id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2012-5300
|
SQL injection vulnerability in art_catalogo.php in MyStore Xpress Tienda Virtual 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:mystorexpress:tienda_virtual:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-20719
|
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D8500 before 1.0.3.43, R6250 before 1.0.4.34, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R7000P before 1.4.1.30, R7100LG before 1.0.0.48, R7300DST before 1.0.0.68, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, and R8500 before 1.0.2.128.
|
[
"cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
CVE-2011-0908
|
Open redirect vulnerability in Vanilla Forums before 2.0.17.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the Target parameter to an unspecified component, a different vulnerability than CVE-2011-0526.
|
[
"cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.4:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
GHSA-fg5c-ff2p-69xc
|
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the formSetClientState function.
|
[] | null | 7.5 | null | null | null |
|
CVE-2007-5383
|
The Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allows remote attackers on an intranet to bypass authentication and gain administrative access via vectors including a '/' (slash) character at the end of the PATH_INFO to cgi/b, aka "double-slash auth bypass." NOTE: remote attackers outside the intranet can exploit this by leveraging a separate CSRF vulnerability. NOTE: SpeedTouch 780 might also be affected by some of these issues.
|
[
"cpe:2.3:h:alcatel:speedtouch_7g_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bt:home_hub:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-5wj9-5hwc-xr22
|
Cross-site scripting (XSS) vulnerability in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via an RSS feed.
|
[] | null | null | null | null | null |
|
GHSA-6hf4-vpmw-h78p
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15812.
|
[] | null | null | null | null | null |
|
CVE-2012-0883
|
envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
|
[
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2019-13363
|
admin.php?page=notification_by_mail in Piwigo 2.9.5 has XSS via the nbm_send_html_mail, nbm_send_mail_as, nbm_send_detailed_content, nbm_complementary_mail_content, nbm_send_recent_post_dates, or param_submit parameter. This is exploitable via CSRF.
|
[
"cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*"
] | null | 9.6 | null | 6.8 | null |
|
CVE-2006-0172
|
Cross-site scripting (XSS) vulnerability in the file manager utility in Hummingbird Collaboration (aka Hummingbird Enterprise Collaboration) 5.21 and earlier allows remote attackers to inject arbitrary web script or HTML in an uploaded page, which is published without a check for hostile scripting.
|
[
"cpe:2.3:a:hummingbird:enterprise_collaboration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hummingbird:enterprise_collaboration:5.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-fv43-627p-jvmr
|
IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
|
[] | null | 4.7 | null | null | null |
|
GHSA-vpgj-6w52-7hjj
|
Missing Authorization vulnerability in Printful Printful Integration for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Printful Integration for WooCommerce: from n/a through 2.2.3.
|
[] | null | 4.3 | null | null | null |
|
GHSA-h2w7-2v8j-jgm7
|
In Nintex Automation 5.6 and 5.7 before 5.8, the K2 SmartForms Designer folder has configuration files (web.config) containing passwords that are readable by unauthorized users.
|
[] | null | 4.3 | null | null | null |
|
CVE-2025-25140
|
WordPress Simple User Profile plugin <= 1.9 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Scriptonite Simple User Profile allows Stored XSS. This issue affects Simple User Profile: from n/a through 1.9.
|
[] | null | 7.1 | null | null | null |
CVE-2021-1995
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).
|
[
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-9wwh-6p2j-f92g
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the alignment attribute of Field objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5094.
|
[] | null | null | 8.8 | null | null |
|
GHSA-rj8g-vjhf-jg95
|
The "mall some commodity details: commodity consultation" component in WSTMart 2.0.8_181212 has stored XSS via the consultContent parameter, as demonstrated by the index.php/home/goodsconsult/add.html URI.
|
[] | null | null | 6.1 | null | null |
|
CVE-2016-15015
|
viafintech Barzahlen Payment Module PHP SDK Webhook.php verify timing discrepancy
|
A vulnerability, which was classified as problematic, was found in viafintech Barzahlen Payment Module PHP SDK up to 2.0.0. Affected is the function verify of the file src/Webhook.php. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 3e7d29dc0ca6c054a6d6e211f32dae89078594c1. It is recommended to upgrade the affected component. VDB-217650 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:paysafe:barzahlen_payment_module_php_sdk:*:*:*:*:*:*:*:*"
] | null | 2.6 | 2.6 | 1.4 |
https://github.com/viafintech/Barzahlen-PHP/commit/3e7d29dc0ca6c054a6d6e211f32dae89078594c1
|
GHSA-f3g2-mvp2-3pxr
|
The sys_timer_create function in posix-timers.c for Linux kernel 2.6.x allows local users to cause a denial of service (memory consumption) and possibly bypass memory limits or cause other processes to be killed by creating a large number of posix timers, which are allocated in kernel memory but are not treated as part of the process' memory.
|
[] | null | null | null | null | null |
|
GHSA-792f-vcf6-566f
|
Buffer overflow in the kcsSUNWIOsolf.so library in Solaris 7 and 8 allows local attackers to execute arbitrary commands via the KCMS_PROFILES environment variable, e.g. as demonstrated using the kcms_configure program.
|
[] | null | null | null | null | null |
|
CVE-2024-39691
|
Malicious Matrix homeserver can leak truncated message content of messages it shouldn't have access to
|
matrix-appservice-irc is a Node.js IRC bridge for the Matrix messaging protocol. The fix for GHSA-wm4w-7h2q-3pf7 / CVE-2024-32000 included in matrix-appservice-irc 2.0.0 relied on the Matrix homeserver-provided timestamp to determine whether a user has access to the event they're replying to when determining whether or not to include a truncated version of the original event in the IRC message. Since this value is controlled by external entities, a malicious Matrix homeserver joined to a room in which a matrix-appservice-irc bridge instance (before version 2.0.1) is present can fabricate the timestamp with the intent of tricking the bridge into leaking room messages the homeserver should not have access to. matrix-appservice-irc 2.0.1 drops the reliance on `origin_server_ts` when determining whether or not an event should be visible to a user, instead tracking the event timestamps internally. As a workaround, it's possible to limit the amount of information leaked by setting a reply template that doesn't contain the original message.
|
[] | null | 4.3 | null | null | null |
CVE-2023-23404
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
GHSA-fgmq-fxrw-4cf2
|
Unrestricted file upload vulnerability in index.php in Atomymaxsite 2.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file, as exploited in the wild in October 2012.
|
[] | null | null | null | null | null |
|
CVE-2023-42093
|
Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability
|
Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21869.
|
[
"cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:2023.1.0.15510:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
GHSA-7g6r-q443-4qwp
|
SQL injection vulnerability in usercp.php in MyBB (MyBulletinBoard) 1.0 through 1.1.3 allows remote attackers to execute arbitrary SQL commands via the showcodebuttons parameter.
|
[] | null | null | null | null | null |
|
CVE-2021-42545
|
Insufficient Session Expiration in TopEase
|
An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions.
|
[
"cpe:2.3:a:business-dnasolutions:topease:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
CVE-2022-24042
|
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application returns an AuthToken that does not expire at the defined auto logoff delay timeout. An attacker could be able to capture this token and re-use old session credentials or session IDs for authorization.
|
[
"cpe:2.3:o:siemens:desigo_pxc5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_dxr2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_dxr2:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2014-6589
|
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427.
|
[
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] | null | null | null | 3.2 | null |
|
GHSA-4qxr-c6vx-j7fm
|
A security flaw has been discovered in zhenfeng13 My-Blog 1.0.0. This vulnerability affects unknown code of the file /blog/comment of the component Frontend Blog Article Comment Handler. The manipulation leads to authentication bypass by capture-replay. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 5.3 | null | null | null |
|
GHSA-v2pm-qr9p-2m3v
|
Cisco Linksys Routers EA2700, EA3500, E4200, EA4500: A bug can cause an unsafe TCP port to open which leads to unauthenticated access
|
[] | null | null | null | null | null |
|
GHSA-w3x6-wpp4-45cx
|
The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'A' parameter in all versions up to, and including, 3.4.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
|
GHSA-4v9q-9vcj-g43w
|
A local code execution security vulnerability was identified in HP Network Node Manager i (NNMi) v10.00, v10.10 and v10.20 Software.
|
[] | null | null | 7.8 | null | null |
|
CVE-2010-1916
|
The dynamic configuration feature in Xinha WYSIWYG editor 0.96 Beta 2 and earlier, as used in Serendipity 1.5.2 and earlier, allows remote attackers to bypass intended access restrictions and modify the configuration of arbitrary plugins via (1) crafted backend_config_secret_key_location and backend_config_hash parameters that are used in a SHA1 hash of a shared secret that can be known or externally influenced, which are not properly handled by the "Deprecated config passing" feature; or (2) crafted backend_data and backend_data[key_location] variables, which are not properly handled by the xinha_read_passed_data function. NOTE: this can be leveraged to upload and possibly execute arbitrary files via config.inc.php in the ImageManager plugin.
|
[
"cpe:2.3:a:xinha:wysiwyg_editor:0.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:xinha:wysiwyg_editor:0.91:beta:*:*:*:*:*:*",
"cpe:2.3:a:xinha:wysiwyg_editor:0.92:beta:*:*:*:*:*:*",
"cpe:2.3:a:xinha:wysiwyg_editor:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:xinha:wysiwyg_editor:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:xinha:wysiwyg_editor:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:xinha:wysiwyg_editor:0.96:beta:*:*:*:*:*:*",
"cpe:2.3:a:xinha:wysiwyg_editor:0.96:beta2:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.5:pl1:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.6:pl3:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:s9y:serendipity:1.5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2021:2040
|
Red Hat Security Advisory: rh-mariadb103-mariadb and rh-mariadb103-galera security update
|
mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.2 | null | null | null |
CVE-2022-22852
|
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_list.
|
[
"cpe:2.3:a:hospital\\'s_patient_records_management_system_project:hospital\\'s_patient_records_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 4.3 | null |
|
GHSA-pgvp-qh2c-78r2
|
The Condor S.E. (aka com.app_condorsoutheast.layout) application 1.399 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2025-24059
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
GHSA-v47g-xr27-3c46
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Service Shogun Ach Invoice App allows PHP Local File Inclusion.This issue affects Ach Invoice App: from n/a through 1.0.1.
|
[] | null | 7.5 | null | null | null |
|
GHSA-j6q4-78q3-g22f
|
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4. An attacker in a privileged network position may be able to inject keystrokes by spoofing a keyboard.
|
[] | null | 5.9 | null | null | null |
|
CVE-2023-37636
|
A stored cross-site scripting (XSS) vulnerability in UVDesk Community Skeleton v1.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Message field when creating a ticket.
|
[
"cpe:2.3:a:webkul:uvdesk:1.1.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
RHSA-2020:1505
|
Red Hat Security Advisory: qemu-kvm-ma security update
|
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server
|
[
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | 6 | null | null | null |
CVE-2016-4694
|
The Apache HTTP Server in Apple OS X before 10.12 and OS X Server before 5.2 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted CGI client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue, a related issue to CVE-2016-5387.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:os_x_server:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | 7.5 | null |
|
GHSA-mqp8-25jm-w22w
|
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
|
[] | null | 9.8 | null | null | null |
|
GHSA-8x27-9ppr-w79j
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ChatGPT Open AI Images & Content for WooCommerce allows Reflected XSS. This issue affects ChatGPT Open AI Images & Content for WooCommerce: from n/a through 2.2.0.
|
[] | null | 7.1 | null | null | null |
|
GHSA-f87m-rhgw-vj35
|
PostgreSQL Anonymizer v2.0 and v2.1 contain a vulnerability that allows a masked user to bypass the masking rules defined on a table and read the original data using a database cursor or the --insert option of pg_dump. This problem occurs only when dynamic masking is enabled, which is not the default setting. The problem is resolved in version 2.2.1
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-7258
|
WooCommerce Google Feed Manager <= 2.8.0 - Missing Authorization to Authenticated (Contributor+) Arbitrary File Deletion
|
The WooCommerce Google Feed Manager plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'wppfm_removeFeedFile' function in all versions up to, and including, 2.8.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
|
[
"cpe:2.3:a:wpmarketingrobot:woocommerce_google_feed_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wpmarketingrobot:woocommerce_google_feed_manager:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
CVE-2008-3692
|
Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-3691, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, and CVE-2008-3696.
|
[
"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-3rvg-chjx-7h2j
|
The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execute arbitrary code via a URL in a (a) .gitmodules file or (b) unknown other sources in a submodule.
|
[] | null | null | 9.8 | null | null |
|
GHSA-5vvj-3pp4-24pq
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
|
[] | null | null | null | null | null |
|
GHSA-ggjx-p9wq-x9mj
|
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Private Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 4.1 (Confidentiality impacts).
|
[] | null | null | 4.1 | null | null |
|
CVE-2020-13543
|
A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
|
[
"cpe:2.3:a:webkitgtk:webkitgtk:2.30.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
RHSA-2018:0050
|
Red Hat Security Advisory: vdsm security update
|
An update for vdsm is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null | null |
cisco-sa-ftd-intrusion-dos-DfT7wyGC
|
Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability
|
A vulnerability in the internal packet processing of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper handling of certain packets when they are sent to the inspection engine. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to deplete all 9,472 byte blocks on the device, resulting in traffic loss across the device or an unexpected reload of the device. If the device does not reload on its own, a manual reload of the device would be required to recover from this state.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the November 2023 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2023 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74985"].
|
[] | null | 8.6 | null | null | null |
cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
|
Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability
|
A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic.
This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches. An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to read or modify the traffic that is transmitted between the sites.
Cisco has not released and will not release software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 7.4 | null | null | null |
GHSA-3pg4-4j4q-43cp
|
In the Linux kernel, the following vulnerability has been resolved:irqchip/apple-aic: Fix refcount leak in aic_of_ic_initof_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
|
[] | null | 5.5 | null | null | null |
|
GHSA-99wh-fq8c-c266
|
In Package Manager Service, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-40092
|
A cross-site scripting (XSS) vulnerability in Image Tile in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via an SVG file.
|
[
"cpe:2.3:a:squaredup:squaredup:*:*:*:*:azure:*:*:*",
"cpe:2.3:a:squaredup:squaredup:*:*:*:*:community:*:*:*",
"cpe:2.3:a:squaredup:squaredup:*:*:*:*:system_center_operations_manager:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-6x94-8g2r-qg72
|
eProsima Fast DDS versions prior to 2.4.0 (#2269) are susceptible to exploitation when an attacker sends a specially crafted packet to flood a target device with unwanted traffic, which may result in a denial-of-service condition and information exposure.
|
[] | null | 9.1 | null | null | null |
|
CVE-2001-0182
|
FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources.
|
[
"cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp3:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-ggrx-w8hv-q97q
|
During boot, the device unlock interface behaves differently depending on if a fingerprint registered to the device is present. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-79776455
|
[] | null | null | null | null | null |
|
GHSA-qhrg-rwr6-hrvj
|
Cross-site scripting (XSS) vulnerability in photos/index.php in TCW PHP Album 1.0 allows remote attackers to inject arbitrary web script or HTML via the album parameter.
|
[] | null | null | null | null | null |
|
CVE-2020-35138
|
The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in the com/mobileiron/common/utils/C4928m.java file. NOTE: It has been asserted that there is no causality or connection between credential encryption and the MiTM attack
|
[
"cpe:2.3:a:mobileiron:mobile\\@work:*:*:*:*:*:android:*:*",
"cpe:2.3:a:mobileiron:mobile\\@work:*:*:*:*:*:iphone_os:*:*"
] | null | 9.8 | null | 5 | null |
|
GHSA-xv4r-44qp-78wm
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
|
[] | null | 9.9 | null | null | null |
|
GHSA-mgm9-mwp5-9w5r
|
BSS Continuity CMS 4.2.22640.0 has a Remote Code Execution vulnerability due to unauthenticated file upload
|
[] | null | null | null | null | null |
|
GHSA-mp68-mcgr-c9f7
|
Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, and CVE-2016-6989.
|
[] | null | null | 9.8 | null | null |
|
CVE-2018-4299
|
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-vp3r-hc2j-v8hr
|
A vulnerability was found in givanz Vvveb 1.0.6.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to session fixiation. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.7 is able to address this issue. The patch is named d4b1e030066417b77d15b4ac505eed5ae7bf2c5e. It is recommended to upgrade the affected component.
|
[] | 2.1 | 6.3 | null | null | null |
|
CVE-2024-9521
|
SEO Manager <= 1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Meta
|
The SEO Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post meta in versions up to, and including, 1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
RHSA-2013:0621
|
Red Hat Security Advisory: kernel security update
|
kernel: x86/msr: /dev/cpu/*/msr local privilege escalation kernel: race condition with PTRACE_SETREGS
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-85fc-m2vq-4r26
|
Mozilla Firefox before 15.0 on Android does not properly implement unspecified callers of the __android_log_print function, which allows remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function.
|
[] | null | null | null | null | null |
|
GHSA-x65f-5582-859h
|
cgi-bin/setup_virtualserver.exe on the Belkin F5D7230-4 router with firmware 9.01.10 allows remote attackers to cause a denial of service (control center outage) via an HTTP request with invalid POST data and a "Connection: Keep-Alive" header.
|
[] | null | null | null | null | null |
|
GHSA-9x38-862g-jg8w
|
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
|
[] | null | null | null | null | null |
|
GHSA-hqc8-j86x-2764
|
Off-by-one error in simple-slab
|
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory.
|
[] | null | 7.5 | null | null | null |
CVE-2021-3555
|
A Buffer Overflow vulnerability in the RSTP server component of Eufy Indoor 2K Indoor Camera allows a local attacker to achieve remote code execution. This issue affects: Eufy Indoor 2K Indoor Camera 2.0.9.3 version and prior versions.
|
[
"cpe:2.3:o:eufylife:solo_indoorcam_c24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:eufylife:solo_indoorcam_c24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:eufylife:solo_indoorcam_p24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:eufylife:solo_indoorcam_p24:-:*:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
|
cisco-sa-20180815-csb-wap-dos
|
Cisco Small Business 100 Series and 300 Series Wireless Access Points Denial of Service Vulnerability
|
A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to the improper processing of certain EAPOL frames. An attacker could exploit this vulnerability by sending a stream of crafted EAPOL frames to an affected device. A successful exploit could allow the attacker to force the access point (AP) to disassociate all the associated stations (STAs) and to disallow future, new association requests.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-csb-wap-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-csb-wap-dos"]
|
[] | null | null | 6.8 | null | null |
CVE-2018-17614
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client prior to V2.7. User interaction is not required to exploit this vulnerability. The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6436.
|
[
"cpe:2.3:a:losant:arduino_mqtt_client:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 | null |
|
GHSA-frgm-mc5h-57vv
|
Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unauthenticated, remote attacker can use this vulnerability to execute arbitrary code.
|
[] | null | null | 9.8 | null | null |
|
GHSA-236p-2rjr-h84v
|
Multiple buffer overflows in the AirDefense Airsensor M520 with firmware 4.3.1.1 and 4.4.1.4 allow remote authenticated users to cause a denial of service (HTTPS service outage) via a crafted query string in an HTTPS request to (1) adLog.cgi, (2) post.cgi, or (3) ad.cgi, related to the "files filter."
|
[] | null | null | null | null | null |
|
GHSA-j2m9-929g-4mjf
|
PHP remote file inclusion vulnerability in news.php in Sponge News 2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sndir parameter.
|
[] | null | null | null | null | null |
|
GHSA-gj25-c67g-2q9v
|
Uncontrolled search path element vulnerability in Samsung Update prior to version 3.0.77.0 allows attackers to execute arbitrary code as Samsung Update permission.
|
[] | null | 7.8 | null | null | null |
|
CVE-2005-2637
|
Multiple SQL injection vulnerabilities in PHPFreeNews 1.40 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) Match or (2) CatID parameter to SearchResults.php, or (3) the password to AccessControl.php.
|
[
"cpe:2.3:a:phpfreenews:phpfreenews:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-30981
|
An issue was discovered in Gentics CMS before 5.43.1. By uploading a malicious ZIP file, an attacker is able to deserialize arbitrary data and hence can potentially achieve Java code execution.
|
[
"cpe:2.3:a:gentics:gentics_cms:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-9vgx-7hmw-rvwq
|
Cross-site scripting (XSS) vulnerability in DevTrack 6.x allows remote attackers to inject arbitrary web script or HTML via the "Keyword search" form field and unspecified other form fields that populate a public saved query. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2011-1677
|
mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
|
[
"cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-m74g-79p9-m5hp
|
The Asus ASUS_X015_1 Android device with a build fingerprint of asus/CN_X015/ASUS_X015_1:7.0/NRD90M/CN_X015-14.00.1709.35-20171215:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000015, versionName=7.0.0.3_161222) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
|
[] | null | null | null | null | null |
|
GHSA-ggx4-j822-3742
|
SQL injection vulnerability in CoBaLT 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) urun.asp, (2) admin/bayi_listele.asp, (3) admin/urun_grup_listele.asp, and (4) admin/urun_listele.asp.
|
[] | null | null | null | null | null |
|
GHSA-8fr3-hfg3-gpgp
|
Open Redirect in node-forge
|
parseUrl functionality in node-forge mishandles certain uses of backslash such as `https:/\/\/\` and interprets the URI as a relative path.
|
[] | null | 6.1 | null | null | null |
GHSA-j247-q9q3-vr7w
|
In the Linux kernel, the following vulnerability has been resolved:perf/x86/amd/core: Always clear status for idxThe variable 'status' (which contains the unhandled overflow bits) is
not being properly masked in some cases, displaying the following
warning:WARNING: CPU: 156 PID: 475601 at arch/x86/events/amd/core.c:972 amd_pmu_v2_handle_irq+0x216/0x270This seems to be happening because the loop is being continued before
the status bit being unset, in case x86_perf_event_set_period()
returns 0. This is also causing an inconsistency because the "handled"
counter is incremented, but the status bit is not cleaned.Move the bit cleaning together above, together when the "handled"
counter is incremented.
|
[] | null | null | null | null | null |
|
GHSA-9h9f-9q8g-6764
|
Gophish XSS Vulnerability
|
Gophish through 0.8.0 allows XSS via a username.
|
[] | null | 4.8 | null | null | null |
GHSA-r5vp-hv57-2vcx
|
Heap-based buffer overflow in the RTSP service in Helix DNA Server before 11.1.4 allows remote attackers to execute arbitrary code via an RSTP command containing multiple Require headers.
|
[] | null | null | null | null | null |
|
GHSA-xcpp-m32j-m837
|
An XSS vulnerability exists in PHPRelativePath (aka Relative Path) through 1.0.2 via the RelativePath.Example1.php path parameter.
|
[] | null | null | null | null | null |
|
RHSA-2016:2837
|
Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice
|
This is the 90 day notification for the End of Production Phase 2 of
Red Hat CloudForms 3.x.
|
[
"cpe:/a:redhat:cloudforms:3.0"
] | null | null | null | null | null |
CVE-2023-29109
|
Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)
|
The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.
|
[
"cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:abap_platform:75d:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:abap_platform:75e:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:application_interface_framework:aif_703:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:application_interface_framework:aifx_702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:basis:755:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:basis:756:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:101:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
GHSA-gc2g-58xq-cq5h
|
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
|
[] | null | 4.3 | null | null | null |
|
CVE-2024-2626
|
Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-c2jc-qcxf-rg39
|
Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to inject arbitrary web script or HTML via (1) exercise_result.php, (2) exercice_submit.php, (3) agenda.php, (4) learningPathList.php, (5) learningPathAdmin.php, (6) learningPath.php, (7) userLog.php, (8) tool parameter to toolaccess_details.php, (9) data parameter to user_access_details.php, or (10) coursePath parameter to myagenda.php.
|
[] | null | null | null | null | null |
|
CVE-2016-0459
|
Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote authenticated users to affect integrity via unknown vectors related to Popup Windows.
|
[
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2019-11680
|
KonaKart 8.9.0.0 is vulnerable to Remote Code Execution by uploading a web shell as a product category image.
|
[
"cpe:2.3:a:konakart:konakart:8.9.0.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2024-0023
|
In ConvertRGBToPlanarYUV of Codec2BufferUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0l:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
|
CVE-2021-23192
|
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
|
[
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.