id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-pgfj-r964-76qx
Cross-site scripting (XSS) vulnerability in Brother MFC-J4410DW printer with firmware before L allows remote attackers to inject arbitrary web script or HTML via the url parameter to general/status.html and possibly other pages.
[]
null
null
null
null
CVE-2015-9021
In all Android releases from CAF using the Linux kernel, access control to SMEM memory was not enabled.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2024-0892
Schema App Structured Data <= 2.2.0 - Cross-Site Request Forgery
The Schema App Structured Data plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.0. This is due to missing or incorrect nonce validation on the MarkUpdate function. This makes it possible for unauthenticated attackers to update and delete post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2023-43123
Apache Storm: Local Information Disclosure Vulnerability in Storm-core on Unix-Like systems due temporary files
On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method File.createTempFile on unix-like systems creates a file with predefined name (so easily identifiable) and by default will create this file with the permissions -rw-r--r--. Thus, if sensitive information is written to this file, other local users can read this information. File.createTempFile(String, String) will create a temporary file in the system temporary directory if the 'java.io.tmpdir' system property is not explicitly set. This affects the class  https://github.com/apache/storm/blob/master/storm-core/src/jvm/org/apache/storm/utils/TopologySpoutLag.java#L99  and was introduced by  https://issues.apache.org/jira/browse/STORM-3123 In practice, this has a very limited impact as this class is used only if ui.disable.spout.lag.monitoring is set to false, but its value is true by default. Moreover, the temporary file gets deleted soon after its creation. The solution is to use  Files.createTempFile https://docs.oracle.com/en/java/javase/11/docs/api/java.base/java/nio/file/Files.html#createTempFile(java.lang.String,java.lang.String,java.nio.file.attribute.FileAttribute...)  instead. We recommend that all users upgrade to the latest version of Apache Storm.
[ "cpe:2.3:a:apache:storm:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2016-9574
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
[ "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*" ]
null
null
5.9
null
CVE-2024-33899
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
[ "cpe:2.3:a:rarlab:winrar:6.24:*:*:*:*:*:*:*", "cpe:2.3:a:rarlab:unrar:6.24:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2006-3879
Integer overflow in the loadChunk function in loaders/load_gt2.c in libmikmod in Mikmod Sound System 3.2.2 allows remote attackers to cause a denial of service via a GRAOUMF TRACKER (GT2) module file with a large (0xffffffff) comment length value in an XCOM chunk.
[ "cpe:2.3:a:miod_vallat:mikmod:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:miod_vallat:mikmod:3.2.2:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2010:0556
Red Hat Security Advisory: firefox security update
Mozilla arbitrary free flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2006:0276
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-8mg3-xpwr-h867
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Unitrends Windows agent was vulnerable to DLL injection and binary planting due to insecure default permissions. This allowed privilege escalation from an unprivileged user to SYSTEM.
[]
null
7.8
null
null
CVE-2025-22079
ocfs2: validate l_tree_depth to avoid out-of-bounds access
In the Linux kernel, the following vulnerability has been resolved: ocfs2: validate l_tree_depth to avoid out-of-bounds access The l_tree_depth field is 16-bit (__le16), but the actual maximum depth is limited to OCFS2_MAX_PATH_DEPTH. Add a check to prevent out-of-bounds access if l_tree_depth has an invalid value, which may occur when reading from a corrupted mounted disk [1].
[]
null
null
null
null
CVE-2020-8785
SuiteCRM 7.10.x versions prior to 7.10.23 and 7.11.x versions prior to 7.11.11 allow SQL Injection (issue 3 of 4).
[ "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
RHSA-2015:2552
Red Hat Security Advisory: kernel security and bug fix update
virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
cisco-sa-fxos-cmdinj-pqZvmXCr
Cisco FXOS Software Command Injection Vulnerability
Update from October 23, 2020: Cisco has become aware of a new Cisco Adaptive Security Appliance vulnerability that could affect the fixed releases recommended for code trains 9.13 and 9.14 in the Fixed Software ["#fs"] section of this advisory. See the Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy"] for additional information. A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
null
6.7
null
CVE-2006-5719
SQL injection vulnerability in libs/sessions.lib.php in BytesFall Explorer (bfExplorer) 0.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified parameters, a different issue than CVE-2006-5606.
[ "cpe:2.3:a:bytesfall_explorer:bytesfall_explorer:0.0.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
cisco-sa-snort-ethernet-dos-HGXgJH8n
Multiple Cisco Products Snort Ethernet Frame Decoder Denial of Service Vulnerability
Multiple Cisco products are affected by a vulnerability in the Ethernet Frame Decoder of the Snort detection engine that could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of error conditions when processing Ethernet frames. An attacker could exploit this vulnerability by sending malicious Ethernet frames through an affected device. A successful exploit could allow the attacker to exhaust disk space on the affected device, which could result in administrators being unable to log in to the device or the device being unable to boot up correctly. Note: Manual intervention is required to recover from this situation. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
null
7.4
null
GHSA-qp8q-gwf5-hqh2
Drupal Cross-Site Scripting vulnerability
A Cross-Site Scripting vulnerability exists in Drupal 6.20 with Data 6.x-1.0-alpha14 due to insufficient sanitization of table descriptions, field names, or labels before display.
[]
null
6.1
null
null
GHSA-6cf8-66gc-38x4
Uncontrolled search path element in some BIOS and System Firmware Update Package for Intel(R) Server M50FCP family before version R01.02.0002 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
5.4
6.7
null
null
GHSA-3cgm-fpj7-hf5p
Memory corruption can occur during context user dumps due to inadequate checks on buffer length.
[]
null
6.7
null
null
CVE-2018-1352
A format string vulnerability in Fortinet FortiOS 5.6.0 allows attacker to execute unauthorized code or commands via the SSH username variable.
[ "cpe:2.3:o:fortinet:fortios:5.6.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-p3c9-7hqh-56mx
A vulnerability, which was classified as critical, has been found in abhilash1985 PredictApp. This issue affects some unknown processing of the file config/initializers/new_framework_defaults_7_0.rb of the component Cookie Handler. The manipulation leads to deserialization. The attack may be initiated remotely. The name of the patch is b067372f3ee26fe1b657121f0f41883ff4461a06. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218387.
[]
null
9.8
null
null
GHSA-68rc-w788-2jr7
Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
[]
null
null
7.5
null
CVE-2019-15518
Swoole before 4.2.13 allows directory traversal in swPort_http_static_handler.
[ "cpe:2.3:a:swoole:swoole:*:*:*:*:*:*:*:*" ]
null
null
5.3
5
GHSA-jxmv-8fwr-5mqh
Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0212 and CVE-2016-0213.
[]
null
null
9.8
null
GHSA-2384-wfr6-9j3j
A CWE-190: Integer Overflow or Wraparound vulnerability exists that could cause heap-based buffer overflow, leading to denial of service and potentially remote code execution when an attacker sends multiple specially crafted messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22073)
[]
null
9.8
null
null
CVE-2020-10606
In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.
[ "cpe:2.3:a:osisoft:pi_api:*:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_api:*:*:*:*:*:windows_integrated_security:*:*", "cpe:2.3:a:osisoft:pi_buffer_subsystem:*:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:ping:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:ethernet\\/ip:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:bacnet:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:dc_systems_rtscada:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:siemens_simatic_pcs_7:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:iec_60870-5-104:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:hart-ip:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:opc-ua:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:ufl:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:cygnet:*:*", "cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:wonderware_historian:*:*", "cpe:2.3:a:osisoft:pi_connector_relay:*:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_data_archive:*:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_data_collection_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_integrator:*:*:*:*:*:business_analytics:*:*", "cpe:2.3:a:osisoft:pi_interface_configuration_utility:*:*:*:*:*:*:*:*", "cpe:2.3:a:osisoft:pi_to_ocs:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-j4vc-q2qg-4hj8
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
[]
null
4.1
null
null
GHSA-3pgw-pp6m-pgh6
In multiple functions of AdapterService.java, there is a possible way to manipulate Bluetooth state due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240301753
[]
null
7.8
null
null
CVE-2022-48790
nvme: fix a possible use-after-free in controller reset during load
In the Linux kernel, the following vulnerability has been resolved: nvme: fix a possible use-after-free in controller reset during load Unlike .queue_rq, in .submit_async_event drivers may not check the ctrl readiness for AER submission. This may lead to a use-after-free condition that was observed with nvme-tcp. The race condition may happen in the following scenario: 1. driver executes its reset_ctrl_work 2. -> nvme_stop_ctrl - flushes ctrl async_event_work 3. ctrl sends AEN which is received by the host, which in turn schedules AEN handling 4. teardown admin queue (which releases the queue socket) 5. AEN processed, submits another AER, calling the driver to submit 6. driver attempts to send the cmd ==> use-after-free In order to fix that, add ctrl state check to validate the ctrl is actually able to accept the AER submission. This addresses the above race in controller resets because the driver during teardown should: 1. change ctrl state to RESETTING 2. flush async_event_work (as well as other async work elements) So after 1,2, any other AER command will find the ctrl state to be RESETTING and bail out without submitting the AER.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7
null
null
GHSA-r6p3-g585-326c
The avb-bank-mobile-banking/id592565443 app 3.0.0 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
5.9
null
GHSA-26x7-rj23-279v
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
GHSA-6cr2-3h5h-37hc
Clinic's Patient Management System v1.0 is vulnerable to SQL injection via /pms/update_user.php?id=.
[]
null
9.8
null
null
GHSA-wrqc-q8p5-76m5
Incorrect Authorization in Jenkins Gerrit Trigger Plugin
An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to retrieve some configuration information about Gerrit in Jenkins.
[]
null
null
4.3
null
GHSA-859m-2pfx-fwhf
Code injection in oscore
oscore v2.2.6 and below was discovered to contain a code injection vulnerability in the component com.opensymphony.util.EJBUtils.createStateless. This vulnerability is exploited via passing an unchecked argument.
[]
null
9.8
null
null
GHSA-3c7p-vv5r-cmr5
Incorrect Authorization in Apache Solr
Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions. This issue is patched in 8.6.3.
[]
null
9.8
null
null
CVE-2017-12170
Downstream version 1.0.46-1 of pure-ftpd as shipped in Fedora was vulnerable to packaging error due to which the original configuration was ignored after update and service started running with default configuration. This has security implications because of overriding security-related configuration. This issue doesn't affect upstream version of pure-ftpd.
[ "cpe:2.3:a:pureftpd:pure-ftpd:1.0.46-1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2023-42765
Westermo Lynx Cross-site Scripting
An attacker with access to the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "username" parameter in the SNMP configuration.
[ "cpe:2.3:o:westermo:l206-f2g_firmware:4.24:*:*:*:*:*:*:*", "cpe:2.3:h:westermo:l206-f2g:-:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2012-3284
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1512.
[ "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2024-9123
Integer overflow in Skia in Google Chrome prior to 129.0.6668.70 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
GHSA-4747-78h4-m342
A vulnerability has been found in SourceCodester Online Mobile Management Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255586 is the identifier assigned to this vulnerability.
[]
null
6.3
null
null
CVE-2022-38112
Sensitive Information Disclosure Vulnerability
In DPA 2022.4 and older releases, generated heap memory dumps contain sensitive information in cleartext.
[ "cpe:2.3:a:solarwinds:database_performance_analyzer:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-c76x-65mw-2r7q
A vulnerability was found in weibocom rill-flow 0.1.18. It has been classified as critical. Affected is an unknown function of the component Management Console. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
GHSA-vfqw-535x-mpvj
Insufficient input validation in ASP may allow an attacker with a compromised SMM to induce out-of-bounds memory reads within the ASP, potentially leading to a denial of service.
[]
null
7.5
null
null
ICSA-23-103-15
Mitsubishi Electric GOC35 Series
A vulnerability exists in the Ethernet communication Extension unit (GC-ENET-COM) of GOC35 series due to a signal handler race condition. If a malicious attacker sends a large number of specially crafted packets, communication errors could occur and could result in a denial-of-service condition when GC-ENET-COM is configured as a Modbus TCP Server. CVE-2023-1285 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
GHSA-vf28-3jgq-qcq2
The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 allows remote authenticated users to obtain sensitive information about external guest users via vectors related to the "groups" and "users" APIs.
[]
null
null
6.5
null
CVE-2024-30056
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2025-27188
Adobe Commerce | Incorrect Authorization (CWE-863)
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
[]
null
4.3
null
null
CVE-2021-3746
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
[ "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*" ]
null
6.5
null
7.1
CVE-2025-48241
WordPress Verge3D plugin <= 4.9.3 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Soft8Soft LLC Verge3D allows Reflected XSS. This issue affects Verge3D: from n/a through 4.9.3.
[]
null
7.1
null
null
GHSA-8vr4-mq3c-qmc2
SQL injection vulnerability in the category file in modules.php in the Emporium 2.3.0 and earlier module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the category_id parameter.
[]
null
null
null
null
CVE-2022-2945
The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.5.3 via the 'type' parameter found in the alm_get_layout() function. This makes it possible for authenticated attackers, with administrative permissions, to read the contents of arbitrary files on the server, which can contain sensitive information.
[ "cpe:2.3:a:connekthq:ajax_load_more:*:*:*:*:*:wordpress:*:*" ]
null
4.9
null
null
CVE-2021-3790
A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device.
[ "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-m593-g9cm-c9fm
Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain a Remote Code Execution vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary commands on the server.
[]
null
null
9.8
null
GHSA-gx8m-4376-pv8m
touchbase.ai before version 2.0 is vulnerable to Open Redirect. Impacts can be many, and vary from theft of information and credentials, to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The issue is fixed in version 2.0.
[]
null
null
null
null
GHSA-wj9c-gx74-xrjr
The Woocommerce Automatic Order Printing | ( Formerly WooCommerce Google Cloud Print) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1 via the xc_woo_printer_preview AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's invoices and orders which can contain sensitive information.
[]
null
4.3
null
null
CVE-2019-13990
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
[ "cpe:2.3:a:softwareag:quartz:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:apache_batik_mapviewer:12.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:apache_batik_mapviewer:18c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:apache_batik_mapviewer:19c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_enterprise_originations:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_enterprise_originations:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_ip_service_activator:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:documaker:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:14.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:14.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:google_guava_mapviewer:12.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:google_guava_mapviewer:18c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:google_guava_mapviewer:19c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_order_broker:18.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_order_broker:19.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:terracotta_quartz_scheduler_mapviewer:12.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:terracotta_quartz_scheduler_mapviewer:18c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:terracotta_quartz_scheduler_mapviewer:19c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomee:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.2:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.2:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.3:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.3:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.4:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.4:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.5:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.5:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.6:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.6:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.7:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.7:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.8:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.8:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.9:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.9:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.10:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.10:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.11:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.11:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.12:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.12:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.13:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.13:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.14:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.14:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.15:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.15:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.16:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.16:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.17:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.17:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.18:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.18:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.19:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.19:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.20:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.20:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.21:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.21:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.22:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.22:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.23:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.23:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.24:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.24:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.25:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.20.25:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.21.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.21.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.21.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.21.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.2:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.2:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.3:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.3:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.4:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.4:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.6:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:4.22.6:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.0.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.0.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.1.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.1.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.1.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.1.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.2.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.2.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.2.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.2.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.2:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.2:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.3:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.3.3:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.2:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.2:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.3:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.3:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.4:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.4:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.5:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.5:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.6:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.6:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.7:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.7:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.8:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.8:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.9:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.4.9:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.5.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.5.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.6.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.6.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.7.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.7.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.7.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.7.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.8.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.8.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.8.1:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.8.1:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.9.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.9.0:*:*:*:server:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.10.0:*:*:*:data_center:*:*:*", "cpe:2.3:a:atlassian:jira_service_management:5.10.0:*:*:*:server:*:*:*" ]
null
9.8
null
7.5
GHSA-w328-4vjc-f7p4
Integer overflow in the XPMReader::ReadXPM function in filter.vcl/ixpm/svt_xpmread.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to execute arbitrary code via a crafted XPM file that triggers a heap-based buffer overflow.
[]
null
null
null
null
GHSA-57qm-97m4-7q67
A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/CustomerReport.php. The manipulation of the argument city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
CVE-2021-26291
block repositories using http by default
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
[ "cpe:2.3:a:apache:maven:*:*:*:*:*:*:*:*", "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.1:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
CVE-2024-0811
Inappropriate implementation in Extensions API in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-wfv8-2qmm-86mr
SQL injection vulnerability in the administrator control panel in Jetstat.com JS ASP Faq Manager 1.10 allows remote attackers to execute arbitrary SQL commands via the pwd parameter (aka the Password field).
[]
null
null
null
null
CVE-2022-26690
Description: A race condition was addressed with additional validation. This issue is fixed in macOS Monterey 12.3. A malicious application may be able to modify protected parts of the file system.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
4.7
null
2.6
CVE-2021-20689
Cross-site scripting vulnerability in Yomi-Search Ver4.22 allows remote attackers to inject an arbitrary script via unspecified vectors.
[ "cpe:2.3:a:yomi-search_project:yomi-search:4.22:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-php9-vq53-w2xm
The Tube Video Ads Lite WordPress plugin through 1.5.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
null
4.7
null
null
CVE-2010-4012
Race condition in Apple iOS 4.0 through 4.1 for iPhone 3G and later allows physically proximate attackers to bypass the passcode lock by making a call from the Emergency Call screen, then quickly pressing the Sleep/Wake button.
[ "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*" ]
null
null
null
6.2
CVE-2017-17594
DomainSale PHP Script 1.0 has SQL Injection via the domain.php id parameter.
[ "cpe:2.3:a:domainsale_php_script_project:domainsale_php_script:1.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-m2mv-ff48-hjqh
Beetel 777VR1-DI Hardware Version REV.1.01 Firmware Version V01.00.09_55 was discovered to contain a cross-site scripting (XSS) vulnerability via the Ping diagnostic option.
[]
null
5.4
null
null
CVE-2022-32841
The issue was addressed with improved memory handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Processing a maliciously crafted image may result in disclosure of process memory.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-7hxp-qqjp-qjxm
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / user1234 credentials for an ISP.
[]
null
null
null
null
GHSA-mw8v-rjj4-5wq9
Cross-site scripting (XSS) vulnerability in topic.php in Camera Life 2.6.2b4 allows remote attackers to inject arbitrary web script or HTML via the name parameter.
[]
null
null
null
null
CVE-2022-47151
WordPress JS Help Desk plugin <= 2.7.1 - Unauth. SQL Injection Vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.7.1.
[]
null
8.6
null
null
GHSA-m63p-gcqw-3rr6
Cross-site scripting (XSS) vulnerability in HPE Network Node Manager i (NNMi) 9.20, 9.23, 9.24, 9.25, 10.00, and 10.01 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-2010.
[]
null
null
5.4
null
GHSA-4phc-fq33-39gx
NULL Pointer Dereference in GitHub repository seleniumhq/selenium prior to 4.14.0.
[]
null
null
7.5
null
GHSA-x5j3-2q4h-rfvw
The baby days (aka jp.co.cyberagent.babydays) application 1.5.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-mw3j-855g-6jp8
Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 1.1 and 1.1.1 beta allow remote attackers to inject arbitrary web script or HTML via the (1) sort_mode parameter to (a) fisheye/list_galleries.php, (b) messages/message_box.php, and (c) users/my.php; the (2) post_id parameter to (d) blogs/view_post.php; the (3) blog_id parameter to (e) blogs/view.php; and the (4) search field to (f) users/my_groups.php.
[]
null
null
null
null
GHSA-x68p-mx4r-fh9v
ai-dev aicombinationsonfly before v0.3.1 was discovered to contain a SQL injection vulnerability via the component /includes/ajax.php.
[]
null
8.8
null
null
GHSA-x4h9-h8xw-45f8
TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Tapo C210 IP cameras. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the handling of the ActiveCells parameter of the CreateRules and ModifyRules APIs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20589.
[]
null
null
6.8
null
GHSA-7ww8-h9c7-wx7c
nsViewManager.cpp in Mozilla Firefox 3.0.2 through 3.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to interaction with TinyMCE.
[]
null
null
null
null
GHSA-crr3-cvh5-8wfr
An issue has been discovered in GitLab CE/EE affecting all versions before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. A lack of proper validation in GitLab could allow an authenticated user to cause a denial of service condition.
[]
null
6.5
null
null
GHSA-r32j-f8ch-p2h8
Cross-site scripting (XSS) vulnerability in admin/article/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.
[]
null
null
null
null
CVE-2023-4217
Session cookies attribute not set properly
A vulnerability has been identified in PT-G503 Series versions prior to v5.2, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.
[ "cpe:2.3:o:moxa:eds-g503_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:eds-g503:-:*:*:*:*:*:*:*" ]
null
3.1
null
null
CVE-2013-0503
Cross-site scripting (XSS) vulnerability in the Bookmarks component in IBM Lotus Connections before 4.0 CR3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ibm:lotus_connections:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:1.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:1.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:1.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:2.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:2.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:2.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:2.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:2.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:3.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:3.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_connections:3.0.1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-cxfw-jrj9-6wmg
A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system.
[]
null
5.5
null
null
CVE-2021-24856
Shared Files < 1.6.61 - Admin+ Stored Cross-Site Scripting
The Shared Files WordPress plugin before 1.6.61 does not sanitise and escape the Download Counter Text settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[ "cpe:2.3:a:tammersoft:shared_files:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
CVE-2024-7780
Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder 2.0 - 2.13.9 - Authenticated (Administrator+) SQL Injection
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:bitpressadmin:contact_form_by_bit_form_multi_step_form:*:*:*:*:*:*:*:*", "cpe:2.3:a:bitapps:contact_form_builder:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
GHSA-jhx2-qrv5-m4q7
SQL Injection vulnerability in kishan0725 Hospital Management System thru commit 4770d740f2512693ef8fd9aa10a8d17f79fad9bd (on March 13, 2021), allows attackers to execute arbitrary commands via the contact and doctor parameters to /search.php.
[]
null
9.8
null
null
GHSA-3jxh-7h2g-h6mg
AOL Instant Messenger (AIM) 4.7.2480 and earlier allows remote attackers to cause a denial of service (application crash) via an instant message that contains a large amount of "<!--" HTML comments.
[]
null
null
null
null
GHSA-fjf3-pj7m-5pqj
Directory traversal vulnerability in link.php in NX5Linx 1.0 allows remote attackers to read arbitrary files via the logo parameter.
[]
null
null
null
null
GHSA-7jfp-7w7f-mfcm
Cross-site scripting vulnerability in Internet Explorer 6 earlier allows remote attackers to execute arbitrary script via an Extended HTML Form, whose output from the remote server is not properly cleansed.
[]
null
null
null
null
GHSA-qgrh-w8r5-c899
vCenter Server contains an unauthenticated API endpoint vulnerability in vCenter Server Content Library. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to perform unauthenticated VM network setting manipulation.
[]
null
null
null
null
CVE-2013-4290
Stack-based buffer overflow in OpenJPEG before 1.5.2 allows remote attackers to have unspecified impact via unknown vectors to (1) lib/openjp3d/opj_jp3d_compress.c, (2) bin/jp3d/convert.c, or (3) lib/openjp3d/event.c.
[ "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "cpe:2.3:a:uclouvain:openjpeg:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:uclouvain:openjpeg:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:uclouvain:openjpeg:1.5:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-v8qw-hw67-pw2g
Unspecified vulnerability in the RDBMS Support Tools component in Oracle Database Server 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows local users to affect confidentiality via unknown vectors.
[]
null
null
null
null
GHSA-3rh7-vm4x-q2hp
sqlserver is malware
The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationAs this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.If you have found this installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[]
null
null
7.5
null
CVE-2018-14541
PHP Scripts Mall Basic B2B Script 2.0.0 has Reflected and Stored XSS via the First name, Last name, Address 1, City, State, and Company name fields.
[ "cpe:2.3:a:readymadeb2bscript:basic_b2b:2.0.0:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-g7v9-p5c5-r49m
School Dormitory Management System 1.0 is vulnerable to SQL Injection via accounts/view_details.php:4.
[]
null
9.8
null
null
PYSEC-2018-17
null
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this.
[]
null
null
null
null
CVE-2021-26858
Microsoft Exchange Server Remote Code Execution Vulnerability
Microsoft Exchange Server Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:exchange_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-x2v4-6r37-4qq5
Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
[]
null
7.8
null
null
GHSA-95wm-mm55-cxhx
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
[]
null
9.1
null
null
CVE-2016-3205
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3206 and CVE-2016-3207.
[ "cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
null
null
7.5
7.6