id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2022-4107
SMSA Shipping for WooCommerce < 1.0.5 - Subscriber+ Arbitrary File Download
The SMSA Shipping for WooCommerce WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks, as well as does not validate the file to be downloaded, allowing any authenticated users, such as subscriber to download arbitrary file from the server
[ "cpe:2.3:a:cedcommerce:smsa_shipping_for_woocommerce:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2014-7539
The Zhang Zhijun Taiwan Visit 2014-06-25 (aka com.zizizzi) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:zhang_zhijun_taiwan_visit_2014-06-25_project:zhang_zhijun_taiwan_visit_2014-06-25:1.0:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-8gf7-v2cc-jmrp
Kofax Power PDF JPG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20455.
[]
null
null
3.3
null
GHSA-3p3c-hpcw-jjrv
In all Qualcomm products with Android releases from CAF using the Linux kernel, concurrent calls into ioctl RMNET_IOCTL_ADD_MUX_CHANNEL in ipa wan driver may lead to memory corruption due to missing locks.
[]
null
null
7.8
null
CVE-2024-43590
Visual C++ Redistributable Installer Elevation of Privilege Vulnerability
Visual C++ Redistributable Installer Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2020-7799
An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -> Settings -> Email Templates) or themes (Home -> Settings -> Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates.
[ "cpe:2.3:a:fusionauth:fusionauth:*:*:*:*:*:*:*:*" ]
null
7.2
null
9
GHSA-m9r2-v6px-98w2
The E2Pdf WordPress plugin before 1.20.20 does not sanitize and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[]
null
4.8
null
null
CVE-2022-38568
Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formSetFixTools. This vulnerability allows attackers to cause a Denial of Service (DoS) via the hostname parameter.
[ "cpe:2.3:o:tenda:m3_firmware:1.0.0.12\\(4856\\):*:*:*:*:*:*:*", "cpe:2.3:h:tenda:m3:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2019-12572
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client 1.0.2 (build 02363) for Windows could allow an authenticated, local attacker to run arbitrary code with elevated privileges. On startup, the PIA Windows service (pia-service.exe) loads the OpenSSL library from %PROGRAMFILES%\Private Internet Access\libeay32.dll. This library attempts to load the C:\etc\ssl\openssl.cnf configuration file which does not exist. By default on Windows systems, authenticated users can create directories under C:\. A low privileged user can create a C:\etc\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine library resulting in arbitrary code execution as SYSTEM when the service starts.
[ "cpe:2.3:a:londontrustmedia:private_internet_access:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-x682-pjg8-jch2
The Contact page in Monica 2.19.1 allows stored XSS via the Middle Name field.
[]
null
null
null
null
GHSA-qxg4-m824-m377
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). An attacker who performs a Man-in-the-Middle attack between the LOGO! BM and other devices could potentially decrypt and modify network traffic.
[]
null
7.4
null
null
GHSA-cg7v-jcg7-3j87
SmartNode SN200 (aka SN200) 3.21.2-23021 allows unauthenticated OS Command Injection.
[]
null
9.8
null
null
CVE-2022-2501
An improper access control issue in GitLab EE affecting all versions from 12.0 prior to 15.0.5, 15.1 prior to 15.1.4, and 15.2 prior to 15.2.1 allows an attacker to bypass IP allow-listing and download artifacts. This attack only bypasses IP allow-listing, proper permissions are still required.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.2:*:*:*:enterprise:*:*:*" ]
null
5.9
null
null
ICSA-19-260-01
Advantech WebAccess
An exploit executed over the network may cause improper control of generation of code, which may allow remote code execution, data exfiltration, or cause a system crash.CVE-2019-13558 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Multiple command injection vulnerabilities are caused by a lack of proper validation of user-supplied data and may allow arbitrary file deletion and remote code execution.CVE-2019-13552 has been assigned to these vulnerabilities. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution.CVE-2019-13556 has been assigned to these vulnerabilities. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). An improper authorization vulnerability may allow an attacker to disclose sensitive information, cause improper control of generation of code, which may allow remote code execution or cause a system crash.CVE-2019-13550 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
GHSA-8v6r-q522-82mj
A vulnerability, which was classified as problematic, has been found in European Environment Agency eionet.contreg. This issue affects some unknown processing. The manipulation of the argument searchTag/resourceUri leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2022-06-27T0948 is able to address this issue. The name of the patch is a120c2153e263e62c4db34a06ab96a9f1c6bccb6. It is recommended to upgrade the affected component. The identifier VDB-215885 was assigned to this vulnerability.
[]
null
6.1
null
null
GHSA-7ggw-h8pp-r95r
October CMS Session ID not invalidated after logout
ImpactWhen logging out, the session ID was not invalidated. This is not a problem while the user is logged out, but as soon as the user logs back in the old session ID would be valid again; which means that anyone that gained access to the old session cookie would be able to act as the logged in user. This is not a major concern for the majority of cases, since it requires a malicious party gaining access to the session cookie in the first place, but nevertheless has been fixed.PatchesIssue has been patched in Build 472 (v1.0.472) and v1.1.2.WorkaroundsApply https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024 to your installation manually if unable to upgrade to Build 472 or v1.1.2.ReferencesReported by Anisio (Brazilian Information Security Analyst)http://cve.circl.lu/cve/CVE-2021-3311For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])Threat assessment:
[]
null
9.8
null
null
GHSA-5x6v-v8hw-r85j
Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, allows remote attackers to obtain potentially sensitive information without authentication by directly accessing certain HTML pages.
[]
null
null
null
null
CVE-2022-32374
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_subject_routing.php?id=.
[ "cpe:2.3:a:advanced_school_management_system_project:advanced_school_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
CVE-2019-9234
In wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122465453
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2024-23831
Privilege escalation through CSRF attack on 'setup.pl'
LedgerSMB is a free web-based double-entry accounting system. When a LedgerSMB database administrator has an active session in /setup.pl, an attacker can trick the admin into clicking on a link which automatically submits a request to setup.pl without the admin's consent. This request can be used to create a new user account with full application (/login.pl) privileges, leading to privilege escalation. The vulnerability is patched in versions 1.10.30 and 1.11.9.
[ "cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2021-47286
bus: mhi: core: Validate channel ID when processing command completions
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: core: Validate channel ID when processing command completions MHI reads the channel ID from the event ring element sent by the device which can be any value between 0 and 255. In order to prevent any out of bound accesses, add a check against the maximum number of channels supported by the controller and those channels not configured yet so as to skip processing of that event ring element.
[]
null
null
null
null
CVE-2021-26826
A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
[ "cpe:2.3:a:godotengine:godot_engine:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2024-32351
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an authenticated remote command execution (RCE) vulnerability via the "mru" parameter in the "cstecgi.cgi" binary.
[ "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-596r-x9qj-4m68
Cross-site scripting (XSS) vulnerability in jgb.php3 in Justice Guestbook 1.3 allows remote attackers to inject arbitrary web script or HTML via the (1) name, (2) homepage, (3) aim, (4) yim, (5) location, and (6) comment variables.
[]
null
null
null
null
CVE-2002-1363
Portable Network Graphics (PNG) library libpng 1.2.5 and earlier does not correctly calculate offsets, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a buffer overflow attack on the row buffers.
[ "cpe:2.3:a:greg_roelofs:libpng:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:greg_roelofs:libpng:1.2.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-7fcf-g7ph-3mf3
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could bypass the access controls for using a saved database connection profile to submit arbitrary SQL against a saved database connection.
[]
null
null
null
null
CVE-2025-30735
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Page and Field Configuration). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[]
null
8.1
null
null
cisco-sa-spa-web-multi-7kvPmu2F
Cisco Small Business SPA500 Series IP Phones Web UI Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) or HTML injection attacks. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. There are no workarounds that address these vulnerabilities.
[]
null
5.8
null
null
GHSA-35p4-8325-mm2c
Unrestricted Upload of File with Dangerous Type vulnerability in Techeshta Layouts for Elementor.This issue affects Layouts for Elementor: from n/a before 1.8.
[]
null
7.5
null
null
GHSA-hxvr-v6jg-mp93
SQL injection vulnerability in the authenticateUser function in includes/authentication.inc.php in BrewBlogger (BB) 2.1.0.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the loginUsername parameter to includes/logincheck.inc.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2008-1642
Directory traversal vulnerability in index.php in Sava's GuestBook 2.0 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:savas_place:savas_guestbook:2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-26207
Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setDiagnosisCfg, via the ipDoamin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
[ "cpe:2.3:o:totolink:a830r_firmware:5.9c.4729_b20191112:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a830r:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a3100r_firmware:4.1.2cu.5050_b20200504:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3100r:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a950rg_firmware:4.1.2cu.5161_b20200903:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a950rg:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a800r_firmware:4.1.2cu.5137_b20200730:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a800r:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a3000ru_firmware:5.9c.5185_b20201128:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3000ru:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a810r_firmware:4.1.2cu.5182_b20201026:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a810r:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2004-2737
SQL injection vulnerability in problist.asp in NetSupport DNA HelpDesk 1.01 allows remote attackers to execute arbitrary SQL commands via the where parameter.
[ "cpe:2.3:a:netsupport:dna_helpdesk:1.01:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-55198
User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses.
[]
null
5.3
null
null
CVE-2020-26420
Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*" ]
null
3.1
null
null
GHSA-7v45-rjcp-mf24
Piwigo v2.8.2 has XSS via the `tab`, `to`, `section`, `mode`, `installstatus`, and `display` parameters of the `admin.php` file.
[]
null
null
6.1
null
GHSA-7f3c-8333-69p4
The WPQA Builder WordPress plugin before 5.4, used as a companion for the Discy and Himer , does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacks
[]
null
6.1
null
null
CVE-2001-1045
Directory traversal vulnerability in basilix.php3 in Basilix Webmail 1.0.3beta and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the request_id[DUMMY] parameter.
[ "cpe:2.3:a:basilix:basilix_webmail:1.02_beta:*:*:*:*:*:*:*", "cpe:2.3:a:basilix:basilix_webmail:1.03_beta:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-48296
The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2006-1718
Magus Perde Clever Copy 3.0 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to view the database username and password via a direct request for connect.inc.
[ "cpe:2.3:a:clever_copy:clever_copy:*:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:2.0a:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:23.0:*:*:*:*:*:*:*" ]
null
null
null
5