id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-gh4g-65f6-84g5 | pimcore is vulnerable to cross-site scripting | Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19. | [] | null | 4.8 | null | null |
GHSA-g27x-xj6q-h3q3 | SQL injection vulnerability in newscomments.php in Alex News-Engine 1.5.0 and earlier allows remote attackers to execute arbitrary SQL commands via the newsid parameter. | [] | null | null | null | null |
|
GHSA-9p3h-4f9c-6m6g | Cross-site scripting (XSS) vulnerability in Scoop 1.1 RC1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) type and (2) count parameters, and (3) the query string in a story. | [] | null | null | null | null |
|
GHSA-gp45-5pcq-54vx | Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.4.0, 12.1.2.0.0, and 12.1.3.0.0 allows remote attackers to affect integrity via vectors related to ADF Faces. | [] | null | null | null | null |
|
GHSA-m2hf-jhv9-29j2 | Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors. | [] | null | 2.4 | null | null |
|
GHSA-wfr4-c7jj-8xgp | Lead Management System v1.0 is vulnerable to SQL Injection via the user_id parameter in changePassword.php. | [] | null | 9.8 | null | null |
|
CVE-2019-8218 | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2015-6466 | Cross-site scripting (XSS) vulnerability in the Diagnosis Ping feature in the administrative web interface on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote attackers to inject arbitrary web script or HTML via an unspecified field. | [
"cpe:2.3:o:moxa:eds-405a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:eds-408a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:eds-405a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:eds-408a:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-27671 | Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Device Impersonation OVE-20230524-0015. | [] | null | 9.8 | null | null |
|
CVE-2013-0371 | Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2012-5510 | Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors. | [
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.7 |
|
GHSA-x7gr-mmjj-hx3h | Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.1.15. | [] | null | 9.1 | null | null |
|
CVE-2001-0634 | Sun Chili!Soft ASP has weak permissions on various configuration files, which allows a local attacker to gain additional privileges and create a denial of service. | [
"cpe:2.3:a:sun:chilisoft:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-45vf-ccx3-9p8v | Cross-site scripting (XSS) vulnerability in DUware DUforum 3.0 through 3.1 allows remote attackers to inject arbitrary web script or HTML via via the message text. | [] | null | null | null | null |
|
GHSA-r533-5559-j96c | A relative path traversal vulnerability [CWE-23] in Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.9 and before 6.4.12, FortiProxy version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.7, FortiSwitchManager version 7.2.0 through 7.2.1 and before 7.0.1 allows an privileged attacker to delete arbitrary directories from the filesystem through crafted HTTP requests. | [] | null | 6.5 | null | null |
|
CVE-2019-2013 | In rw_t3t_act_handle_sro_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120497583 | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2025-0791 | ESAFENET CDG sdDoneDetail.jsp sql injection | A vulnerability, which was classified as critical, has been found in ESAFENET CDG V5. This issue affects some unknown processing of the file /sdDoneDetail.jsp. The manipulation of the argument flowId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-qrm2-9qjh-5xh5 | Cross-Site Request Forgery (CSRF) vulnerability in LWS LWS Optimize.This issue affects LWS Optimize: from n/a through 1.9.1. | [] | null | 4.3 | null | null |
|
CVE-2003-0021 | The "screen dump" feature in Eterm 0.9.1 and earlier allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence. | [
"cpe:2.3:a:michael_jennings:eterm:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_jennings:eterm:0.9.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-2hr2-cc65-w687 | The web interface in RSA NetWitness 11.7.2.0 allows Cross-Site Scripting (XSS) via the Where textbox on the Reports screen during new rule creation. | [] | null | 4.6 | null | null |
|
GHSA-5gmh-85x8-5cx7 | Magento remote code execution (RCE), Cross-Site Scripting (XSS) and other vulnerabilities | Magento Commerce and Open Source 2.2.5 and 2.1.14 contain multiple security enhancements that help close authenticated Admin user remote code execution (RCE), Cross-Site Scripting (XSS) and other vulnerabilities. | [] | null | null | null | null |
GHSA-fq56-c7rj-j3j9 | Missing permission checks in Jenkins Chef Sinatra Plugin allow XXE | Jenkins Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML.As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [] | null | 8.8 | null | null |
CVE-2019-10712 | The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 750-882, 750-884, 750-885, 750-889) and Series 750-87x (750-830, 750-849, 750-871, 750-872, 750-873) devices has undocumented service access. | [
"cpe:2.3:o:wago:750-830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-849_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-849:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-871_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-871:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-872_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-872:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-873_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-873:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-352_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-884_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-884:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-5prp-v8rr-x7c9 | The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error. | [] | null | null | null | null |
|
GHSA-x43q-hqf9-9w3x | Siklu EtherHaul radios before 3.7.1 and 6.x before 6.9.0 have a built-in, hidden root account, with an unchangeable password that is the same across all devices. This account is accessible via both SSH and the device's web interface and grants access to the underlying embedded Linux OS on the device, allowing full control over it. | [] | null | null | 9.8 | null |
|
CVE-2018-1318 | Adding method ACLs in remap.config can cause a segfault when the user makes a carefully crafted request. This affects versions Apache Traffic Server (ATS) 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions. | [
"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-4p4f-q3pj-23qr | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jethin Gallery Slideshow allows Stored XSS.This issue affects Gallery Slideshow: from n/a through 1.4.1. | [] | null | 6.5 | null | null |
|
GHSA-h9gp-m2r8-j44q | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [] | null | null | 8.8 | null |
|
GHSA-8qcj-h873-c6wq | Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms allows Cross Site Request Forgery. This issue affects WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms: from n/a through 1.1.3. | [] | null | 4.3 | null | null |
|
CVE-2024-10890 | WPAdverts – Classifieds Plugin <= 2.1.7 - Reflected Cross-Site Scripting | The WPAdverts – Classifieds Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
CVE-2016-0134 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, and Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-g4q2-gc49-8q5w | Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter. | [] | null | null | 6.3 | null |
|
CVE-2024-12603 | A logic vulnerability in the the mobile application (com.transsion.applock) can lead to bypassing the application password. | [] | null | 9.8 | null | null |
|
CVE-2025-23427 | WordPress Redux Converter plugin <= 1.1.3.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dovy Paukstys Redux Converter allows Reflected XSS. This issue affects Redux Converter: from n/a through 1.1.3.1. | [] | null | 7.1 | null | null |
GHSA-gm8g-xhh8-rmwr | Prototype Pollution in doc-path | This affects the package doc-path before 2.1.2. | [] | null | 9.8 | null | null |
GHSA-54r7-g2hg-wv9h | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Jt981.dll library in affected applications lacks proper validation of user-supplied data when parsing JT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13442) | [] | null | null | null | null |
|
GHSA-37xw-5m35-w77m | Missing Authorization vulnerability in JoomSky JS Job Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Job Manager: from n/a through 2.0.2. | [] | null | 5.3 | null | null |
|
GHSA-2gmf-964r-8w6g | IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 210323. | [] | null | 5.4 | null | null |
|
GHSA-m8vr-gvfq-cv5f | An issue in INATRONIC com.inatronic.drivedeck.home 2.6.23 allows a remote attacker to obtain sensitve information via the firmware update process. | [] | null | 7.5 | null | null |
|
GHSA-j83f-fmmw-wc95 | IBM Business Automation Workflow 18.0.0.0 and 18.0.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 154890. | [] | null | null | 8.8 | null |
|
CVE-2018-12067 | The sell function of a smart contract implementation for Substratum (SUB), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue. | [
"cpe:2.3:a:substratum:substratum:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-cr7w-6672-vg3h | On the RICOH MP C6003 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi. | [] | null | null | 6.1 | null |
|
GHSA-cw7c-35x2-c833 | Multiple PHP remote file inclusion vulnerabilities in EternalMart Mailing List Manager (EMLM) 1.32 allow remote attackers to execute arbitrary PHP code via a URL in (1) the emml_admin_path parameter to admin/auth.php or (2) the emml_path parameter to emml_email_func.php. | [] | null | null | null | null |
|
GHSA-c9xm-h2h9-g239 | A cross-site scripting (XSS) vulnerability in Online Graduate Tracer System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter. | [] | null | 6.1 | null | null |
|
GHSA-pqhc-94g8-hw82 | An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities. | [] | null | null | null | null |
|
CVE-2021-22878 | Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
GHSA-f2xw-g7hm-66qr | In the Linux kernel, the following vulnerability has been resolved:staging: gdm724x: fix use after free in gdm_lte_rx()The netif_rx_ni() function frees the skb so we can't dereference it to
save the skb->len. | [] | null | 7.8 | null | null |
|
GHSA-528q-4pgm-wvg2 | Reflected XSS in go-httpbin due to unrestricted client control over Content-Type | DescriptionThe go-httpbin framework is vulnerable to XSS as the user can control the `Response Content-Type` from GET parameter. This allows attacker to execute cross site scripts in victims browser.Affected URLs:`/response-headers?Content-Type=text/html&xss=%3Cimg/src/onerror=alert(%27xss%27)%3E``/base64/PGltZy9zcmMvb25lcnJvcj1hbGVydCgneHNzJyk+?content-type=text/html``/base64/decode/PGltZy9zcmMvb25lcnJvcj1hbGVydCgneHNzJyk+?content-type=text/html`Steps to reproduce:Visit one of the above mentioned URLs.XSS window will popupSuggested fixAllow Only Safe Content-Type Values Or give users option to define whitelisted Content-Type headersCriticalityThe following can be major impacts of the issue:Access to victim's sensitive Personal Identifiable Information.Access to CSRF tokenCookie injectionPhishingAnd any other thing Javascript can perform | [] | 1.3 | null | null | null |
CVE-2022-35714 | IBM Maximo Asset Management 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 231116. | [
"cpe:2.3:a:ibm:maximo_asset_management:7.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6.1.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-7m6j-2pjp-5vm3 | The replay feature in the client in Wargaming World of Warships 0.11.4 allows remote attackers to execute code when a user launches a replay from an untrusted source. | [] | null | 8.8 | null | null |
|
CVE-2023-2354 | The CHP Ads Block Detector plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings reachable though an AJAX action in versions up to, and including, 3.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:sureshchand:chp_ads_block_detector:*:*:*:*:*:wordpress:*:*"
] | null | 4.9 | null | null |
|
GHSA-ff53-798g-f62h | The broadcast messages received by SAP Fiori Client are not protected by permissions. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version. | [] | null | null | 7.8 | null |
|
GHSA-7f3j-54j2-wrv7 | Missing Authorization vulnerability in Stanislav Kuznetsov QR code MeCard/vCard generator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects QR code MeCard/vCard generator: from n/a through 1.6.0. | [] | null | 4.3 | null | null |
|
cisco-sa-sb-bus-acl-bypass-5zn9hNJk | Cisco Small Business Series Switches Stacked Reload ACL Bypass Vulnerability | A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device.
This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state.
Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 5.8 | null | null |
GHSA-2673-vwc6-q3m5 | The Missing Device feature in Lookout allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer." | [] | null | null | null | null |
|
CVE-2018-17835 | An issue was discovered in GetSimple CMS 3.3.15. An administrator can insert stored XSS via the admin/settings.php Custom Permalink Structure parameter, which injects the XSS payload into any page created at the admin/pages.php URI. | [
"cpe:2.3:a:get-simple:getsimple_cms:3.3.15:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2020-9915 | An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
ICSA-18-128-02 | Siemens Siveillance VMS (Update A) | The Recording Server, Management Server, and Management Client on ports 6473/TCP local connection only, 7474/TCP, 8966/TCP local connection only, and port 9993/TCP use an exploitable .NET Framework Remoting deserialization level. The security vulnerability could be exploited by an attacker with access to the vulnerable ports and could allow elevation of privileges or causing a Denial-of-Service, compromising confidentiality, integrity and availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue. | [] | null | null | 8.1 | null |
CVE-2020-18184 | In PluxXml V5.7,the theme edit function /PluXml/core/admin/parametres_edittpl.php allows remote attackers to execute arbitrary PHP code by placing this code into a template. | [
"cpe:2.3:a:pluxxml:pluxxml:5.7:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
GHSA-gfgp-pwhh-84rx | An issue was discovered in yiqicms through 2016-11-20. There is stored XSS in comment.php because a length limit can be bypassed. | [] | null | null | 6.1 | null |
|
CVE-2019-1010290 | Babel: Multilingual site Babel All is affected by: Open Redirection. The impact is: Redirection to any URL, which is supplied to redirect.php in a "newurl" parameter. The component is: redirect.php. The attack vector is: The victim must open a link created by an attacker. Attacker may use any legitimate site using Babel to redirect user to a URL of his/her choosing. | [
"cpe:2.3:a:cmsmadesimple:bable\\:multilingual_site:*:*:*:*:*:cms_made_simple:*:*"
] | null | null | 6.1 | 5.8 |
|
ICSA-17-283-01 | LAVA Computer MFG Inc. Ether-Serial Link | An improper authentication vulnerability has been identified, which, if exploited, would allow an attacker with the same IP address to bypass authentication by accessing a specific uniform resource locator.CVE-2017-14003 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 8.1 | null |
GHSA-mm5h-c8p7-5v83 | A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Simple Chatbot Application 1.0 ( and previous versions via the bot_avatar parameter in SystemSettings.php. | [] | null | null | null | null |
|
CVE-2022-43468 | External initialization of trusted variables or data stores vulnerability exists in WordPress Popular Posts 6.0.5 and earlier, therefore the vulnerable product accepts untrusted external inputs to update certain internal variables. As a result, the number of views for an article may be manipulated through a crafted input. | [
"cpe:2.3:a:wordpress_popular_posts_project:wordpress_popular_posts:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null |
|
CVE-2020-12005 | FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. A vulnerability exists in the communication function that enables users to upload EDS files by FactoryTalk Linx. This may allow an attacker to upload a file with bad compression, consuming all the available CPU resources, leading to a denial-of-service condition. | [
"cpe:2.3:a:rockwellautomation:factorytalk_linx:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:factorytalk_linx:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:factorytalk_linx:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:rslinx_classic:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-84x9-g98v-6qpc | D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the wizardstep54_pskpwd parameter at /goform/form2WizardStep54. | [] | null | 9.8 | null | null |
|
GHSA-f2x4-547g-rp95 | OpenFlow plugin for OpenDaylight LLDP Relay | OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to the reuse of LLDP packets, aka "LLDP Relay." | [] | null | null | 7.5 | null |
CVE-2023-26609 | ABUS TVIP 20000-21150 devices allows remote attackers to execute arbitrary code via shell metacharacters in the /cgi-bin/mft/wireless_mft ap field. | [
"cpe:2.3:o:abus:tvip_20000-21150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_20000-21150:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2009-0728 | SQL injection vulnerability in the My_eGallery module for MAXdev MDPro (MD-Pro) and Postnuke allows remote attackers to execute arbitrary SQL commands via the pid parameter in a showpic action to index.php. | [
"cpe:2.3:a:maxdev:my_egallery:-:*:*:*:*:*:*:*",
"cpe:2.3:a:maxdev:md-pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:postnuke:postnuke:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-j4wg-r9jw-hw3j | index.php in Desi Short URL Script 1.0 allows remote attackers to bypass authentication by setting the logged cookie to 1 and the uid cookie to an integer value, as demonstrated by a value of 13. | [] | null | null | null | null |
|
CVE-2023-6632 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via DOM in all versions up to and including 3.9.1.1 (versions up to 2.9.1.1 in Happy Addons for Elementor Pro) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:pro:wordpress:*:*"
] | null | 6.1 | null | null |
|
CVE-2021-41679 | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter. | [
"cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 |
|
CVE-2015-9495 | The syndication-links plugin before 1.0.3 for WordPress has XSS via the genericons/example.html anchor identifier. | [
"cpe:2.3:a:syndication_links_project:syndication_links:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2024-1687 | The Thank You Page Customizer for WooCommerce – Increase Your Sales plugin for WordPress is vulnerable to unauthorized execution of shortcodes due to a missing capability check on the get_text_editor_content() function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to execute arbitrary shortcodes. | [] | null | 5.4 | null | null |
|
CVE-2008-4407 | XRunSabre in sabre (aka xsabre) 0.2.4b relies on the ability to create /tmp/sabre.log, which allows local users to cause a denial of service (application unavailability) by creating a /tmp/sabre.log file that cannot be overwritten. | [
"cpe:2.3:a:debian:xsabre:0.2.4b:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
RHSA-2025:1742 | Red Hat Security Advisory: postgresql security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.1 | null | null |
GHSA-3f9q-pqwh-9q72 | Code Ocean FTP server 1.0 allows remote attackers to cause a denial of service via a large number of connections. | [] | null | null | null | null |
|
CVE-2004-1408 | The addImage method for admin.class.php in Image Gallery Web Application 0.9.10 does not properly check filenames, which allows remote attackers to upload and execute arbitrary files. | [
"cpe:2.3:a:singapore:image_gallery_web_application:0.9.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-45q5-wmfw-ghqh | C.P.Sub before 5.3 allows CSRF via a manage.php?p=article_del&id= URI. | [] | null | null | 6.5 | null |
|
CVE-2023-48509 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-3x73-p8v6-p37w | A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. | [] | null | null | 9.8 | null |
|
GHSA-9w72-8p6g-p73f | An issue was discovered in VirtoSoftware Virto Bulk File Download 5.5.44 for SharePoint 2019. It discloses full pathnames via Virto.SharePoint.FileDownloader/Api/Download.ashx?action=archive. | [] | null | 5.3 | null | null |
|
CVE-2023-27091 | An unauthorized access issue found in XiaoBingby TeaCMS 2.3.3 allows attackers to escalate privileges via the id and keywords parameter(s). | [
"cpe:2.3:a:teacms_project:teacms:2.3.3:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-2f63-9qqv-j7rv | ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::EntryPointInfo::HasInlinees(). | [] | null | 5.5 | null | null |
|
GHSA-7h6j-cxxj-c34v | An integer overflow on 32-bit systems in WebAssembly in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | [] | null | null | 8.8 | null |
|
GHSA-7jqh-7h8f-7555 | Gleez CMS 1.2.0 has CSRF, as demonstrated by a /page/add request. | [] | null | null | 8.8 | null |
|
GHSA-r56m-jmm8-vfjf | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. | [] | null | null | 9.8 | null |
|
GHSA-hp63-x8c8-jq88 | HongCMS v3.0 contains an arbitrary file read and write vulnerability in the component /admin/index.php/template/edit. | [] | null | null | null | null |
|
CVE-2024-48544 | Incorrect access control in the firmware update and download processes of Sylvania Smart Home v3.0.3 allows attackers to access sensitive information by analyzing the code and data within the APK file. | [
"cpe:2.3:o:ledvance:sylvania_smart_home_firmware:3.0.3:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
GHSA-62g5-mhwv-6rw4 | The Elementor Website Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an SVGZ file uploaded via the Form widget in all versions up to, and including, 3.20.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability is only exploitable on web servers running NGINX. It is not exploitable on web servers running Apache HTTP Server. | [] | null | 6.4 | null | null |
|
GHSA-3f67-9787-pwrh | Altair HyperView Player versions 2021.1.0.27 and prior perform operations on a memory buffer but can read from or write to a memory location outside of the intended boundary of the buffer. This hits initially as a read access violation, leading to a memory corruption situation. | [] | null | 7.8 | null | null |
|
GHSA-3p8r-p4q5-mc44 | Violation Comments to GitLab Plugin has Insufficiently Protected Credentials | Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jenkins controller file system.Violation Comments to GitLab Plugin now stores these credentials encrypted. Existing jobs need to have their configuration saved for existing plain text credentials to be overwritten. | [] | null | null | 4.3 | null |
GHSA-f6f8-9mx6-9mx2 | Django vulnerable to Denial of Service | An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. `get_supported_language_variant()` was subject to a potential denial-of-service attack when used with very long strings containing specific characters. | [] | 8.7 | 7.5 | null | null |
CVE-2024-30619 | Chamilo LMS Version 1.11.26 is vulnerable to Incorrect Access Control. A non-authenticated attacker can request the number of messages and the number of online users via "/main/inc/ajax/message.ajax.php?a=get_count_message" AND "/main/inc/ajax/online.ajax.php?a=get_users_online." | [
"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2025-27013 | WordPress MediCenter theme < 14.7 - Sensitive Data Exposure vulnerability | Missing Authorization vulnerability in EPC MediCenter - Health Medical Clinic WordPress Theme allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MediCenter - Health Medical Clinic WordPress Theme: from n/a through n/a. | [] | null | 5.3 | null | null |
GHSA-8r8w-7pvp-9gqf | In the Linux kernel, the following vulnerability has been resolved:x86/ioapic: Handle allocation failures gracefullyBreno observed panics when using failslab under certain conditions during
runtime:can not alloc irq_pin_list (-1,0,20)
Kernel panic - not syncing: IO-APIC: failed to add irq-pin. Can not proceedpanic+0x4e9/0x590
mp_irqdomain_alloc+0x9ab/0xa80
irq_domain_alloc_irqs_locked+0x25d/0x8d0
__irq_domain_alloc_irqs+0x80/0x110
mp_map_pin_to_irq+0x645/0x890
acpi_register_gsi_ioapic+0xe6/0x150
hpet_open+0x313/0x480That's a pointless panic which is a leftover of the historic IO/APIC code
which panic'ed during early boot when the interrupt allocation failed.The only place which might justify panic is the PIT/HPET timer_check() code
which tries to figure out whether the timer interrupt is delivered through
the IO/APIC. But that code does not require to handle interrupt allocation
failures. If the interrupt cannot be allocated then timer delivery fails
and it either panics due to that or falls back to legacy mode.Cure this by removing the panic wrapper around __add_pin_to_irq_node() and
making mp_irqdomain_alloc() aware of the failure condition and handle it as
any other failure in this function gracefully. | [] | null | 5.5 | null | null |
|
GHSA-jp62-92rv-w24j | Kofax Power PDF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22040. | [] | null | null | 7.8 | null |
|
CVE-2019-8839 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. An attacker in a privileged position may be able to perform a denial of service attack. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-4763-4594-fp9p | Integer overflow in the envwrite function in the Alcatel-Lucent Bell Labs Plan 9 kernel allows local users to overwrite certain memory addresses with kernel memory via a large n argument, as demonstrated by (1) modifying the iseve function to gain privileges and (2) making the devpermcheck function grant unrestricted device permissions. | [] | null | null | null | null |
|
CVE-2024-4061 | Survey Maker < 4.2.9 - Admin+ Stored XSS via Plugin Settings | The Survey Maker WordPress plugin before 4.2.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.