowed an attacker to inject commands via the API through the blobs scope. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-qgcm-6r7q-m4wm | Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode. | [] | null | null | null | null |
|
CVE-2019-9038 | An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is an out-of-bounds read problem with a SEGV in the function ReadNextCell() in mat5.c. | [
"cpe:2.3:a:matio_project:matio:1.5.13:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-3721 | A denial of service vulnerability was reported in Lenovo PCManager prior to version 4.0.20.10282 that could allow an attacker with local access to trigger a blue screen error. | [
"cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2007:1157 | Red Hat Security Advisory: mysql security update | mysql DoS in the InnoDB Engine mysql: possible system table information overwrite using symlinks mysql: DEFINER value of view not altered on ALTER VIEW | [
"cpe:/a:redhat:rhel_application_stack:1",
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
GHSA-x5hv-w3m8-3mj8 | Cudy LT400 1.13.4 is has a cross-site scripting (XSS) vulnerability in /cgi-bin/luci/admin/network/wireless/status via the iface parameter. | [] | null | 6.1 | null | null |
|
GHSA-vm6r-4p4v-232x | October CMS CSRF | Cross-Site Request Forgery exists in OctoberCMS 1.0.426 (aka Build 426) due to improper validation of CSRF tokens for postback handling, allowing an attacker to successfully take over the victim's account. The attack bypasses a protection mechanism involving X-CSRF headers and CSRF tokens via a certain _handler postback variable. | [] | null | null | 8.8 | null |
GHSA-6qh2-3h42-p5xv | An issue was discovered in certain Apple products. macOS before 10.13.5 is affected. The issue involves the "Firmware" component. It allows attackers to modify the EFI flash-memory region that a crafted app that has root access. | [] | null | null | 5.5 | null |
|
GHSA-v7fv-qcgm-h8v8 | A vulnerability classified as critical has been found in code-projects E-Health Care System 1.0. This affects an unknown part of the file /Admin/detail.php. The manipulation of the argument s_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory confuses the vulnerability class of this issue. | [] | 5.3 | 6.3 | null | null |
|
CVE-2023-31277 | PiiGAB M-Bus Unprotected Transport of Credentials |
PiiGAB M-Bus transmits credentials in plaintext format.
| [
"cpe:2.3:h:piigab:m-bus_900s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:piigab:m-bus_900s_firmware:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-86ff-94h8-c742 | Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in Stored Cross-Site Scripting (XSS). | [] | null | null | null | null |
|
CVE-2024-10361 | Arbitrary File Deletion via Path Traversal in danny-avila/librechat | An arbitrary file deletion vulnerability exists in danny-avila/librechat version v0.7.5-rc2, specifically within the /api/files endpoint. This vulnerability arises from improper input validation, allowing path traversal techniques to delete arbitrary files on the server. Attackers can exploit this to bypass security mechanisms and delete files outside the intended directory, including critical system files, user data, or application resources. This vulnerability impacts the integrity and availability of the system. | [] | null | null | 8.1 | null |
CVE-2000-0618 | Buffer overflow in xconq and cconq game programs on Red Hat Linux allows local users to gain additional privileges via long DISPLAY environmental variable. | [
"cpe:2.3:a:stanley_t._shebs:xconq:7.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2024-25748 | A Stack Based Buffer Overflow vulnerability in tenda AC9 AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the fromSetIpMacBind function. | [
"cpe:2.3:o:tenda:ac9v3.0_firmware:15.03.06.42_multi:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-r9w8-v8hh-7577 | The Leagoo Z5C Android device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains a pre-installed app with a package name of com.android.messaging (versionCode=1000110, versionName=1.0.001, (android.20170630.092853-0)) with an exported broadcast receiver app component named com.android.messaging.trackersender.TrackerSender. Any app co-located on the device, even one with no permissions, can send a broadcast intent with certain embedded data to the exported broadcast receiver application component that will result in the programmatic sending of a text message where the phone number and body of the text message is controlled by the attacker. | [] | null | null | 7.5 | null |
|
CVE-2021-27738 | Improper Access Control to Streaming Coordinator & SSRF | All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2. | [
"cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
CVE-2021-41677 | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php &Grade= parameter. | [
"cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 |
|
RHSA-2022:8554 | Red Hat Security Advisory: firefox security update | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
GHSA-r886-qxxf-vc94 | SQL injection vulnerability in search.php in Phorum 5.0.0alpha through 5.0.20, when register_globals is enabled, allows remote attackers to execute arbitrary SQL commands via the forum_ids parameter. | [] | null | null | null | null |
|
RHSA-2014:1292 | Red Hat Security Advisory: haproxy security update | haproxy: remote client denial of service vulnerability | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2024-36062 | The com.callassistant.android (aka AI Call Assistant & Screener) application 1.174 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.callassistant.android.ui.call.incall.InCallActivity component. | [] | null | 4 | null | null |
|
CVE-2025-4340 | D-Link DIR-890L/DIR-806A1 soap.cgi sub_175C8 command injection | A vulnerability classified as critical has been found in D-Link DIR-890L and DIR-806A1 up to 100CNb11/108B03. Affected is the function sub_175C8 of the file /htdocs/soap.cgi. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-8h3q-6j29-4729 | The Catch Themes Demo Import WordPress plugin before 2.1.1 does not validate one of the file to be imported, which could allow high privivilege admin to upload an arbitrary PHP file and gain RCE even in the case of an hardened blog (ie DISALLOW_UNFILTERED_HTML, DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS constants set to true) | [] | null | 7.2 | null | null |
|
GHSA-89gm-h9rw-99w8 | Cross-site scripting (XSS) vulnerability in the JoomShopping (com_joomshopping) component before 4.3.1 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the user_name parameter to index.php. | [] | null | null | null | null |
|
CVE-2008-0691 | Multiple cross-site scripting (XSS) vulnerabilities in admin_panel.php in the Simon Elvery WP-Footnotes 2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) wp_footnotes_current_settings[priority], (2) wp_footnotes_current_settings[style_rules], (3) wp_footnotes_current_settings[pre_footnotes], and (4) wp_footnotes_current_settings[post_footnotes] parameters. | [
"cpe:2.3:a:simon_elvery:wp-footnotes:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wp-footnotes:2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-hc82-f9w8-5qqv | Race condition in IPCop (aka IPCop Firewall) before 1.4.10 might allow local users to overwrite system configuration files and gain privileges by replacing a backup archive during the time window when the archive is owned by "nobody" but not yet encrypted, then executing ipcoprscfg to restore from this backup. | [] | null | null | null | null |
|
CVE-2024-45473 | A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
] | 7.3 | 7.8 | null | null |
|
CVE-2024-49292 | WordPress Exclusive Addons for Elementor plugin <= 2.7.1 - Cross-Site Scripting vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Exclusive Addons Exclusive Addons Elementor allows Stored XSS.This issue affects Exclusive Addons Elementor: from n/a through 2.7.1. | [] | null | 6.5 | null | null |
GHSA-vm52-xw7f-3537 | Missing Authorization vulnerability in WpDevArt Booking calendar, Appointment Booking System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking calendar, Appointment Booking System: from n/a through 3.2.3. | [] | null | 5 | null | null |
|
GHSA-hwg4-5cx4-h25m | Insufficient clearing of GPU global memory could allow a malicious process running on the same GPU to read left over memory values, potentially leading to loss of confidentiality. | [] | null | 6.5 | null | null |
|
CVE-2024-31228 | Denial-of-service due to unbounded pattern matching in Redis | Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | null | 5.5 | null | null |
RHSA-2017:1483 | Red Hat Security Advisory: kernel security update | kernel: heap/stack gap jumping via unbounded stack allocations | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 7.4 | null |
CVE-2019-18363 | In JetBrains TeamCity before 2019.1.2, access could be gained to the history of builds of a deleted build configuration under some circumstances. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2024-38213 | Windows Mark of the Web Security Feature Bypass Vulnerability | Windows Mark of the Web Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2025-22369 | Mennekes smart/premium charges systems, Arbitrary file download using ReadFile endpoint | The ReadFile endpoint of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to read arbitrary files from the underlying OS. | [] | 7.1 | null | null | null |
CVE-2012-5606 | Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before 4.0.9 and 4.5.0 allow remote attackers to inject arbitrary web script or HTML via the (1) file name to apps/files_versions/js/versions.js or (2) apps/files/js/filelist.js; or (3) event title to 3rdparty/fullcalendar/js/fullcalendar.js. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2012-4949 | SQL injection vulnerability in ESRI ArcGIS 10.1 allows remote authenticated users to execute arbitrary SQL commands via the where parameter to a query URI for a REST service. | [
"cpe:2.3:a:esri:arcgis_server:10.1:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-24014 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass crafted offset, limit, and sort parameters to perform SQL injection via /novel/author/list | [
"cpe:2.3:a:xxyopen:novel-plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xxyopen:novel-plus:4.3.0:rc1:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2003-0549 | The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) via a short authorization key name. | [
"cpe:2.3:a:gnome:gdm:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdm:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdm:2.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdm:2.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdm:2.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdm:2.4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdm:2.4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdm:2.4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:kdebase:2.0_beta2.45:*:i386:*:*:*:*:*",
"cpe:2.3:a:redhat:kdebase:2.0_beta2.45:*:ppc:*:*:*:*:*",
"cpe:2.3:a:redhat:kdebase:2.2.3.1.20:*:i386:*:*:*:*:*",
"cpe:2.3:a:redhat:kdebase:2.2.3.1.20:*:ia64:*:*:*:*:*",
"cpe:2.3:a:redhat:kdebase:2.2.3.1.22:*:i386:*:*:*:*:*",
"cpe:2.3:a:redhat:kdebase:2.4.0.7.13:*:i386:*:*:*:*:*",
"cpe:2.3:a:redhat:kdebase:2.4.1.3.5:*:i386:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2001-1084 | Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message. | [
"cpe:2.3:a:macromedia:jrun:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-44549 | Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formGetIptv. | [
"cpe:2.3:o:tenda:ax1806_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:*"
] | null | 6.6 | null | null |
|
GHSA-g55h-gq76-w8v9 | An issue discovered in Elenos ETG150 FM transmitter v3.12 allows attackers to enumerate user accounts based on server responses when credentials are submitted. | [] | null | 5.3 | null | null |
|
GHSA-gpcr-gccf-xjp4 | A remote code execution vulnerability exists in Microsoft Edge in the way affected Microsoft scripting engines render when handling objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0221 and CVE-2017-0240. | [] | null | null | 7.5 | null |
|
GHSA-5fpx-69w7-fx2q | The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘username’ parameter in all versions up to, and including, 1.5.112 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above and granted plugin setting edit permissions by an administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.