id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-9678-97g2-v2v3 | A command injection vulnerability in the license-check daemon of Juniper Networks Junos OS that may allow a locally authenticated attacker with low privileges to execute commands with root privilege. license-check is a daemon used to manage licenses in Junos OS. To update licenses, a user executes the command 'request system license update' via the CLI. An attacker with access to this CLI command may be able to exploit the vulnerability. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S2, 20.2R2. | [] | null | null | null | null |
|
GHSA-rqrc-wvq6-vxfv | In Gradle Enterprise before 2021.4.2, the default built-in build cache configuration allowed anonymous write access. If this was not manually changed, a malicious actor with network access to the build cache could potentially populate it with manipulated entries that execute malicious code as part of a build. As of 2021.4.2, the built-in build cache is inaccessible-by-default, requiring explicit configuration of its access-control settings before it can be used. (Remote build cache nodes are unaffected as they are inaccessible-by-default.) | [] | null | 8.1 | null | null |
|
CVE-2019-1769 | Cisco NX-OS Software Line Card Command Injection Vulnerability | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying Linux operating system of an attached line card with the privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system of an attached line card with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9504-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9508-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x96136yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x96136yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636c-rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636q-r:-:*:*:*:*:*:*:*"
] | null | null | 6.7 | null |
GHSA-hcrc-4mmf-w8v9 | An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC. | [] | null | null | null | null |
|
GHSA-h85x-rxvw-x49j | In the Linux kernel, the following vulnerability has been resolved:gpio: virtuser: fix missing lookup table cleanupsWhen a virtuser device is created via configfs and the probe fails due
to an incorrect lookup table, the table is not removed. This prevents
subsequent probe attempts from succeeding, even if the issue is
corrected, unless the device is released. Additionally, cleanup is also
needed in the less likely case of platform_device_register_full()
failure.Besides, a consistent memory leak in lookup_table->dev_id was spotted
using kmemleak by toggling the live state between 0 and 1 with a correct
lookup table.Introduce gpio_virtuser_remove_lookup_table() as the counterpart to the
existing gpio_virtuser_make_lookup_table() and call it from all
necessary points to ensure proper cleanup. | [] | null | 5.5 | null | null |
|
GHSA-vj62-crww-hrw5 | Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to obtain sensitive information via the world readable configuration. | [] | null | null | 4.3 | null |
|
CVE-2023-45951 | lylme_spage v1.7.0 was discovered to contain a SQL injection vulnerability via the $userip parameter at function.php. | [
"cpe:2.3:a:lylme:lylme_spage:1.7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2012-2011 | Multiple cross-site scripting (XSS) vulnerabilities in HP Web Jetadmin 8.x allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:hp:web_jetadmin:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:web_jetadmin:8.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gv29-jxwh-r2gm | Cross Site Scripting vulnerability in Friendica v.2023.12 allows a remote attacker to obtain sensitive information via the lack of file type filtering in the file attachment parameter. | [] | null | 6.1 | null | null |
|
CVE-2022-43354 | Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/manage_request. | [
"cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2004-1816 | Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption). | [
"cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:4.0:sp1a:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:jrun:4.0_build_61650:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*",
"cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*",
"cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*",
"cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*",
"cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2017-8641 | Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674. | [
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
GHSA-g38j-rgpp-8873 | lavc_CopyPicture in modules/codec/avcodec/video.c in VideoLAN VLC media player through 3.0.7 has a heap-based buffer over-read because it does not properly validate the width and height. | [] | null | 9.8 | null | null |
|
CVE-2006-3706 | Unspecified vulnerability in OC4J for Oracle Application Server 9.0.2.3 has unknown impact and attack vectors, aka Oracle Vuln# AS01. | [
"cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-8p3g-9vpm-6qrf | This issue was addressed through improved state management. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1. An attacker may be able to misuse a trust relationship to download malicious content. | [] | null | 8.8 | null | null |
|
GHSA-77j2-fwwh-4r69 | Zoho ManageEngine OpManager before 12.4.179 allows remote code execution via a specially crafted Mail Server Settings v1 API request. This was fixed in 12.5.108. | [] | null | null | null | null |
|
GHSA-fr83-m4h7-j3rv | Cross-site scripting (XSS) vulnerability in PHPSelect linksubmit allows remote attackers to inject arbitrary web script or HTML via (1) the description parameter to linklist.php and possibly other vectors involving (2) index.php and (3) linksubmit.php. | [] | null | null | null | null |
|
CVE-2023-27605 | WordPress WP Reroute Email Plugin <= 1.4.6 is vulnerable to SQL Injection | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sajjad Hossain WP Reroute Email allows SQL Injection.This issue affects WP Reroute Email: from n/a through 1.4.6.
| [
"cpe:2.3:a:wp_reroute_email_project:wp_reroute_email:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
RHSA-2022:5766 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | 6.1 | null |
CVE-2017-9977 | AVG AntiVirus for MacOS with scan engine before 4668 might allow remote attackers to bypass malware detection by leveraging failure to scan inside disk image (aka DMG) files. | [
"cpe:2.3:a:avg:anti-virus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2013-3045 | The Enterprise Meeting Server in IBM Lotus Sametime 8.5.2 and 8.5.2.1 allows remote authenticated users to share crafted links via the Library function. | [
"cpe:2.3:a:ibm:lotus_sametime:8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_sametime:8.5.2.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-f4f8-xfww-r4hf | OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php. | [] | null | null | 8.8 | null |
|
CVE-2021-37548 | In JetBrains TeamCity before 2021.1, passwords in cleartext sometimes could be stored in VCS. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-79w8-7369-g6wv | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 400, SD 410/12, SD 617, SD 650/52, SD 800, and SD 810, if Widevine App TZ_WV_CMD_DECRYPT_VIDEO is called with a size too large, an integer overflow may occur. | [] | null | null | 9.8 | null |
|
GHSA-rx6q-w4m8-rp4v | In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144. | [] | null | 6.7 | null | null |
|
GHSA-c6j8-r888-r854 | The Taxonomy module in Drupal 7.x before 7.26, when upgraded from an earlier version of Drupal, does not properly restrict access to unpublished content, which allows remote authenticated users to obtain sensitive information via a listing page. | [] | null | null | null | null |
|
CVE-2023-38089 | Kofax Power PDF clearInterval Out-Of-Bounds Write Remote Code Execution Vulnerability | Kofax Power PDF clearInterval Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of app objects. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20567. | [
"cpe:2.3:a:kofax:power_pdf:5.0.0.19:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-xj33-wwm4-p8mw | In the Linux kernel, the following vulnerability has been resolved:bpf, s390: Fix potential memory leak about jit_dataMake sure to free jit_data through kfree() in the error path. | [] | null | 5.5 | null | null |
|
GHSA-h74j-999g-2xqf | HCL AppScan Standard is vulnerable to XML External Entity Injection (XXE) attack when processing XML data | [] | null | null | null | null |
|
CVE-2024-28676 | DedeCMS v5.7 was discovered to contain a cross-site scripting (XSS) vulnerability via /dede/article_edit.php. | [
"cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-8q5m-233q-4cpc | Product: AndroidVersions: Android kernelAndroid ID: A-188935887References: N/A | [] | null | 9.8 | null | null |
|
RHSA-2023:0160 | Red Hat Security Advisory: rh-postgresql10-postgresql security and bug fix update | postgresql: Extension scripts replace objects not belonging to the extension. | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.1 | null | null |
CVE-2023-46190 | WordPress Novo-Map : your WP posts on custom google maps Plugin <= 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Novo-media Novo-Map : your WP posts on custom google maps plugin <= 1.1.2 versions. | [
"cpe:2.3:a:novo-media:novo-map\\:your_wp_posts_on_custom_google_maps:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-g6vq-46f2-9g62 | A vulnerability in the authentication, authorization, and accounting (AAA) security services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect memory operations that the affected software performs when the software parses a username during login authentication. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device or cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are running Cisco IOS XE Software Release Fuji 16.7.1 or Fuji 16.8.1 and are configured to use AAA for login authentication. Cisco Bug IDs: CSCvi25380. | [] | null | 9.8 | null | null |
|
GHSA-3f3f-5w2h-wvgq | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WS Form WS Form LITE – Drag & Drop Contact Form Builder for WordPress.This issue affects WS Form LITE – Drag & Drop Contact Form Builder for WordPress: from n/a through 1.9.170. | [] | null | 7.6 | null | null |
|
CVE-2025-1061 | Nextend Social Login Pro <= 3.1.16 - Authentication Bypass via Apple OAuth provider | The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.16. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. | [] | null | 9.8 | null | null |
GHSA-5xf9-hrqg-23cp | Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow." | [] | null | null | null | null |
|
CVE-2020-7453 | In FreeBSD 12.1-STABLE before r359021, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r359020, and 11.3-RELEASE before 11.3-RELEASE-p7, a missing null termination check in the jail_set configuration option "osrelease" may return more bytes with a subsequent jail_get system call allowing a malicious jail superuser with permission to create nested jails to read kernel memory. | [
"cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*"
] | null | 6 | null | 3.3 |
|
CVE-2022-3568 | The ImageMagick Engine plugin for WordPress is vulnerable to deserialization of untrusted input via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload. | [
"cpe:2.3:a:orangelab:imagemagick_engine:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
|
CVE-2025-30856 | WordPress Custom Field For WP Job Manager plugin <= 1.4 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in theme funda Custom Field For WP Job Manager allows Cross Site Request Forgery. This issue affects Custom Field For WP Job Manager: from n/a through 1.4. | [] | null | 4.3 | null | null |
GHSA-jhpp-jp8r-8v9g | The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file. | [] | null | null | null | null |
|
CVE-2024-52343 | WordPress OS Pricing Tables plugin <= 1.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Offshorent Softwares Pvt. Ltd. | Jinesh.P.V OS Pricing Tables allows Stored XSS.This issue affects OS Pricing Tables: from n/a through 1.2. | [] | null | 6.5 | null | null |
CVE-2008-7249 | Buffer overflow in Squid Analysis Report Generator (Sarg) 2.2.3.1, and probably later, allows user-assisted remote attackers to execute arbitrary code via a long HTTP request method in a crafted access.log file, a different vulnerability than CVE-2008-1167. | [
"cpe:2.3:a:pedro_lineu_orso:sarg:2.2.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-gx5h-7qqm-j27x | An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34199963. References: B-RB#110688. | [] | null | null | 7 | null |
|
CVE-2024-7929 | SourceCodester Simple Forum Website Signup Page registration.php cross site scripting | A vulnerability, which was classified as problematic, was found in SourceCodester Simple Forum Website 1.0. This affects an unknown part of the file /registration.php of the component Signup Page. The manipulation of the argument username leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:simple_forum_website:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:simple_forum_website:1.0:*:*:*:*:*:*:*"
] | 6.9 | 5.3 | 5.3 | 5 |
CVE-2023-3633 | Out of Bounds Memory Corruption Issue in CEVA Engine | An out-of-bounds write vulnerability in Bitdefender Engines on Windows causes the engine to crash. This issue affects Bitdefender Engines version 7.94791 and lower. | [
"cpe:2.3:a:bitdefender:engines:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
RHSA-2020:1567 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash kernel: Null pointer dereference in the sound/usb/line6/pcm.c kernel: Null pointer dereference in the sound/usb/line6/driver.c kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: The flow_dissector feature allows device tracking kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) kernel: a memory leak in the ath9k management function in allows local DoS kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications kernel: some ipv6 protocols not encrypted over ipsec tunnel kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open kernel: net/sched: cbs NULL pointer dereference when offloading is enabled | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.5 | 4.6 | null |
CVE-2006-6987 | Cross-domain vulnerability in FineBrowser Freeware 3.2.2 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280. | [
"cpe:2.3:a:softinform:finebrowser:freeware_3.2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2023-46552 | TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMultiAP. | [
"cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948.web:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*"
] | null | 8 | null | null |
|
CVE-2015-2789 | Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through 7.0.6.1126 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:foxit_reader:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:foxit_reader:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:foxit_reader:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:foxit_reader:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:foxit_reader:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:foxit_reader:7.0.6:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
GHSA-9354-6mjp-r2vv | Kerio Connect 8.0.0 through 9.2.2, and Kerio Connect Client desktop application for Windows and Mac 9.2.0 through 9.2.2, when e-mail preview is enabled, allows remote attackers to conduct clickjacking attacks via a crafted e-mail message. | [] | null | null | 6.5 | null |
|
GHSA-6fgm-c74h-rrr4 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ulkem Company PtteM Kart.This issue affects PtteM Kart: before 2.1. | [] | null | 9.8 | null | null |
|
CVE-2020-1771 | Possible XSS in Customer user address book | Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions. | [
"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
CVE-2021-22247 | Improper authorization in GitLab CE/EE affecting all versions since 13.0 allows guests in private projects to view CI/CD analytics | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2020-5237 | Relative Path Traversal in oneup/uploader-bundle | Multiple relative path traversal vulnerabilities in the oneup/uploader-bundle before 1.9.3 and 2.1.5 allow remote attackers to upload, copy, and modify files on the filesystem (potentially leading to arbitrary code execution) via the (1) filename parameter to BlueimpController.php; the (2) dzchunkindex, (3) dzuuid, or (4) filename parameter to DropzoneController.php; the (5) qqpartindex, (6) qqfilename, or (7) qquuid parameter to FineUploaderController.php; the (8) x-file-id or (9) x-file-name parameter to MooUploadController.php; or the (10) name or (11) chunk parameter to PluploadController.php. This is fixed in versions 1.9.3 and 2.1.5. | [
"cpe:2.3:a:1up:oneupuploaderbundle:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2001-1371 | The default configuration of Oracle Application Server 9iAS 1.0.2.2 enables SOAP and allows anonymous users to deploy applications by default via urn:soap-service-manager and urn:soap-provider-manager. | [
"cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-9ffm-4mfx-v85f | The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-vxmv-hghc-cq63 | plugins/box/pages/pages.admin.php in Monstra CMS 3.0.4 has a stored XSS vulnerability when an attacker has access to the editor role, and enters the payload in the title section of an admin/index.php?id=pages&action=edit_page&name=error404 (aka Edit 404 page) action. | [] | null | null | 4.8 | null |
|
RHSA-2018:3157 | Red Hat Security Advisory: curl and nss-pem security and bug fix update | curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.4 | null |
GHSA-qj54-vpgw-pxrc | Cross-site scripting (XSS) vulnerability in the Coach NG framework in IBM Business Process Manager (BPM) 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.1, and 8.5.5 through 8.5.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [] | null | null | null | null |
|
GHSA-v3vj-pm98-82mp | IBM Sterling Partner Engagement Manager 6.1, 6.2, and 6.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 236208. | [] | null | 9.8 | null | null |
|
GHSA-xcwf-gwwm-6v7m | Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2020:1116 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.6 | null | null |
CVE-2012-6571 | The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, and S7800 switches uses predictable Session ID values, which makes it easier for remote attackers to hijack sessions via a brute-force attack. | [
"cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-5x52-9p7c-82qc | A vulnerability was found in eolinker apinto-dashboard. It has been classified as problematic. Affected is an unknown function of the file /login. The manipulation of the argument callback leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212640. | [] | null | 6.1 | null | null |
|
GHSA-c77q-62vf-hxq5 | The Easy Digital Downloads (EDD) Software Licensing extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. | [] | null | 6.1 | null | null |
|
GHSA-mv6p-j6vw-wcr4 | A vulnerability has been found in SourceCodester Employee Task Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file update-employee.php. The manipulation of the argument admin_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257053 was assigned to this vulnerability. | [] | null | 6.3 | null | null |
|
CVE-2024-46761 | pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv | In the Linux kernel, the following vulnerability has been resolved:
pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
The hotplug driver for powerpc (pci/hotplug/pnv_php.c) causes a kernel
crash when we try to hot-unplug/disable the PCIe switch/bridge from
the PHB.
The crash occurs because although the MSI data structure has been
released during disable/hot-unplug path and it has been assigned
with NULL, still during unregistration the code was again trying to
explicitly disable the MSI which causes the NULL pointer dereference and
kernel crash.
The patch fixes the check during unregistration path to prevent invoking
pci_disable_msi/msix() since its data structure is already freed. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-9936-j8cq-2qpx | A vulnerability was found in SourceCodester Garage Management System and classified as critical. This issue affects some unknown processing of the file removeUser.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205655. | [] | null | 8.8 | null | null |
|
GHSA-frrr-xgqj-649g | A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information. | [] | null | 5.5 | null | null |
|
GHSA-wrgr-v88r-75jx | The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the get_restore_progress() and restore() functions in all versions up to, and including, 0.9.68. This makes it possible for unauthenticated attackers to exploit a SQL injection vulnerability or trigger a DoS. | [] | null | 6.5 | null | null |
|
CVE-2018-19220 | An issue was discovered in LAOBANCMS 2.0. It allows remote attackers to execute arbitrary PHP code via the host parameter to the install/ URI. | [
"cpe:2.3:a:laobancms:laobancms:2.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-frqf-g9gp-x5qm | The application (Network Configurator for DeviceNet Safety 3.41 and prior) searches for resources by means of an untrusted search path that could execute a malicious .dll file not under the application's direct control and outside the intended directories. | [] | null | null | 7.8 | null |
|
GHSA-8w9h-f2hq-wpqm | The lha_read_file_extended_header function in archive_read_support_format_lha.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds heap) via a crafted (1) lzh or (2) lha file. | [] | null | null | 7.5 | null |
|
CVE-2025-23514 | WordPress Loginplus plugin <= 1.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in Sanjaysolutions Loginplus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Loginplus: from n/a through 1.2. | [] | null | 5.3 | null | null |
GHSA-fhxg-444p-h63x | Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010. | [] | null | 6.1 | null | null |
|
GHSA-gjgc-m5jm-q72q | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wiloke WooCommerce Coupon Popup, SmartBar, Slide In | MyShopKit.This issue affects WooCommerce Coupon Popup, SmartBar, Slide In | MyShopKit: from n/a through 1.0.9. | [] | null | 5.3 | null | null |
|
GHSA-4c4v-jcwm-2qpx | A cross-site scripting (XSS) vulnerability in the web conferencing component of Mitel MiCollab AWV before 8.1.2.2 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation in the join meeting interface. A successful exploit could allow an attacker to execute arbitrary scripts. | [] | null | null | null | null |
|
GHSA-c3jj-9wrg-44g9 | The Editorial Calendar WordPress plugin through 3.7.12 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users. | [] | null | 5.4 | null | null |
|
GHSA-rwh2-h7rg-2925 | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive product information via vectors related to an error page. IBM X-Force ID: 92072. | [] | null | null | 5.3 | null |
|
GHSA-v87w-rgf8-76jc | Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries. | [] | null | null | null | null |
|
CVE-2019-14363 | A stack-based buffer overflow in the upnpd binary running on NETGEAR WNDR3400v3 routers with firmware version 1.0.1.18_1.0.63 allows an attacker to remotely execute arbitrary code via a crafted UPnP SSDP packet. | [
"cpe:2.3:o:netgear:wndr3400v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400v3:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2025-0500 | Issue affecting Amazon WorkSpaces (when running Amazon DCV protocol), Amazon AppStream 2.0, and Amazon DCV clients | An issue in the native clients for Amazon WorkSpaces (when running Amazon DCV protocol), Amazon AppStream 2.0, and Amazon DCV Clients may allow an attacker to access remote sessions via man-in-the-middle. | [] | 7.7 | 7.5 | null | null |
CVE-2018-14526 | An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information. | [
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 3.3 |
|
CVE-2024-34222 | Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injection via the searccountry parameter. | [
"cpe:2.3:a:sourcecodester:human_resource_management_system:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-4rp7-pgv4-j9jj | Incorrect access control in Book Store Management System v1 allows attackers to access unauthorized pages and execute administrative functions without authenticating. | [] | null | 9.8 | null | null |
|
GHSA-9p4w-6fpq-fpm6 | A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. | [] | null | 6 | null | null |
|
CVE-2024-37776 | A cross-site scripting (XSS) vulnerability in Sunbird DCIM dcTrack v9.1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in some admin screens. | [] | null | 4.8 | null | null |
|
GHSA-p4g3-f45p-rr3m | The Royal Elementor Addons WordPress plugin before 1.3.56 does not have authorisation and CSRF checks when creating a template, and does not ensure that the post created is a template. This could allow any authenticated users, such as subscriber to create a post (as well as any post type) with an arbitrary title | [] | null | 6.5 | null | null |
|
GHSA-44w3-wrmw-j9hx | IBM InfoSphere Information Server 11.7 could allow an authenciated user under specialized conditions to inject commands into the installation process that would execute on the WebSphere Application Server. IBM X-Force ID: 145970. | [] | null | null | 8.5 | null |
|
GHSA-6548-g7f4-3jwp | A race condition exists in a driver in all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-05-05 potentially leading to a use-after-free condition. | [] | null | null | 7 | null |
|
GHSA-p4w2-ggrw-5m79 | The httpd package in fli4l before 3.10.1 and 4.0 before 2015-01-30 allows remote attackers to execute arbitrary code. | [] | null | null | 8.8 | null |
|
CVE-2008-5285 | Wireshark 1.0.4 and earlier allows remote attackers to cause a denial of service via a long SMTP request, which triggers an infinite loop. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vwhg-jwr4-vxgg | gettext.js has a Cross-site Scripting injection | ImpactPossible vulnerability to XSS injection if .po dictionary definition files is corruptedPatchesUpdate gettext.js to 2.0.3WorkaroundsMake sure you control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms. | [] | null | 7.2 | null | null |
GHSA-8wr7-r8m6-cw65 | Unspecified vulnerability in the Java Deployment Toolkit component in Oracle Java SE and Java for Business JDK and JRE 6 Update 10 through 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [] | null | null | null | null |
|
GHSA-45qm-j4m9-whv9 | eZ Platform CSRF token in login form is disabled by default | his security advisory fixes a potential vulnerability in the eZ Platform log in form. That form has a Cross-Site Request Forgery (CSRF) token, but the CSRF functionality is not enabled by default, meaning the token is inactive. The fix is distributed via Composer as ezsystems/ezplatform v2.5.4, and in v3.0.0 when that will be released.If you'd like to manually enable it in your configuration, this is done by editing your app/config/security.yml and setting the "csrf_token_generator" key to "security.csrf.token_manager", like this:NB: In eZ Platform 3.0 this file has been moved to config/packages/security.yaml | [] | null | null | null | null |
CVE-2010-0329 | SQL injection vulnerability in the powermail extension 1.5.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors related to the "SQL selection field" and "typoscript." | [
"cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-6446 | Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2022-24980 | An issue was discovered in the Kitodo.Presentation (aka dif) extension before 2.3.2, 3.x before 3.2.3, and 3.3.x before 3.3.4 for TYPO3. A missing access check in an eID script allows an unauthenticated user to submit arbitrary URLs to this component. This results in SSRF, allowing attackers to view the content of any file or webpage the webserver has access to. | [
"cpe:2.3:a:kitodo:kitodo.presentation:*:*:*:*:*:typo3:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-vw2j-w6mh-x39g | AppleKeyStore in Apple iOS before 8.3 does not properly restrict a certain passcode-confirmation interface, which makes it easier for attackers to verify correct passcode guesses via a crafted app. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.