id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2019-6240
An issue was discovered in GitLab Community and Enterprise Edition before 11.4. It allows Directory Traversal.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
null
7.5
5
CVE-2022-38657
An open redirect to malicious sites affects HCL Leap
An open redirect to malicious sites can occur when accessing the "Feedback" action on the manager page.
[ "cpe:2.3:a:hcltech:hcl_leap:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
CVE-2014-2770
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1781, CVE-2014-1792, and CVE-2014-1804.
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2023-50724
Resque vulnerable to reflected cross site scripting through pathname
Resque (pronounced like "rescue") is a Redis-backed library for creating background jobs, placing those jobs on multiple queues, and processing them later. resque-web in resque versions before 2.1.0 are vulnerable to reflected XSS through the current_queue parameter in the path of the queues endpoint. This issue has been patched in version 2.1.0.
[ "cpe:2.3:a:resque:resque:*:*:*:*:*:ruby:*:*" ]
null
6.3
null
null
CVE-2024-7077
Reflected XSS in Semtek Informatics Software's Semtek Sempos
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Semtek Informatics Software Consulting Inc. Semtek Sempos allows Reflected XSS.This issue affects Semtek Sempos: through 31072024.
[ "cpe:2.3:a:semtekyazilim:semtek_sempos:*:*:*:*:*:*:*:*" ]
5.3
null
null
null
GHSA-263w-c8fq-43wx
Cross-site scripting (XSS) vulnerability in viewtopic.php in phpBB 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the highlight parameter.
[]
null
null
null
null
CVE-2024-13377
GravityForms <= 2.9.1.3 - Unauthenticated Stored Cross-Site Scripting via 'alt' parameter
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘alt’ parameter in all versions up to, and including, 2.9.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
GHSA-h5h8-ww78-78rq
Comodo Antivirus versions up to 12.0.0.6810 are vulnerable to Local Privilege Escalation due to CmdAgent's handling of COM clients. A local process can bypass the signature check enforced by CmdAgent via process hollowing which can then allow the process to invoke sensitive COM methods in CmdAgent such as writing to the registry with SYSTEM privileges.
[]
null
null
7.8
null
CVE-2011-3137
Unspecified vulnerability in the Management Console in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.9 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.2.0 before 6.2.0.9 has unknown impact and attack vectors, aka APAR IV03050.
[ "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_federated_identity_manager_business_gateway:6.2.0.8:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-fv3m-jf9j-44vh
Cross-Site Scripting vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow an attacker to store a malicious JavaScript payload within the application by adding the payload to 'Community Description' or 'Community Rules'.
[]
null
5.8
null
null
CVE-2018-6916
In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p7, 10.4-STABLE, 10.4-RELEASE-p7, and 10.3-RELEASE-p28, the kernel does not properly validate IPsec packets coming from a trusted host. Additionally, a use-after-free vulnerability exists in the IPsec AH handling code. This issue could cause a system crash or other unpredictable results.
[ "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.3:p28:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.4:p7:*:*:*:*:*:*" ]
null
null
9.8
9
GHSA-7xxf-49fm-jc7x
Google Chrome before 9.0.597.107 does not properly render tables, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
[]
null
null
null
null
CVE-2024-47117
IBM Carbon Design System cross-site scripting
IBM Carbon Design System (Carbon Charts 0.4.0 through 1.13.16) is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:a:ibm:carbon_charts:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:carbon_charts:1.13.16:*:*:*:*:*:*:*" ]
null
5.4
null
null
RHSA-2024:3752
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.7 release and security update
JSON-java: parser confusion leads to OOM keycloak: path transversal in redirection validation
[ "cpe:/a:redhat:amq_broker:7.10" ]
null
8.1
null
null
CVE-2008-7063
Ocean12 FAQ Manager Pro stores sensitive data under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for admin/o12faq.mdb.
[ "cpe:2.3:a:ocean12tech:faq_manager_pro:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-37734
EZ softmagic MP3 Audio Converter 2.7.3.700 was discovered to contain a buffer overflow.
[ "cpe:2.3:a:ezsoftmagic:mp3_audio_converter:2.7.3.700:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-g95v-qwj3-qrc2
Incorrect access control in Himalaya Xiaoya nano smart speaker rom_version 1.6.96 allows a remote attacker to have an unspecified impact.
[]
null
6.3
null
null
CVE-2020-25186
An XXE vulnerability exists within LeviStudioU Release Build 2019-09-21 and prior when processing parameter entities, which may allow file disclosure.
[ "cpe:2.3:a:we-con:levistudiou:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-rqrc-wvq6-vxfv
In Gradle Enterprise before 2021.4.2, the default built-in build cache configuration allowed anonymous write access. If this was not manually changed, a malicious actor with network access to the build cache could potentially populate it with manipulated entries that execute malicious code as part of a build. As of 2021.4.2, the built-in build cache is inaccessible-by-default, requiring explicit configuration of its access-control settings before it can be used. (Remote build cache nodes are unaffected as they are inaccessible-by-default.)
[]
null
8.1
null
null
CVE-2021-38134
Possible Reflected and Stored XSS in OpenText iManager
Possible XSS in iManager URL for access Component has been discovered in OpenText™ iManager 3.2.5.0000.
[]
null
6.1
null
null
GHSA-g3qp-jr64-m396
A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow a privileged user to print the SANnav encrypted key in PostgreSQL startup logs. This could provide attackers with an additional, less-protected path to acquiring the encryption key.
[]
null
5
null
null
GHSA-8rq8-9c95-x5gx
A SQL injection vulnerability exists in the FolioVision FV Flowplayer Video Player plugin before 7.3.19.727 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.
[]
null
9.8
null
null
RHSA-2014:1312
Red Hat Security Advisory: bash Shift_JIS security update
bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
[ "cpe:/a:redhat:rhel_sjis:5", "cpe:/a:redhat:rhel_sjis:6" ]
null
null
null
null
CVE-2018-7281
CactusVPN 5.3.6 for macOS contains a root privilege escalation vulnerability through a setuid root binary called runme. The binary takes a single command line argument and passes this argument to a system() call, thus allowing low privileged users to execute commands as root.
[ "cpe:2.3:a:cactusvpn:cactusvpn:5.3.6:*:*:*:*:macos:*:*" ]
null
null
8.8
9
CVE-2021-39632
In inotify_cb of events.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-202159709
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-j7jq-74cp-fg2v
There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.
[]
null
null
null
null
GHSA-cggp-hg98-4chw
IBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in Java. By sending specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 182396.
[]
null
null
null
null
GHSA-hmcv-8x8x-cv4h
A vulnerability has been found in Campcodes Complete Web-Based School Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /model/update_exam.php. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263794 is the identifier assigned to this vulnerability.
[]
5.3
3.5
null
null
CVE-2014-8892
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via unspecified vectors related to the security manager.
[ "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*" ]
null
null
null
7.8
GHSA-p954-47vj-3wxw
OX App Suite through 7.10.6 allows XSS via appHandler in a deep link in an e-mail message.
[]
null
6.1
null
null
GHSA-5c9h-pc39-3279
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Social Links allows Stored XSS. This issue affects Social Links: from n/a through 1.0.11.
[]
null
6.5
null
null
GHSA-ggpw-5qfx-mxxj
A Cross-Site Request Forgery issue was discovered in Meteocontrol WEB'log Basic 100 all versions, Light all versions, Pro all versions, and Pro Unlimited all versions. There is no CSRF Token generated per page or per function.
[]
null
null
8.8
null
CVE-2023-23735
WordPress Spectra – WordPress Gutenberg Blocks plugin <= 2.3.0 - Unauthenticated Email HTML Injection Vulnerability
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Brainstorm Force Spectra allows Code Injection.This issue affects Spectra: from n/a through 2.3.0.
[]
null
5.3
null
null
CVE-2019-19993
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Several full path disclosure vulnerability were discovered. A user, even with no authentication, may simply send arbitrary content to the vulnerable pages to generate error messages that expose some full paths.
[ "cpe:2.3:a:seling:visual_access_manager:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2022-20188
Product: AndroidVersions: Android kernelAndroid ID: A-207254598References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-pwpx-m778-r79w
Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference.
[]
null
null
null
null
GHSA-2697-j9w4-39rc
Windows Error Reporting Service Elevation of Privilege Vulnerability
[]
null
7
null
null
GHSA-jwww-5r86-6w3f
An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-33842951.
[]
null
null
7
null
CVE-2015-0950
Cross-site scripting (XSS) vulnerability in admin.php in X-Cart 5.1.6 through 5.1.10 allows remote attackers to inject arbitrary web script or HTML via the substring parameter.
[ "cpe:2.3:a:qualiteam:x-cart:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:qualiteam:x-cart:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:qualiteam:x-cart:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:qualiteam:x-cart:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:qualiteam:x-cart:5.1.10:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-1721
.NET Core and Visual Studio Denial of Service Vulnerability
.NET Core and Visual Studio Denial of Service Vulnerability
[ "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powershell_core:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powershell_core:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powershell_core:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2019-0274
SAP Mobile Platform SDK allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service (i.e. denial of service). Fixed in versions 3.1 SP03 PL02, SDK 3.1 SP04, or later.
[ "cpe:2.3:a:sap:mobile_platform_sdk:3.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-2vxx-xxv4-3gj8
Reflected XSS in wordpress plugin admin-font-editor v1.8
[]
null
null
6.1
null
GHSA-vf3q-mq2p-f2jx
Internal HTTP server in Sun Netbeans Java IDE in Netbeans Developer 3.0 Beta and Forte Community Edition 1.0 Beta does not properly restrict access to IP addresses as specified in its configuration, which allows arbitrary remote attackers to access the server.
[]
null
null
null
null
RHSA-2019:4222
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0.3 RPMs security update
envoy: an untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1 envoy: malformed request header may cause bypass of route matchers resulting in escalation of privileges or information disclosure envoy: malformed HTTP request without the Host header may cause abnormal termination of the Envoy process
[ "cpe:/a:redhat:service_mesh:1.0::el7", "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
null
7.5
null
CVE-2021-44367
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetUpnp param is not object. An attacker can send an HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*" ]
null
null
8.6
null
GHSA-mfv8-q39f-mgfg
Cross-site Scripting in invenio-communities
Cross-Site Scripting (XSS) vulnerability in Jinja templatesImpactA Cross-Site Scripting (XSS) vulnerability was discovered in two Jinja templates in the Invenio-Communities module. The vulnerability allows a user to create a new community and include script element tags inside the description and page fields.PatchesThe problem has been patched in v1.0.0a20.For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
5.1
null
5.4
null
CVE-2013-3830
Unspecified vulnerability in the Hyperion Strategic Finance component in Oracle Hyperion 11.1.2.1 and 11.1.2.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server.
[ "cpe:2.3:a:oracle:hyperion_interactive_reporting:11.1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hyperion_interactive_reporting:11.1.2.2:*:*:*:*:*:*:*" ]
null
null
null
7.1
GHSA-pjh3-jv7w-9jpr
Command Injection in gm
Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary.RecommendationUpdate to version 1.21.1 or later.
[]
null
null
null
null
CVE-2021-41035
In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.
[ "cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2017-20068
Hindu Matrimonial Script usermanagement.php privileges management
A vulnerability was found in Hindu Matrimonial Script. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/usermanagement.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:hindu_matrimonial_script_project:hindu_matrimonial_script:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
CVE-1999-1495
xtvscreen in SuSE Linux 6.0 allows local users to overwrite arbitrary files via a symlink attack on the pic000.pnm file.
[ "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-mp67-wx57-8m4f
In injectInputEventToInputFilter of AccessibilityManagerService.java, there is a possible arbitrary input event injection due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
8.4
null
null
CVE-2012-2847
Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, does not request user confirmation before continuing a large series of downloads, which allows user-assisted remote attackers to cause a denial of service (resource consumption) via a crafted web site.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:21.0.1180.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:frame:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-32929
In gpu_slc_get_region of pixel_gpu_slc.c, there is a possible EoP due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-g3gj-632x-fhrh
SSRF vulnerability due to missing permission check in Jenkins JMS Messaging Plugin
A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.
[]
null
null
4.3
null
GHSA-cwpg-qgc6-jxvq
Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.
[]
null
9.8
null
null
GHSA-983h-w38c-cwjw
Windows Clip Service Elevation of Privilege Vulnerability
[]
null
7
null
null
CVE-2018-1507
IBM DOORS Next Generation (DNG/RRC) 6.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 141415.
[ "cpe:2.3:a:ibm:rational_doors_next_generation:6.0.5:*:*:*:*:*:*:*" ]
null
null
5.4
null
CVE-2014-7770
The Lagu POP Indonesia (aka com.lagu.pop.indonesia.xygwphqpuomclljvaa) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:mediaonlinecenter:lagu_pop_indonesia:2:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-244g-mc48-hxgx
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Start Booking Scheduling Plugin – Online Booking for WordPress allows Stored XSS.This issue affects Scheduling Plugin – Online Booking for WordPress: from n/a through 3.5.10.
[]
null
6.5
null
null
CVE-2019-15950
The CRM Plugin before 4.2.4 for Redmine allows XSS via crafted vCard data.
[ "cpe:2.3:a:redmineup:crm:*:*:*:*:*:redmine:*:*" ]
null
6.1
null
4.3
CVE-2023-3226
Popup Builder < 4.2.0 - Admin+ Stored Cross-Site Scripting
The Popup Builder WordPress plugin before 4.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[ "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
null
GHSA-854f-h7f6-645p
The Tecno Camon iAir 2 Plus Android device with a build fingerprint of TECNO/H622/TECNO-ID3k:8.1.0/O11019/E-180914V83:user/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.0.11). This app contains an exported service named com.lovelyfont.manager.FontCoverService that allows any app co-located on the device to supply arbitrary commands via shell script to be executed as the system user that are triggered by writing an attacker-selected message to the logcat log. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing commands as the system user can allow a third-party app to factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more.
[]
null
null
null
null
CVE-2004-0731
Cross-site scripting (XSS) vulnerability in index.php in the Search module for Php-Nuke allows remote attackers to inject arbitrary script as other users via the input field.
[ "cpe:2.3:a:francisco_burzi:php-nuke:8.0_final:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2017-9204
The iw_get_ui16le function in imagew-util.c:405:23 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted image, related to imagew-jpeg.c.
[ "cpe:2.3:a:entropymine:imageworsener:1.3.1:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-wj6q-chpv-mcrx
Insufficient Verification of Data Authenticity in Apache InLong
Insufficient Verification of Data Authenticity vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0,General user can view all user data like Admin account.Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it.[1]  https://github.com/apache/inlong/pull/8623
[]
null
6.5
null
null
CVE-2023-0696
Type confusion in V8 in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-f2wq-wrc8-9j57
contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
[]
null
null
null
null
CVE-2024-42137
Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot Commit 272970be3dab ("Bluetooth: hci_qca: Fix driver shutdown on closed serdev") will cause below regression issue: BT can't be enabled after below steps: cold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure if property enable-gpios is not configured within DT|ACPI for QCA6390. The commit is to fix a use-after-free issue within qca_serdev_shutdown() by adding condition to avoid the serdev is flushed or wrote after closed but also introduces this regression issue regarding above steps since the VSC is not sent to reset controller during warm reboot. Fixed by sending the VSC to reset controller within qca_serdev_shutdown() once BT was ever enabled, and the use-after-free issue is also fixed by this change since the serdev is still opened before it is flushed or wrote. Verified by the reported machine Dell XPS 13 9310 laptop over below two kernel commits: commit e00fc2700a3f ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of bluetooth-next tree. commit b23d98d46d28 ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of linus mainline tree.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2020:5618
Red Hat Security Advisory: thunderbird security update
chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2017:1256
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.15 update on RHEL 5
Resteasy: Yaml unmarshalling vulnerable to RCE
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
8.1
null
GHSA-8v2m-x872-56fc
A vulnerability, which was classified as critical, was found in almosteffortless secure-files Plugin up to 1.1 on WordPress. Affected is the function sf_downloads of the file secure-files.php. The manipulation of the argument downloadfile leads to path traversal. Upgrading to version 1.2 is able to address this issue. The name of the patch is cab025e5fc2bcdad8032d833ebc38e6bd2a13c92. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-243804.
[]
null
null
5.5
null
CVE-2024-20132
In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872.
[ "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-jmq8-q284-83mw
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Possible buffer overflow in TX and RX FIFOs of microcontroller in camera subsystem used to exchange commands and messages between Micro FW and CPP driver.
[]
null
null
7.8
null
GHSA-28c9-mq9x-7pcr
In the Linux kernel, the following vulnerability has been resolved:KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leakvcpu_put is not called if the user copy fails. This can result in preempt notifier corruption and crashes, among other issues.
[]
null
null
null
null
CVE-2025-24884
kube-audit-rest's example logging configuration could disclose secret values in the audit log
kube-audit-rest is a simple logger of mutation/creation requests to the k8s api. If the "full-elastic-stack" example vector configuration was used for a real cluster, the previous values of kubernetes secrets would have been disclosed in the audit messages. This vulnerability is fixed in 1.0.16.
[]
5.1
null
null
null
CVE-2019-19670
A HTTP Response Splitting vulnerability was identified in the Web Settings Component of Web File Manager in Rumpus FTP Server 8.2.9.1. A successful exploit can result in stored XSS, website defacement, etc. via ExtraHTTPHeader to RAPR/WebSettingsGeneralSet.html.
[ "cpe:2.3:a:maxum:rumpus_ftp:8.2.9.1:*:*:*:*:windows:*:*" ]
null
6.1
null
4.3
CVE-2020-1407
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1401.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
GHSA-xc3f-4237-2h7m
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
null
null
CVE-2023-23841
SolarWinds Serv-U Exposure of Sensitive Information Vulnerability
SolarWinds Serv-U is submitting an HTTP request when changing or updating the attributes for File Share or File request.  Part of the URL of the request discloses sensitive data. 
[ "cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2010-3893
The administrator interface in IBM OmniFind Enterprise Edition 8.x and 9.x does not restrict use of a session ID (aka SID) value to a single IP address, which allows remote attackers to perform arbitrary administrative actions by leveraging cookie theft, related to a "session impersonation" issue.
[ "cpe:2.3:a:ibm:omnifind:8.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:8.4:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:8.5:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:9.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:omnifind:9.1:-:enterprise:*:*:*:*:*" ]
null
null
null
7.5
GHSA-c2gv-m57j-hq74
The Document Management component in Cisco Unified Contact Center Express does not properly validate a parameter, which allows remote authenticated users to upload files to arbitrary pathnames via a crafted HTTP request, aka Bug ID CSCun74133.
[]
null
null
null
null
GHSA-hwc4-vqrx-2xc8
In JetBrains YouTrack versions before 2020.3.4313, 2020.2.11008, 2020.1.11011, 2019.1.65514, 2019.2.65515, and 2019.3.65516, an attacker can retrieve an issue description without appropriate access.
[]
null
6.5
null
null
CVE-2021-26899
Windows UPnP Device Host Elevation of Privilege Vulnerability
Windows UPnP Device Host Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x86:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:x86:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:-:*:-:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*" ]
null
7.8
null
null
GHSA-2w2r-jcr9-2rp9
Xplico before 1.2.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the name of an uploaded PCAP file. NOTE: this issue can be exploited without authentication by leveraging the user registration feature.
[]
null
null
8.8
null
GHSA-vwgh-xm6c-wqh8
An issue was discovered in the G-Net GNET APK 2.6.2. Hardcoded credentials exist in in APK for ports 9091 and 9092. The GNET mobile application contains hardcoded credentials that provide unauthorized access to the dashcam's API endpoints on ports 9091 and 9092. Once the GNET SSID is connected to, the attacker sends a crafted authentication command with TibetList and 000000 to list settings of the dashcam at port 9091. There's a separate set of credentials for port 9092 (stream) that is also exposed in cleartext: admin + tibet. For settings, the required credentials are adim + 000000.
[]
null
9.8
null
null
CVE-2020-17382
The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).
[ "cpe:2.3:o:msi:ambientlink_mslo64_firmware:1.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:msi:ambientlink_mslo64:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-c9r9-7qcg-7h37
Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
[]
null
6.5
null
null
GHSA-wgp2-h668-fp64
A clickjacking vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found.
[]
null
null
4.3
null
CVE-2022-30546
Out-of-bounds read vulnerability exists in the simulator module contained in the graphic editor 'V-SFT' versions prior to v6.1.6.0, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file.
[ "cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-3c4w-p6cr-wgq6
In the Linux kernel, the following vulnerability has been resolved:mm/slub: actually fix freelist pointer vs redzoningIt turns out that SLUB redzoning ("slub_debug=Z") checks from s->object_size rather than from s->inuse (which is normally bumped to make room for the freelist pointer), so a cache created with an object size less than 24 would have the freelist pointer written beyond s->object_size, causing the redzone to be corrupted by the freelist pointer. This was very visible with "slub_debug=ZF":BUG test (Tainted: G B ): Right Redzone overwrittenINFO: 0xffff957ead1c05de-0xffff957ead1c05df @offset=1502. First byte 0x1a instead of 0xbb INFO: Slab 0xffffef3950b47000 objects=170 used=170 fp=0x0000000000000000 flags=0x8000000000000200 INFO: Object 0xffff957ead1c05d8 @offset=1496 fp=0xffff957ead1c0620Redzone (____ptrval____): bb bb bb bb bb bb bb bb ........ Object (____ptrval____): 00 00 00 00 00 f6 f4 a5 ........ Redzone (____ptrval____): 40 1d e8 1a aa @.... Padding (____ptrval____): 00 00 00 00 00 00 00 00 ........Adjust the offset to stay within s->object_size.(Note that no caches of in this size range are known to exist in the kernel currently.)
[]
null
null
null
null
CVE-2015-10114
WooSidebars Plugin class-woo-sidebars.php enable_custom_post_sidebars redirect
A vulnerability, which was classified as problematic, has been found in WooSidebars Plugin up to 1.4.1 on WordPress. Affected by this issue is the function enable_custom_post_sidebars of the file classes/class-woo-sidebars.php. The manipulation of the argument sendback leads to open redirect. The attack may be launched remotely. Upgrading to version 1.4.2 is able to address this issue. The patch is identified as 1ac6d6ac26e185673f95fc1ccc56a392169ba601. It is recommended to upgrade the affected component. VDB-230654 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:woocommerce:woosidebars:*:*:*:*:*:wordpress:*:*" ]
null
4.3
4.3
5
CVE-2012-6065
The OM Maximenu module 6.x-1.43 and earlier for Drupal, when the "Title has PHP" option is enabled, allows remote authenticated users with the "Administer OM Maximenu" permission to execute arbitrary PHP code via a "Link Title," a different vulnerability than CVE-2012-5553.
[ "cpe:2.3:a:daniel_honrade:om_maximenu:*:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.7:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.8:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.9:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.10:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.11:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.12:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.13:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.14:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.15:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.16:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.17:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.18:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.19:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.20:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.21:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.22:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.23:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.24:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.25:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.26:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.27:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.28:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.29:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.30:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.31:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.32:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.33:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.34:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.35:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.36:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.37:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.38:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.39:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.40:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.41:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.42:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-c4h3-4hjj-m5cr
traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero.
[]
null
null
null
null
GHSA-7rpq-2r35-jrq3
Cross-site scripting (XSS) vulnerability in search.asp in PDshopPro, when downloaded before 20070308, allows remote attackers to inject arbitrary web script or HTML via the search parameter.
[]
null
null
null
null
CVE-2024-9203
Enpass Password Manager sensitive information in memory
A vulnerability, which was classified as problematic, has been found in Enpass Password Manager up to 6.9.5 on Windows. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information in memory. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 6.10.1 is able to address this issue. It is recommended to upgrade the affected component.
[]
2
2.5
2.5
1
CVE-2023-49557
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component.
[ "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2023-40075
In forceReplaceShortcutInner of ShortcutPackage.java, there is a possible way to register unlimited packages due to a missing bounds check. This could lead to local denial of service which results in a boot loop with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-24098
Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection via the News Feed.
[ "cpe:2.3:a:code-projects:scholars_tracking_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2019-12753
An information disclosure vulnerability in Symantec Reporter web UI 10.3 prior to 10.3.2.5 allows a malicious authenticated administrator user to obtain passwords for external SMTP, FTP, FTPS, LDAP, and Cloud Log Download servers that they might not otherwise be authorized to access. The malicious administrator user can also obtain the passwords of other Reporter web UI users.
[ "cpe:2.3:a:symantec:reporter:*:*:*:*:*:*:*:*" ]
null
null
4.9
4