id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2025-50070
|
Vulnerability in the JDBC component of Oracle Database Server. Supported versions that are affected are 23.4-23.8. Difficult to exploit vulnerability allows low privileged attacker having Authenticated OS User privilege with logon to the infrastructure where JDBC executes to compromise JDBC. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JDBC, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JDBC accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N).
|
[] | null | 5.3 | null | null | null |
|
GHSA-8v94-jh77-jr4v
|
A missing X-Frame-Options header in the NDS Utility Monitor in NDSD in Novell eDirectory before 9.0.2 could be used by remote attackers for clickjacking.
|
[] | null | null | 6.5 | null | null |
|
GHSA-83mv-r2r9-9gx9
|
SQL injection vulnerability in the Document Tracking and Administration (DTA) website of Microsoft BizTalk Server 2000 and 2002 allows remote attackers to execute operating system commands via a request to (1) rawdocdata.asp or (2) RawCustomSearchField.asp containing an embedded SQL statement.
|
[] | null | null | null | null | null |
|
CVE-2024-51578
|
WordPress 3D Presentation plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Luca Paggetti 3D Presentation allows Stored XSS.This issue affects 3D Presentation: from n/a through 1.0.
|
[
"cpe:2.3:a:lucapaggetti:3d_presentation:1.0:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
CVE-2025-2203
|
WooCommerce Checkout & Funnel Builder by FunnelKit < 3.10.2 - Admin+ SQL Injection
|
The FunnelKit WordPress plugin before 3.10.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
|
[] | null | 6.1 | null | null | null |
CVE-2025-32829
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockProjectCrossCommunications' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
|
[] | 8.7 | 8.8 | null | null | null |
|
GHSA-2p58-792j-4h9c
|
An attacker can get Remote Code Execution by overwriting files. Overwriting files is enable by falsifying session ID variable. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
|
[] | null | 7.2 | null | null | null |
|
GHSA-r3w6-p6hr-rww6
|
Dell OS10 Networking Switches, versions10.5.6.x, 10.5.5.x, 10.5.4.x and 10.5.3.x ,contain an improper authorization vulnerability. A remote authenticated attacker could potentially exploit this vulnerability leading to escalation of privileges.
|
[] | null | 8.8 | null | null | null |
|
GHSA-x3fj-p9wp-c8f5
|
Open redirect vulnerability in Cybozu Garoon 4.0.0 to 4.10.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the application 'Scheduler'.
|
[] | null | 6.1 | null | null | null |
|
CVE-2023-38185
|
Microsoft Exchange Server Remote Code Execution Vulnerability
|
Microsoft Exchange Server Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_13:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-28p7-f6h6-3jh3
|
LibreNMS has a Reflected XSS ('Cross-site Scripting') in librenms/includes/html/pages/wireless.inc.php
|
SummaryA Reflected Cross-Site Scripting (XSS) vulnerability in the "metric" parameter of the "/wireless" and "/health" endpoints allows attackers to inject arbitrary JavaScript. This vulnerability results in the execution of malicious code when a user accesses the page with a malicious "metric" parameter, potentially compromising their session and allowing unauthorized actions.DetailsThe "/wireless" and "/health" endpoints are vulnerable to reflected XSS in the "metric" parameter. An attacker can inject the following XSS payload into the "metric" parameter:
```<script>constructor['constructor'](atob('Y29uZmlybShkb2N1bWVudC5kb21haW4p'))();<!---->```When the page is loaded with this malicious parameter, the script executes immediately. The vulnerability occurs due to improper sanitization of the "metric" parameter in the following sinks:
https://github.com/librenms/librenms/blob/7f2ae971c4a565b0d7345fa78b4211409f96800a/includes/html/pages/wireless.inc.php#L82
https://github.com/librenms/librenms/blob/7f2ae971c4a565b0d7345fa78b4211409f96800a/includes/html/pages/health.inc.php#L114PoCInject the following payload into the "metric" parameter of the "/wireless" or "/health" endpoint:
```<script>constructor['constructor'](atob('Y29uZmlybShkb2N1bWVudC5kb21haW4p'))();<!---->```Access the page with the injected payload.Observe that the injected script executes upon loading the page.Example URL: ```http://<your_url>/wireless/metric=%3Cscript%3Econstructor['constructor'](atob('Y29uZmlybShkb2N1bWVudC5kb21haW4p'))();%3C!----%3E```Example Request:ImpactThis vulnerability allows attackers to execute arbitrary JavaScript in the context of a user’s session by crafting a malicious URL. The attack could lead to session hijacking, unauthorized actions, or further exploitation by injecting malicious scripts.
|
[] | null | 7.5 | null | null | null |
GHSA-w7h4-8f3v-m646
|
Vulnerability in the Oracle Financial Services Liquidity Risk Management product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.0.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Liquidity Risk Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Management accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
|
[] | null | null | null | null | null |
|
GHSA-g3px-cpxh-v7xc
|
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
|
[] | null | 4.3 | null | null | null |
|
CVE-2018-13207
|
The sell function of a smart contract implementation for PornCoin (PRNC), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
|
[
"cpe:2.3:a:porn-coin:porncoin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-mpfh-94p7-8328
|
In the Linux kernel, the following vulnerability has been resolved:wifi: ath11k: fix RCU stall while reaping monitor destination ringWhile processing the monitor destination ring, MSDUs are reaped from the
link descriptor based on the corresponding buf_id.However, sometimes the driver cannot obtain a valid buffer corresponding
to the buf_id received from the hardware. This causes an infinite loop
in the destination processing, resulting in a kernel crash.kernel log:
ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309
ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed
ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309
ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failedFix this by skipping the problematic buf_id and reaping the next entry,
replacing the break with the next MSDU processing.Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
|
[] | null | 5.5 | null | null | null |
|
GHSA-gqf3-6q2h-fcv3
|
Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-3481
|
Counter Box < 1.2.4 - Counter Deletion via CSRF
|
The Counter Box WordPress plugin before 1.2.4 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such deleting counters via CSRF attacks
|
[
"cpe:2.3:a:wordpress:counter_box:-:*:*:*:*:*:*:*"
] | null | 5.2 | null | null | null |
CVE-2014-7279
|
The Konke Smart Plug K does not require authentication for TELNET sessions, which allows remote attackers to obtain "equipment management authority" via TCP traffic to port 23.
|
[
"cpe:2.3:o:kankunit:konke_smart_plug_firmware:k:*:*:*:*:*:*:*",
"cpe:2.3:h:kankunit:konke_smart_plug:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-74g6-v8qc-cm8w
|
Xerver Free Web Server 2.10 and earlier allows remote attackers to cause a denial of service (crash) via an HTTP request that contains many "C:/" sequences.
|
[] | null | null | null | null | null |
|
cisco-sa-sdwclici-cvrQpH9v
|
Cisco SD-WAN Solution Command Injection Vulnerability
|
A vulnerability in the CLI of Cisco SD-WAN Solution software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v"]
|
[] | null | null | 7.8 | null | null |
CVE-2025-47634
|
WordPress WC Pickup Store <= 1.8.9 - Settings Change Vulnerability
|
Missing Authorization vulnerability in Keylor Mendoza WC Pickup Store allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WC Pickup Store: from n/a through 1.8.9.
|
[] | null | 6.5 | null | null | null |
CVE-2023-32767
|
The web interface of Symcon IP-Symcon before 6.3 (i.e., before 2023-05-12) allows a remote attacker to read sensitive files via .. directory-traversal sequences in the URL.
|
[
"cpe:2.3:a:symcon:ip_symcon:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
RHSA-2020:4445
|
Red Hat Security Advisory: librabbitmq security update
|
librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.6 | null | null | null |
CVE-2023-26553
|
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
|
[
"cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*"
] | null | 5.6 | null | null | null |
|
GHSA-8gfj-456m-vp3q
|
The "HTML Include and replace macro" plugin before 1.5.0 for Confluence Server allows a bypass of the includeScripts=false XSS protection mechanism via vectors involving an IFRAME element.
|
[] | null | null | 6.8 | null | null |
|
CVE-2021-45952
|
Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge.
|
[
"cpe:2.3:a:thekelleys:dnsmasq:2.86:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-fxqv-wg5x-xxgc
|
Cisco Trust Agent (CTA) before 2.1.104.0, when running on MacOS X, allows attackers with physical access to bypass authentication and modify System Preferences, including passwords, by invoking the Apple Menu when the Access Control Server (ACS) produces a user notification message after posture validation.
|
[] | null | null | null | null | null |
|
GHSA-r57c-c5gj-4hr8
|
The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10.
|
[] | null | 6.1 | null | null | null |
|
GHSA-j7w5-x7pc-pvmf
|
Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API.
|
[] | null | null | null | null | null |
|
CVE-2022-42703
|
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2024-36968
|
Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
l2cap_le_flowctl_init() can cause both div-by-zero and an integer
overflow since hdev->le_mtu may not fall in the valid range.
Move MTU from hci_dev to hci_conn to validate MTU and stop the connection
process earlier if MTU is invalid.
Also, add a missing validation in read_buffer_size() and make it return
an error value if the validation fails.
Now hci_conn_add() returns ERR_PTR() as it can fail due to the both a
kzalloc failure and invalid MTU value.
divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 0 PID: 67 Comm: kworker/u5:0 Tainted: G W 6.9.0-rc5+ #20
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: hci0 hci_rx_work
RIP: 0010:l2cap_le_flowctl_init+0x19e/0x3f0 net/bluetooth/l2cap_core.c:547
Code: e8 17 17 0c 00 66 41 89 9f 84 00 00 00 bf 01 00 00 00 41 b8 02 00 00 00 4c
89 fe 4c 89 e2 89 d9 e8 27 17 0c 00 44 89 f0 31 d2 <66> f7 f3 89 c3 ff c3 4d 8d
b7 88 00 00 00 4c 89 f0 48 c1 e8 03 42
RSP: 0018:ffff88810bc0f858 EFLAGS: 00010246
RAX: 00000000000002a0 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffff88810bc0f7c0 RDI: ffffc90002dcb66f
RBP: ffff88810bc0f880 R08: aa69db2dda70ff01 R09: 0000ffaaaaaaaaaa
R10: 0084000000ffaaaa R11: 0000000000000000 R12: ffff88810d65a084
R13: dffffc0000000000 R14: 00000000000002a0 R15: ffff88810d65a000
FS: 0000000000000000(0000) GS:ffff88811ac00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000100 CR3: 0000000103268003 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
<TASK>
l2cap_le_connect_req net/bluetooth/l2cap_core.c:4902 [inline]
l2cap_le_sig_cmd net/bluetooth/l2cap_core.c:5420 [inline]
l2cap_le_sig_channel net/bluetooth/l2cap_core.c:5486 [inline]
l2cap_recv_frame+0xe59d/0x11710 net/bluetooth/l2cap_core.c:6809
l2cap_recv_acldata+0x544/0x10a0 net/bluetooth/l2cap_core.c:7506
hci_acldata_packet net/bluetooth/hci_core.c:3939 [inline]
hci_rx_work+0x5e5/0xb20 net/bluetooth/hci_core.c:4176
process_one_work kernel/workqueue.c:3254 [inline]
process_scheduled_works+0x90f/0x1530 kernel/workqueue.c:3335
worker_thread+0x926/0xe70 kernel/workqueue.c:3416
kthread+0x2e3/0x380 kernel/kthread.c:388
ret_from_fork+0x5c/0x90 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-w9c2-jf2x-m4cc
|
In the Linux kernel, the following vulnerability has been resolved:scsi: mpi3mr: Fix sas_hba.phy memory leak in mpi3mr_remove()Free mrioc->sas_hba.phy at .remove.
|
[] | null | null | null | null | null |
|
GHSA-hm6h-8cg9-xcv7
|
Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a log pollution vulnerability potentially leading to a local XSS. The download log functionality in the admin screen is delivering the log in JSON format to the end-user. The file was delivered with an attachment disposition forcing the browser to download the document. However, Firefox running on Microsoft Windows would offer the user to open the data in the browser as an HTML document. Thus any injected data in the log would be executed.
|
[] | null | null | 6.1 | null | null |
|
CVE-2014-9476
|
MediaWiki 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote attackers to bypass CORS restrictions in $wgCrossSiteAJAXdomains via a domain that has a partial match to an allowed origin, as demonstrated by "http://en.wikipedia.org.evilsite.example/."
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2007-4487
|
Cross-site scripting (XSS) vulnerability in D22-Shoutbox for Invision Power Board (IPB or IP.Board) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:dscripting.com:d22-shoutbox:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2024:3475
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.5 security update
|
argocd: Use of Risky or Missing Cryptographic Algorithms in Redis Cache
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 9.6 | null | null | null |
GHSA-rpf2-3hpw-c9qh
|
An authentication-bypass issue in the component http://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh of Mega System Technologies Inc MSNSwitch MNT.2408 allows unauthenticated attackers to arbitrarily configure settings within the application, leading to remote code execution.
|
[] | null | 9.8 | null | null | null |
|
CVE-2002-1007
|
Cross-site scripting vulnerabilities in Blackboard 5 allow remote attackers to execute arbitrary web script via (1) the course_id parameter in a link to login.pl, (2) the CTID parameter in ProcessInfo.cgi, or (3) the Message parameter in index.cgi.
|
[
"cpe:2.3:a:blackboard:blackboard:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-6680
|
On BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5, while processing traffic through a standard virtual server that targets a FastL4 virtual server (VIP on VIP), hardware appliances may stop responding.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
GHSA-3p5m-m447-4mm4
|
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of service (cold start) by sending two crafted ping requests.
|
[] | null | 7.5 | null | null | null |
|
GHSA-8xvg-3j2m-mpwq
|
Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
|
GHSA-cc63-hf4q-596r
|
Firefly III 4.7.17.4 is vulnerable to multiple stored XSS issues due to the lack of filtration of user-supplied data in the transaction description field and the asset account name. The JavaScript code is executed during a convert transaction action.
|
[] | null | null | null | null | null |
|
GHSA-q8xc-r646-8m28
|
SQL injection vulnerability in login.asp in an unknown product by Online Solutions for Educators (OS4E) allows remote attackers to execute arbitrary SQL commands via the password.
|
[] | null | null | null | null | null |
|
CVE-2024-28956
|
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
|
[] | 5.7 | 5.6 | null | null | null |
|
CVE-2021-39542
|
An issue was discovered in pdftools through 20200714. A NULL pointer dereference exists in the function Font::Size() located in font.cpp. It allows an attacker to cause Denial of Service.
|
[
"cpe:2.3:a:pdftools_project:pdftools:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2009-3175
|
Multiple SQL injection vulnerabilities in Model Agency Manager PRO (formerly Modeling Agency Content Management Script) allow remote attackers to execute arbitrary SQL commands via the user_id parameter to (1) view.php, (2) photos.php, and (3) motm.php; and the (4) id parameter to forum_message.php.
|
[
"cpe:2.3:a:boldfx:model_agency_manager_pro:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-mw39-82cr-fff7
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2016-9987
|
IBM Jazz Foundation Reporting Service (JRS) 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 120553.
|
[
"cpe:2.3:a:ibm:jazz_reporting_service:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0.3:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2006-2282
|
Cross-site scripting (XSS) vulnerability in X7 Chat 2.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via a javascript URI in the URL of an avatar, possibly related to the avatar parameter in register.php.
|
[
"cpe:2.3:a:x7_group:x7_chat:2.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-21924
|
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘desc_filter’ parameter.
|
[
"cpe:2.3:a:advantech:r-seenet:2.4.15:*:*:*:*:*:*:*"
] | null | null | 7.7 | null | null |
|
GHSA-2779-2c23-rw2v
|
The WP-Revive Adserver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wprevive_async' shortcode in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-4g6g-5g88-76v5
|
A vulnerability classified as critical was found in PHPGurukul Online Course Registration System 3.1. Affected by this vulnerability is an unknown functionality of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264925 was assigned to this vulnerability.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-v545-g82r-gvw3
|
Cross Site Scripting (XSS) vulnerability in Automattic Newspack Campaigns allows Stored XSS.This issue affects Newspack Campaigns: from n/a through 2.31.1.
|
[] | null | 6.5 | null | null | null |
|
GHSA-chcf-c8w2-7x53
|
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.
|
[] | null | null | null | null | null |
|
GHSA-8cvh-hm2x-mc93
|
An out of bounds read can happen when processing VSA attribute due to improper minimum required length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
|
[] | null | null | null | null | null |
|
CVE-2013-6021
|
Buffer overflow in WGagent in WatchGuard WSM and Fireware before 11.8 allows remote attackers to execute arbitrary code via a long sessionid value in a cookie.
|
[
"cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.7.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-9mgp-38hx-7j3h
|
DownFile 1.3 allows remote attackers to gain administrator privileges via a direct request to (1) update.php, (2) del.php, and (3) add_form.php.
|
[] | null | null | null | null | null |
|
GHSA-2m3f-h89h-6xxr
|
Off-by-one error in CORE/HDD/src/wlan_hdd_cfg.c in the Qualcomm Wi-Fi driver in Android before 2016-10-05 on Nexus 5X and Android One devices allows attackers to gain privileges or cause a denial of service (buffer overflow) via a crafted application that makes a GET_CFG ioctl call, aka Android internal bug 30874066 and Qualcomm internal bug CR 1000853.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-31008
|
An issue was discovered in WUZHICMS version 4.1.0, allows an attacker to execute arbitrary code and obtain sensitive information via the index.php file.
|
[
"cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-6gc8-5v43-5g2x
|
SKYSEA Client View Ver.11.221.03 and earlier allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.
|
[] | null | null | 9.8 | null | null |
|
GHSA-x5x2-mfc7-r22f
|
Directory Traversal in picard
|
Affected versions of `picard` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
[] | null | null | null | null | null |
RHSA-2024:0973
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null | null |
CVE-2025-5407
|
chaitak-gorai Blogbook register_script.php cross site scripting
|
A vulnerability has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register_script.php. The manipulation of the argument fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 4.8 | 2.4 | 2.4 | 3.3 | null |
CVE-2018-20658
|
The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command.
|
[
"cpe:2.3:a:coreftp:core_ftp:2.0:*:*:*:*:*:x86:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2025-53416
|
File Parsing Deserialization of Untrusted Data in DTN Soft
|
Delta Electronics DTN Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution
|
[] | null | 7.8 | null | null | null |
CVE-2022-49375
|
rtc: mt6397: check return value after calling platform_get_resource()
|
In the Linux kernel, the following vulnerability has been resolved:
rtc: mt6397: check return value after calling platform_get_resource()
It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
|
[] | null | 5.5 | null | null | null |
CVE-2017-7628
|
The "Smart related articles" extension 1.1 for Joomla! has SQL injection in dialog.php (attacker must use search_cats variable in POST method to exploit this vulnerability).
|
[
"cpe:2.3:a:smart_related_articles_project:smart_related_articles:1.1:*:*:*:*:joomla\\!:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2024-10567
|
TI WooCommerce Wishlist <= 2.9.1 - Missing Authorization to Unauthenticated Plugin Setup Wizard Access
|
The TI WooCommerce Wishlist plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wizard' function in all versions up to, and including, 2.9.1. This makes it possible for unauthenticated attackers to create new pages, modify plugin settings, and perform limited options updates.
|
[
"cpe:2.3:a:woocommerce:woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
CVE-2012-6070
|
Falconpl before 0.9.6.9-git20120606 misuses the libcurl API which may allow remote attackers to interfere with security checks.
|
[
"cpe:2.3:a:falconpl:falconpl:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2017-5261
|
In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the 'ping' and 'traceroute' functions of the web administrative console expose a file path traversal vulnerability, accessible to all authenticated users.
|
[
"cpe:2.3:o:cambiumnetworks:cnpilot_r190v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cambiumnetworks:cnpilot_r190v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cambiumnetworks:cnpilot_e410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cambiumnetworks:cnpilot_e410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cambiumnetworks:cnpilot_r190n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cambiumnetworks:cnpilot_r190n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cambiumnetworks:cnpilot_e400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cambiumnetworks:cnpilot_e400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cambiumnetworks:cnpilot_e600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cambiumnetworks:cnpilot_e600:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4 | null |
|
GHSA-j57q-8f2v-q7xh
|
Cellopoint Cellos v4.1.10 Build 20190922 does not validate URL inputted properly. With the cookie of the system administrator, attackers can inject and remotely execute arbitrary command to manipulate the system.
|
[] | null | 7.2 | null | null | null |
|
CVE-2012-5843
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2024-20932
|
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 17.0.9; Oracle GraalVM for JDK: 17.0.9; Oracle GraalVM Enterprise Edition: 21.3.8 and 22.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
|
[
"cpe:2.3:a:oracle:graalvm:21.3.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:22.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2023-1003
|
Typora WSH JScript code injection
|
A vulnerability, which was classified as critical, was found in Typora up to 1.5.5 on Windows. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736.
|
[
"cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.3 | 5.3 | 4.3 | null |
CVE-2009-4024
|
Argument injection vulnerability in the ping function in Ping.php in the Net_Ping package before 2.4.5 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: this has also been reported as a shell metacharacter problem.
|
[
"cpe:2.3:a:pear:pear:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4.3:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-xh9c-cqj7-g26j
|
Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | 9.8 | null | null | null |
|
GHSA-6x75-c972-w59f
|
In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account.
|
[] | null | 9.1 | null | null | null |
|
CVE-2020-10792
|
openITCOCKPIT through 3.7.2 allows remote attackers to configure the self::DEVELOPMENT or self::STAGING option by placing a hostname containing "dev" or "staging" in the HTTP Host header.
|
[
"cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-wfgf-9jwh-4jqh
|
Microsoft Visual Studio Spoofing Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-24024
|
An arbitrary File download vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: fileDownload(). An attacker can pass in specially crafted filePath and fieName parameters to perform arbitrary File download.
|
[
"cpe:2.3:a:xxyopen:novel-plus:4.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:xxyopen:novel-plus:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2022:7314
|
Red Hat Security Advisory: zlib security update
|
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null | null |
GHSA-34g2-p88j-292j
|
Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
[] | null | null | null | null | null |
|
GHSA-583f-4h9x-v8xv
|
In VsimOperationDataExt::encode of vsimdata.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763050References: N/A
|
[] | null | 4.4 | null | null | null |
|
CVE-2018-7747
|
Multiple cross-site scripting (XSS) vulnerabilities in the Caldera Forms plugin before 1.6.0-rc.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a greeting message, (2) the email transaction log, or (3) an imported form.
|
[
"cpe:2.3:a:calderalabs:caldera_forms:*:*:*:*:*:wordpress:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-jcjj-wj46-9ph3
|
The data collection SDK of the router web management interface caused the leakage of the token. This affects Xiaomi router AX1800rom version < 1.0.336 and Xiaomi route RM1800 root version < 1.0.26.
|
[] | null | null | null | null | null |
|
GHSA-mw7f-7hv9-rrf6
|
Due to the lack of sanitization and lack of nonce protection on the custom CSS feature, an attacker could craft a request to inject malicious JavaScript on a site using the Contact Form 7 Style WordPress plugin through 3.1.9. If an attacker successfully tricked a site’s administrator into clicking a link or attachment, then the request could be sent and the CSS settings would be successfully updated to include malicious JavaScript.
|
[] | null | 8.8 | null | null | null |
|
CVE-1999-1313
|
Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands.
|
[
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-x6ch-c6rv-f7wh
|
Malicious Package in asymc
|
All versions of `asymc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation.
|
[] | null | 9.8 | null | null | null |
CVE-2021-33516
|
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
|
[
"cpe:2.3:a:gnome:gupnp:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.8 | null |
|
CVE-2025-20168
|
Cisco Common Services Platform Collector Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 5.4 | null | null | null |
CVE-2014-5587
|
The brokenscreencrank (aka com.biggame.brokenscreencrank) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:brokenscreencrank_project:brokenscreencrank:1.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2023-41718
|
When a particular process flow is initiated, an attacker may be able to gain unauthorized elevated privileges on the affected system when having control over a specific file.
|
[
"cpe:2.3:a:ivanti:secure_access_client:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:secure_access_client:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:secure_access_client:22.3:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:secure_access_client:22.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-pvp6-8jxg-p694
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition component of Oracle Fusion Middleware (subcomponent: Web Catalog). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).
|
[] | null | null | null | null | null |
|
CVE-2023-44272
|
A cross-site scripting vulnerability exists in Citadel versions prior to 994. When a malicious user sends an instant message with some JavaScript code, the script may be executed on the web browser of the victim user.
|
[
"cpe:2.3:a:citadel:citadel:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-w49q-vj4v-4c9w
|
Project files may contain malicious contents which the software will use to create files on the filesystem. This allows directory traversal and overwriting files with the privileges of the logged-in user.
|
[] | null | 7.8 | null | null | null |
|
CVE-2008-4424
|
Cross-site scripting (XSS) vulnerability in index.php in Domain Group Network GooCMS 1.02 allows remote attackers to inject arbitrary web script or HTML via the s parameter in a comments action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:domain_group_network:goocms:1.02:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-9v9w-8c52-9ffj
|
There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
|
[] | null | 9.8 | null | null | null |
|
CVE-2013-4827
|
SQL injection vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka ZDI-CAN-1664.
|
[
"cpe:2.3:a:hp:imc_service_operation_management_software_module:-:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-q9x7-4rf7-4xq2
|
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
|
[] | null | 4.3 | null | null | null |
|
GHSA-7549-gqq5-9cxg
|
Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.