id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-q23q-vqjp-vwv2 | Multiple cross-site scripting (XSS) vulnerabilities in Xigla Absolute Form Processor XE 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) showfields, (2) text, and (3) submissions parameters to search.asp and the (4) name parameter to users.asp. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-cw7j-v52w-fp5r | copyparty vulnerable to reflected cross-site scripting via hc parameter | SummaryThe application contains a reflected cross-site scripting via URL-parameter `?hc=...`DetailsA reflected cross-site scripting (XSS) vulnerability exists in the web interface of the application that could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link.It is recommended to change the passwords of your copyparty accounts, unless you have inspected your logs and found no trace of attacks.Checking for exposureif copyparty is running behind a reverse proxy, you can check the access-logs for traces of attacks, by grepping for URLs containing `?hc=` with `<` somewhere in its value, for example using the following command:nginx:PoC`http://127.0.0.1:3923/?hc="><script>alert(1);</script>``http://127.0.0.1:3923/?pw=<script>alert(1);</script>` | [] | null | 6.3 | null | null |
GHSA-w3rv-993w-f388 | MPlayer allows remote attackers to cause a denial of service (application crash) via (1) a malformed AAC file, as demonstrated by lol-vlc.aac; or (2) a malformed Ogg Media (OGM) file, as demonstrated by lol-ffplay.ogm, different vectors than CVE-2007-6718. | [] | null | null | null | null |
|
CVE-2020-22650 | A memory leak vulnerability in sim-organizer.c of AlienVault Ossim v5 causes a denial of service (DOS) via a system crash triggered by the occurrence of a large number of alarm events. | [
"cpe:2.3:a:att:alienvault_ossim:5.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-3fhv-3538-fw8f | A vulnerability has been identified in Simcenter Nastran 2306 (All versions), Simcenter Nastran 2312 (All versions), Simcenter Nastran 2406 (All versions < V2406.5000). The affected application is vulnerable to memory corruption while parsing specially crafted BDF files. This could allow an attacker to execute code in the context of the current process. | [] | 7.3 | 7.8 | null | null |
|
GHSA-c2fx-6qc9-26x9 | Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects Firefox < 120, Firefox < 115.5, and Thunderbird < 115.5.0. | [] | null | 6.5 | null | null |
|
CVE-2020-29042 | An issue was discovered in BigBlueButton through 2.2.29. A brute-force attack may occur because an unlimited number of codes can be entered for a meeting that is protected by an access code. | [
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"
] | null | 3.7 | null | 4.3 |
|
GHSA-5v2c-phpf-wrv5 | oFono AT CMGR Command Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.The specific flaw exists within the parsing of responses from AT+CMGR commands. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-23309. | [] | null | null | 3.3 | null |
|
CVE-2005-2368 | vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels. | [
"cpe:2.3:a:vim_development_group:vim:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.011:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.025:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.030:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.044:*:*:*:*:*:*:*",
"cpe:2.3:a:vim_development_group:vim:6.3.081:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-66qf-7h58-9q6q | A remote code execution (RCE) vulnerability in the upload_file function of LRQA Nettitude PoshC2 after commit 123db87 allows authenticated attackers to execute arbitrary code via a crafted POST request. | [] | null | 8.8 | null | null |
|
GHSA-h26c-74g7-p96g | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | [] | null | 7 | null | null |
|
GHSA-cxjg-542q-fjgf | When a user opens manipulated PhotoShop Document (.PSD) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application. | [] | null | null | null | null |
|
CVE-2023-7260 | A path traversal vulnerability has been discovered in OpenText™ CX-E Voice. | Path Traversal vulnerability discovered in OpenText™ CX-E Voice,
affecting all version through 22.4. The vulnerability could allow arbitrarily access files on the system. | [
"cpe:2.3:a:opentext:cx-e_voice:*:*:*:*:*:*:*:*"
] | 6.9 | null | null | null |
CVE-2006-3692 | PHP remote file inclusion vulnerability in enduser/listmessenger.php in ListMessenger 0.9.3 allows remote attackers to execute arbitrary PHP code via a URL in the lm_path parameter. NOTE: the vendor has disputed this issue to SecurityTracker, stating that the $lm_path variable is set to a constant value. As of 20060726, CVE concurs with the vendor based on SecurityTracker's post-disclosure analysis | [
"cpe:2.3:a:silentweb:listmessenger:0.9.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-1105 | PHP remote file inclusion vulnerability in functions.php in Extreme phpBB (aka phpBB Extreme) 3.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:extreme_phpbb:extreme_phpbb:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-w659-5wvm-43mr | Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability | [] | null | 7.5 | null | null |
|
GHSA-993f-36vw-6mhm | A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387. | [] | null | null | null | null |
|
GHSA-3356-grh4-xpc8 | A vulnerability was found in mrtnmtth joomla_mod_einsatz_stats up to 0.2. It has been classified as critical. This affects the function getStatsByType of the file helper.php. The manipulation of the argument year leads to sql injection. Upgrading to version 0.3 is able to address this issue. The name of the patch is 27c1b443cff45c81d9d7d926a74c76f8b6ffc6cb. It is recommended to upgrade the affected component. The identifier VDB-217653 was assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
RHSA-2023:6020 | Red Hat Security Advisory: varnish:6 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
GHSA-575w-2h42-5mmg | elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions. | [] | null | null | 7.8 | null |
|
GHSA-hx3x-474x-cc52 | Huawei MBB (Mobile Broadband) products E5771h-937 with the versions before E5771h-937TCPU-V200R001B328D62SP00C1133 and the versions before E5771h-937TCPU-V200R001B329D05SP00C1308 have a Denial of Service (DoS) vulnerability. When an attacker accessing device sends special http request to device, the webserver process will try to apply too much memory which can cause the device to become unable to respond. An attacker can launch a DoS attack by exploiting this vulnerability. | [] | null | null | 6.5 | null |
|
GHSA-2v5c-755p-p4gv | Missing TLS certificate verification in faye-websocket | The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `wss:` connection made using this library is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to.This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, [em-http-request][6] published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into [faye-websocket for Ruby][10], such that we use the `OpenSSL` module to perform two checks:The chain of certificates presented by the server is valid and ultimately trusted by your root certificate set -- either your system default root certificates, or a set provided at runtimeThe final certificate presented by the server is valid for the hostname used in the request URI; if the connection is made via a proxy we use the hostname from the request, not the proxy's hostnameAfter implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in faye-websocket, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that
all clients have TLS verification turned on by default. A client that is not carrying out verification is either:talking to the expected server, and will not break under this changebeing attacked, and would benefit from being alerted to this factdeliberately talking to a server that would be rejected by verificationThe latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be "working by accident", rather than functionality that was actively supported, and it should be properly and explicitly supported instead. To that end, we have added two new options to the `Faye::WebSocket::Client` constructor: `tls.root_cert_file`, and `tls.verify_peer`.The `:root_cert_file` option lets you provide a different set of root certificates in situations where you don't want to use your system's default root certificates to verify the remote host. It should be a path or an array of paths identifying the certificates to use instead of the defaults.The `:verify_peer` option lets you turn verification off entirely. This should be a last resort and we recommend using the `:root_cert_file` option if possible.To get the new behaviour, please upgrade to v0.11.0 of the [Rubygems package][10]. There are, unfortunately, no workarounds for this issue, as you cannot enable `:verify_peer` in EventMachine unless the calling library contains an implementation of `ssl_verify_peer` that actually checks the server's certificates.For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue. | [] | null | 8 | null | null |
GHSA-84wr-48gp-fwxp | Multiple cross-site request forgery (CSRF) vulnerabilities in the Wp Unique Article Header Image plugin 1.0 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) gt_default_header or (2) gt_homepage_header parameter in the wp-unique-header.php page to wp-admin/options-general.php. | [] | null | null | null | null |
|
GHSA-wrxp-6gw7-g9fx | A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1. An app may be able to cause unexpected system termination. | [] | null | 6.5 | null | null |
|
CVE-2023-3828 | Bug Finder Listplace Directory Listing Platform Photo coverPhotoUpdate cross site scripting | A vulnerability was found in Bug Finder Listplace Directory Listing Platform 3.0. It has been classified as problematic. This affects an unknown part of the file /listplace/user/coverPhotoUpdate of the component Photo Handler. The manipulation of the argument user_cover_photo leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235149 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:bugfinder:listplace_directory_listing_platform:3.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
GHSA-8735-9wmp-4wx2 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 7.8 | null | null |
|
GHSA-463w-mgxh-hj7v | Wedding Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /Wedding-Management/package_detail.php. | [] | null | 9.8 | null | null |
|
GHSA-h4hv-2fjr-fhgv | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grnlinecreate.php, in the batchno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials. | [] | null | 7.1 | null | null |
|
CVE-2024-11052 | Ninja Forms – The Contact Form Builder That Grows With You <= 3.8.19 - Unauthenticated Stored Cross-Site Scripting via Form Calculations | The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the calculations parameter in all versions up to, and including, 3.8.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 7.2 | null | null |
GHSA-7cjm-g6f3-rgvg | A stored Cross-site scripting (XSS) vulnerability in Portainer through 1.19.1 allows remote authenticated users to inject arbitrary JavaScript and/or HTML via the Team Name field. | [] | null | null | 5.4 | null |
|
CVE-2022-42289 | NVIDIA BMC contains a vulnerability in SPX REST API, where an authorized attacker can inject arbitrary shell commands, which may lead to code execution, denial of service, information disclosure and data tampering. | [
"cpe:2.3:o:nvidia:dgx_a100_firmware:*:*:*:*:bmc:*:*:*",
"cpe:2.3:h:nvidia:dgx_a100:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-rhxj-ghh4-8h63 | Unspecified vulnerability in the Administrative Console on the IBM WebSphere DataPower XC10 appliance 2.5 allows remote attackers to obtain administrative privileges by leveraging access to an eXtreme Scale distributed ObjectGrid network. | [] | null | null | null | null |
|
CVE-2021-32028 | A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. | [
"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2018-19206 | steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment. | [
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2024-3207 | ermig1979 Simd SimdMemoryStream.h ReadUnsigned heap-based overflow | A vulnerability was found in ermig1979 Simd up to 6.0.134. It has been declared as critical. This vulnerability affects the function ReadUnsigned of the file src/Simd/SimdMemoryStream.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. VDB-259054 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:ermig1979:simd:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 |
GHSA-m6fc-2mf5-48gm | GroupWise WebAccess 5.5 with directory indexing enabled allows a remote attacker to view arbitrary directory contents via an HTTP request with a lowercase "get". | [] | null | null | null | null |
|
ICSA-18-079-02 | Siemens SIMATIC, SINUMERIK, and PROFINET IO (Update D) | Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system.
The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system. CVE-2018-4843 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | 6.5 | null | null |
CVE-2009-0924 | Unspecified vulnerability in Sun OpenSolaris snv_39 through snv_45, when running in 64-bit mode on x86 architectures, allows local users to cause a denial of service (hang of UFS filesystem write) via unknown vectors related to the (1) ufs_getpage and (2) ufs_putapage routines, aka CR 6442712. | [
"cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*"
] | null | null | null | 4.7 |
|
GHSA-vhv4-j9cm-5cjx | A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system.This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device. | [] | null | 7.2 | null | null |
|
CVE-2017-20145 | Tecrail Responsive Filemanger path traversal | A vulnerability was found in Tecrail Responsive Filemanger up to 9.10.x and classified as critical. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 9.11.0 is able to address this issue. It is recommended to upgrade the affected component. | [
"cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-m98h-48v7-g4f9 | The wp-publications WordPress plugin is vulnerable to restrictive local file inclusion via the Q_FILE parameter found in the ~/bibtexbrowser.php file which allows attackers to include local zip files and achieve remote code execution, in versions up to and including 0.0. | [] | null | null | null | null |
|
GHSA-g4g7-2qvf-xwh3 | A vulnerability was found in 1000 Projects Daily College Class Work Report Book 1.0. It has been classified as critical. This affects an unknown part of the file /login.php. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-pc8r-xm6p-mppp | The Data Virtualization Server component of TIBCO Software Inc.'s TIBCO Data Virtualization, TIBCO Data Virtualization, TIBCO Data Virtualization, and TIBCO Data Virtualization for AWS Marketplace contains a difficult to exploit vulnerability that allows a low privileged attacker with local access to download arbitrary files outside of the scope of the user's permissions on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Data Virtualization: versions 8.3.0 and below, TIBCO Data Virtualization: version 8.4.0, TIBCO Data Virtualization: version 8.5.0, and TIBCO Data Virtualization for AWS Marketplace: versions 8.5.0 and below. | [] | null | null | null | null |
|
GHSA-jm54-vf35-63rg | PHP remote file inclusion vulnerability in ListRecords.php in osprey 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the lib_dir parameter. | [] | null | null | null | null |
|
CVE-2006-1130 | Cross-site scripting (XSS) vulnerability in EKINboard 1.0.3 allows remote attackers to inject arbitrary web script or HTML via a Javascript URI in a BBCode img tag. | [
"cpe:2.3:a:ekinboard:ekinboard:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-4g29-fccr-p59w | Reflected Cross-site Scripting in Shopware storefront | ImpactNot-stored XSS in storefront.
Request parameter were directly assigned to the template, so that malicious code could be send via an URL.PatchesWe recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.htmlReferenceshttps://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022 | [] | null | 5.4 | null | null |
CVE-2017-9606 | Infotecs ViPNet Client and Coordinator before 4.3.2-42442 allow local users to gain privileges by placing a Trojan horse ViPNet update file in the update folder. The attack succeeds because of incorrect folder permissions in conjunction with a lack of integrity and authenticity checks. | [
"cpe:2.3:a:infotecs:vipnet_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:infotecs:vipnet_coordinator:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | 4.4 |
|
GHSA-m7h9-fqp3-w3g5 | In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree. | [] | null | null | 9.8 | null |
|
CVE-2022-49635 | drm/i915/selftests: fix subtraction overflow bug | In the Linux kernel, the following vulnerability has been resolved:
drm/i915/selftests: fix subtraction overflow bug
On some machines hole_end can be small enough to cause subtraction
overflow. On the other side (addr + 2 * min_alignment) can overflow
in case of mock tests. This patch should handle both cases.
(cherry picked from commit ab3edc679c552a466e4bf0b11af3666008bd65a2) | [] | null | null | null | null |
GHSA-39h8-5656-9hw5 | A vulnerability has been identified in SPPA-T3000 Application Server (All versions). An attacker with network access to the Application Server could gain remote code execution by sending specifically crafted packets to 8888/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] | null | null | null | null |
|
CVE-2025-30022 | CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the DATANASC parameter. | [] | null | 6.8 | null | null |
|
GHSA-76cg-h8r5-8j58 | Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: US Federal Specific). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [] | null | 4.3 | null | null |
|
GHSA-679j-c6m7-q7pr | Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow. | [] | null | null | 9.8 | null |
|
CVE-2023-38541 | Insecure inherited permissions in some Intel HID Event Filter drivers for Windows 10 for some Intel NUC laptop software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:hid_event_filter_driver:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2020-19639 | Cross Site Request Forgery (CSRF) vulnerability in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B, via all fields to WebUI. | [
"cpe:2.3:o:insma:wifi_mini_spy_1080p_hd_security_ip_camera_firmware:1.9.7b:*:*:*:*:*:*:*",
"cpe:2.3:h:insma:wifi_mini_spy_1080p_hd_security_ip_camera:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2025-20894 | Improper access control in Samsung Email prior to version 6.1.97.1 allows physical attackers to access data across multiple user profiles. | [] | null | 4.6 | null | null |
|
CVE-2024-5244 | TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability | TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability. This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22439. | [
"cpe:2.3:a:tp_link:omada_er605:2.6_2.2.2_build_20231017:*:*:*:*:*:*:*"
] | null | null | 5 | null |
CVE-2021-32974 | Moxa NPort IAW5000A-I/O Series Serial Device Server Improper Input Validation | Improper input validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to execute commands. | [
"cpe:2.3:o:moxa:nport_iaw5150a-6i\\/o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_iaw5150a-6i\\/o:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_iaw5150a-12i\\/o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_iaw5150a-12i\\/o:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_iaw5250a-6i\\/o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_iaw5250a-6i\\/o:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_iaw5250a-12i\\/o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_iaw5250a-12i\\/o:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2016-3596 | Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-2016-3581, CVE-2016-3582, CVE-2016-3583, CVE-2016-3590, CVE-2016-3591, CVE-2016-3592, CVE-2016-3593, CVE-2016-3594, and CVE-2016-3595. | [
"cpe:2.3:a:oracle:outside_in_technology:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.2:*:*:*:*:*:*:*"
] | null | null | 8.6 | 9 |
|
GHSA-mr3m-f78x-6fhf | In the Linux kernel, the following vulnerability has been resolved:net: ll_temac: platform_get_resource replaced by wrong functionThe function platform_get_resource was replaced with
devm_platform_ioremap_resource_byname and is called using 0 as name.This eventually ends up in platform_get_resource_byname in the call
stack, where it causes a null pointer in strcmp.It should have been replaced with devm_platform_ioremap_resource. | [] | null | 5.5 | null | null |
|
GHSA-g3fm-3m5m-jqr3 | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Rich Text Editor). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | null | null |
|
GHSA-j827-6rgf-9629 | Layui has DOM Clobbering gadgets that leads to Cross-site Scripting | SummaryA DOM Clobbering vulnerability has been discovered in `layui` that can lead to Cross-site Scripting (XSS) on web pages where attacker-controlled HTML elements (e.g., `img` tags with unsanitized `name` attributes) are present.It's worth noting that we’ve identifed similar issues in other popular client-side libraries like Webpack ([CVE-2024-43788](https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986)) and Vite ([CVE-2024-45812](https://github.com/vitejs/vite/security/advisories/GHSA-64vr-g452-qvp3)), which might serve as valuable references.BackgroundsDOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code snippet) living in the existing libraries to transform it into executable code.ImpactThis vulnerability can lead to cross-site scripting (XSS) on websites that uses `layui` library and allow users to inject certain scriptless HTML tags with improperly sanitized `name` or `id` attributes.PatchThis problem has been patched in Layui 2.9.17. You can find the official fix announcement at:
https://layui.dev/notes/share/security-currentscript.html | [] | 4.8 | 6.4 | null | null |
CVE-2022-29885 | EncryptInterceptor does not provide complete protection on insecure networks | The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks. | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:10.1.0:milestone9:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_cruise_shipboard_property_management_system:20.2.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
CVE-1999-1216 | Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the "no ip source-route" command. | [
"cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:router:8.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:router:8.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:router:9.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:router:9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-x836-gjvx-j5rx | Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer. | [] | null | null | null | null |
|
CVE-2019-2907 | Vulnerability in the Oracle Web Services product of Oracle Fusion Middleware (component: SOAP with Attachments API for Java). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Services. While the vulnerability is in Oracle Web Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Web Services accessible data as well as unauthorized read access to a subset of Oracle Web Services accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:web_services:12.2.1.3.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.4 |
|
CVE-2016-7606 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-8562-g6j2-35q9 | Use after free of a pointer in iWLAN scenario during netmgr state transition to CONNECT in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, QCA6574AU, QCS405, QCS605, SDA660, SDA845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [] | null | null | null | null |
|
CVE-2025-26818 | Netwrix Password Secure through 9.2 allows command injection. | [] | null | 9.8 | null | null |
|
GHSA-xrh7-mhgj-f2r5 | Alpine Halo9 UPDM_wemCmdCreatSHA256Hash Command Injection Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.The specific flaw exists within the UPDM_wemCmdCreatSHA256Hash function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.Was ZDI-CAN-23105 | [] | null | 6.8 | null | null |
|
GHSA-8x4f-p6m3-p75v | Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the xls_parseWorkBook function in xls.c:1015. | [] | null | 6.5 | null | null |
|
RHSA-2013:0815 | Red Hat Security Advisory: httpd security update | httpd: multiple XSS flaws due to unescaped hostnames httpd: XSS flaw in mod_proxy_balancer manager interface httpd: mod_rewrite allows terminal escape sequences to be written to the log file | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-fh8x-pp45-h2fp | Missing Authorization vulnerability in Tagbox Taggbox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Taggbox: from n/a through 3.3. | [] | null | 5.4 | null | null |
|
GHSA-535p-c89j-pqj5 | Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to access sensitive information of Galaxy watch. | [] | null | 4 | null | null |
|
GHSA-g849-58hg-8cmw | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nicdark Restaurant Reservations allows Stored XSS.This issue affects Restaurant Reservations: from n/a through 2.0. | [] | null | 6.5 | null | null |
|
CVE-2025-1544 | dingfanzu CMS loadShopInfo.php sql injection | A vulnerability, which was classified as critical, was found in dingfanzu CMS up to 20250210. Affected is an unknown function of the file /ajax/loadShopInfo.php. The manipulation of the argument shopId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2022-26076 | Uncontrolled search path element in the Intel(R) oneAPI Deep Neural Network (oneDNN) before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:oneapi_deep_neural_network:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2011-0222 | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-34w3-c4pr-6xhv | Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 8.9 Update 2011-D allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Global Payroll Core. | [] | null | null | null | null |
|
CVE-2024-43872 | RDMA/hns: Fix soft lockup under heavy CEQE load | In the Linux kernel, the following vulnerability has been resolved:
RDMA/hns: Fix soft lockup under heavy CEQE load
CEQEs are handled in interrupt handler currently. This may cause the
CPU core staying in interrupt context too long and lead to soft lockup
under heavy load.
Handle CEQEs in BH workqueue and set an upper limit for the number of
CEQE handled by a single call of work handler. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2024-33933 | WordPress Elementor Header & Footer Builder plugin <= 1.6.35 - Contributor+ DOM-Based Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force, Nikhil Chavan Elementor – Header, Footer & Blocks Template allows DOM-Based XSS.This issue affects Elementor – Header, Footer & Blocks Template: from n/a through 1.6.35. | [
"cpe:2.3:a:brainstormforce:elementor_-_header\\,_footer_\\&_blocks_template:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-hc62-cr99-v89f | J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in SysMsgPushMapper.xml. | [] | null | 9.8 | null | null |
|
GHSA-hh5p-vgjc-p9vq | Cross-site scripting (XSS) vulnerability in LogiSphere 0.9.9j allows remote attackers to inject arbitrary Javascript via the msg command. NOTE: due to lack of appropriate details by the original researcher, it is unclear whether this issue is distinct from the msg DoS. | [] | null | null | null | null |
|
GHSA-xpj8-p66v-3v8x | plugins/box/users/users.plugin.php in Monstra CMS 3.0.4 allows Login Rate Limiting Bypass via manipulation of the login_attempts cookie. | [] | null | null | 9.8 | null |
|
GHSA-fv46-7jp9-m2p3 | Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a command injection vulnerability via partition in /boafrm/formDiskFormat. | [] | null | 6.5 | null | null |
|
CVE-2018-10176 | Digital Guardian Management Console 7.1.2.0015 has a Directory Traversal issue. | [
"cpe:2.3:a:digitalguardian:management_console:7.1.2.0015:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-frf5-gv46-45f5 | skycaiji v2.5.4 is vulnerable to Cross Site Scripting (XSS). Attackers can achieve backend XSS by deploying malicious JSON data. | [] | null | 5.4 | null | null |
|
GHSA-7mqq-22j6-frjr | The WordPress User Extra Fields plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the ajax_save_fields() function in all versions up to, and including, 16.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to add custom fields that can be updated and then use the check_and_overwrite_wp_or_woocommerce_fields function to update the wp_capabilities field to have administrator privileges. | [] | null | 8.8 | null | null |
|
GHSA-gqv4-m36w-q35f | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Link objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6434. | [] | null | null | 8.8 | null |
|
GHSA-79mx-82jw-xwqh | SuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise. | [] | null | null | null | null |
|
CVE-2022-3301 | Improper Cleanup on Thrown Exception in ikus060/rdiffweb | Improper Cleanup on Thrown Exception in GitHub repository ikus060/rdiffweb prior to 2.4.8. | [
"cpe:2.3:a:ikus-soft:rdiffweb:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
RHSA-2021:2418 | Red Hat Security Advisory: dhcp security update | dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.8 | null | null |
GHSA-5gwh-r76w-934h | Qualys Jenkins Plugin for WAS XML External Entity vulnerability | Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data | [] | null | 5.7 | null | null |
GHSA-4q44-89v6-r47v | The Om Stripe WordPress plugin through 02.00.00 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | [] | null | 7.1 | null | null |
|
GHSA-rh33-jwjp-gp57 | iAd Content Display in Apple iOS before 4.2 allows man-in-the-middle attackers to make calls via a crafted URL in an ad. | [] | null | null | null | null |
|
CVE-2012-2136 | The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2020-36421 | An issue was discovered in Arm Mbed TLS before 2.23.0. Because of a side channel in modular exponentiation, an RSA private key used in a secure enclave could be disclosed. | [
"cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-xcxp-vf6x-3fjg | Heap buffer overflow in Media Galleries in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: Medium) | [] | null | 8.8 | null | null |
|
CVE-2005-3649 | jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter. | [
"cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2020-9369 | Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters. | [
"cpe:2.3:a:sympa:sympa:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.