id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-fq3r-xmqf-p5w7
|
** DISPUTED ** Moodle 4.3 allows /grade/report/grader/index.php?searchvalue= reflected XSS when logged in as a teacher. NOTE: the Moodle Security FAQ link states "Some forms of rich content [are] used by teachers to enhance their courses ... admins and teachers can post XSS-capable content, but students can not."
|
[] | null | 5.4 | null | null | null |
|
CVE-2023-31654
|
Redis raft master-1b8bd86 to master-7b46079 was discovered to contain an ODR violation via the component hiredisAllocFns at /opt/fs/redisraft/deps/hiredis/alloc.c.
|
[
"cpe:2.3:a:redis:redisraft:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-fc8m-x59c-5f6r
|
An input validation issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system.
|
[] | null | 8.4 | null | null | null |
|
GHSA-xg79-vpm4-cg56
|
PendingIntent hijacking vulnerability in SemWifiApTimeOutImpl in framework prior to SMR Aug-2023 Release 1 allows local attackers to access ContentProvider without proper permission.
|
[] | null | 5.3 | null | null | null |
|
CVE-2019-11057
|
SQL injection vulnerability in Vtiger CRM before 7.1.0 hotfix3 allows authenticated users to execute arbitrary SQL commands.
|
[
"cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:7.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:7.1.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:7.1.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:vtiger:vtiger_crm:7.1.0:rc:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-4p5f-g2jf-495q
|
Multiple SQL injection vulnerabilities in the Starrating plugin before 0.7.7 for b2evolution allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-4qjp-889f-chf5
|
Buffer overflow in Canary Labs Trend Web Server before 9.5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet.
|
[] | null | null | null | null | null |
|
GHSA-jr5q-879v-77pw
|
The Beaver Builder – WordPress Page Builder for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Text Editor' block in versions up to, and including, 2.5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with access to the Beaver Builder editor to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2009:1658
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null | null |
CVE-2019-11545
|
An issue was discovered in GitLab Community Edition 11.9.x before 11.9.10 and 11.10.x before 11.10.2. It allows Information Disclosure. When an issue is moved to a private project, the private project namespace is leaked to unauthorized users with access to the original issue.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | 4 | null |
|
CVE-2023-21242
|
In isServerCertChainValid of InsecureEapNetworkHandler.java, there is a possible way to trust an imposter server due to a logic error in the code. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2024-34249
|
wasm3 v0.5.0 was discovered to contain a heap buffer overflow which leads to segmentation fault via the function "DeallocateSlot" in wasm3/source/m3_compile.c.
|
[
"cpe:2.3:a:wasm3_project:wasm3:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-67p3-5m2h-325j
|
An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
|
[] | null | null | 8.8 | null | null |
|
CVE-2009-0721
|
Unspecified vulnerability in Easy Login in the Sender module in HP Remote Graphics Software (RGS) 4.0.0 through 5.2.4 allows remote attackers to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:hp:remote_graphics_software:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:remote_graphics_software:5.2.4:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-f76m-q4g4-c63m
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: fix ulist leaks in error paths of qgroup self testsIn the test_no_shared_qgroup() and test_multiple_refs() qgroup self tests,
if we fail to add the tree ref, remove the extent item or remove the
extent ref, we are returning from the test function without freeing the
"old_roots" ulist that was allocated by the previous calls to
btrfs_find_all_roots(). Fix that by calling ulist_free() before returning.
|
[] | null | null | null | null | null |
|
CVE-2016-2464
|
libvpx in libwebm in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted mkv file, aka internal bug 23167726.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-3qgp-95cw-h2qr
|
An issue was discovered on Samsung mobile devices with N(7.x) and O(8.x) software. There is an array overflow in a driver's input booster. The Samsung ID is SVE-2017-11816 (August 2018).
|
[] | null | null | null | null | null |
|
CVE-2020-0701
|
An elevation of privilege vulnerability exists in the way that the Windows Client License Service (ClipSVC) handles objects in memory, aka 'Windows Client License Service Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-5975-c4rr-xpwg
|
" Insecure password storage issue.The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Since the information is stored in cleartext, attackers could potentially read it and gain access to sensitive information."
|
[] | null | 7.5 | null | null | null |
|
CVE-2010-0491
|
Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 allows remote attackers to execute arbitrary code by changing unspecified properties of an HTML object that has an onreadystatechange event handler, aka "HTML Object Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-3g5v-28p4-h3v9
|
In the Linux kernel, the following vulnerability has been resolved:wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()The simple_write_to_buffer() function will succeed if even a single
byte is initialized. However, we need to initialize the whole buffer
to prevent information leaks. Just use memdup_user().
|
[] | null | null | null | null | null |
|
CVE-2024-48034
|
WordPress Creates 3D Flipbook, PDF Flipbook plugin <= 1.2 - Arbitrary File Upload vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in Fliperrr Team Creates 3D Flipbook, PDF Flipbook allows Upload a Web Shell to a Web Server.This issue affects Creates 3D Flipbook, PDF Flipbook: from n/a through 1.2.
|
[
"cpe:2.3:a:fliperr_team:creates_3d_flipbook_pdf_flipbook:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null | null |
GHSA-54rh-52xj-qhxm
|
Insertion of Sensitive Information Into Sent Data vulnerability in brandtoss WP Mailster allows Retrieve Embedded Sensitive Data.This issue affects WP Mailster: from n/a through 1.8.16.0.
|
[] | null | 7.5 | null | null | null |
|
GHSA-q6vj-cjm6-x954
|
Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image.
|
[] | null | null | null | null | null |
|
cisco-sa-iosxe-ctbypass-7QHAfHkK
|
Cisco IOS XE Software Consent Token Bypass Vulnerability
|
A vulnerability in the persistent Telnet/Secure Shell (SSH) CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS) with root privileges.
The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the persistent Telnet/SSH CLI on an affected device and requesting shell access. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | null | 6.7 | null | null |
CVE-2021-23196
|
Fresenius Kabi Agilia Connect Infusion System insufficiently protected credentials
|
The web application on Agilia Link+ version 3.0 implements authentication and session management mechanisms exclusively on the client-side and does not protect authentication attributes sufficiently.
|
[
"cpe:2.3:o:fresenius-kabi:agilia_connect_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fresenius-kabi:agilia_connect:-:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:agilia_partner_maintenance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_centerium:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_insight:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_mastermed:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:3.0:-:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:3.0:d15:*:*:*:*:*:*",
"cpe:2.3:h:fresenius-kabi:link\\+_agilia:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
CVE-2022-41697
|
A user enumeration vulnerability exists in the login functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send a series of HTTP requests to trigger this vulnerability.
|
[
"cpe:2.3:a:ghost:ghost:5.9.4:*:*:*:*:node.js:*:*"
] | null | null | 5.3 | null | null |
|
CVE-2005-0507
|
Directory traversal vulnerability in SD Server 4.0.70 and earlier allows remote attackers to read arbitrary files via .. sequences in an HTTP request.
|
[
"cpe:2.3:a:gd_software:sd_server:4.0.70:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2005:300
|
Red Hat Security Advisory: libexif security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-3g8p-fgh4-3vvq
|
Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_week` POST parameter.
|
[] | null | 9.1 | null | null | null |
|
GHSA-wj4x-x659-777v
|
IBM Security Verify Governance 10.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 256016.
|
[] | null | 5.3 | null | null | null |
|
CVE-2024-29064
|
Windows Hyper-V Denial of Service Vulnerability
|
Windows Hyper-V Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null | null |
GHSA-7pqr-jpxq-q952
|
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'day' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] | null | 9.8 | null | null | null |
|
GHSA-q47p-v5rw-v574
|
Ankitects Anki LaTeX Blocklist Bypass vulnerability
|
A blocklist bypass vulnerability exists in the LaTeX functionality of Ankitects Anki 24.04. A specially crafted malicious flashcard can lead to an arbitrary file creation at a fixed path. An attacker can share a malicious flashcard to trigger this vulnerability.
|
[] | 2.3 | 3.1 | null | null | null |
GHSA-fvgq-vmrp-gcc4
|
Buffer overflow in httpd32.exe in Deerfield VisNetic WebSite before 3.5.15 allows remote attackers to cause a denial of service (crash) via a long HTTP OPTIONS request.
|
[] | null | null | null | null | null |
|
GHSA-7fpg-fmpq-xxg2
|
Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
|
[] | null | null | null | null | null |
|
GHSA-wprr-mc54-c62q
|
Exposure of Sensitive Information in Plone
|
The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope.
|
[] | 6.9 | 5.3 | null | null | null |
GHSA-49xh-hg4f-jcq3
|
The magic-fields plugin before 1.7.2 for WordPress has XSS via the RCCWP_CreateCustomFieldPage.php custom-group-id parameter.
|
[] | null | null | null | null | null |
|
GHSA-qf7x-5whr-gj84
|
Directory traversal vulnerability in the wallpaper parsing functionality in Barco ClickShare CSC-1 devices with firmware before 01.09.03, CSM-1 devices with firmware before 01.06.02, and CSE-200 devices with firmware before 01.03.02 allows remote attackers to read /etc/shadow via unspecified vectors.
|
[] | null | null | 7.5 | null | null |
|
GHSA-jx35-69vw-mrr7
|
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote authenticated users to reset the passwords of arbitrary administrative accounts via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2012-0011
|
Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "HTML Layout Remote Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2022-44838
|
Automotive Shop Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /services/view_service.php.
|
[
"cpe:2.3:a:automotive_shop_management_system_project:automotive_shop_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-xq32-4fhv-g5h5
|
Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28466.
|
[] | null | 7.8 | null | null | null |
|
CVE-2018-14613
|
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 7.1 | null |
|
CVE-2021-32774
|
Cross-Site Request Forgery (CSRF) in DataDump
|
DataDump is a MediaWiki extension that provides dumps of wikis. Prior to commit 67a82b76e186925330b89ace9c5fd893a300830b, DataDump had no protection against CSRF attacks so requests to generate or delete dumps could be forged. The vulnerability was patched in commit 67a82b76e186925330b89ace9c5fd893a300830b. There are no known workarounds. You must completely disable DataDump.
|
[
"cpe:2.3:a:miraheze:datadump:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2019-2060
|
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112709994
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2024-2409
|
The MasterStudy LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.3.1. This is due to insufficient validation checks within the _register_user() function called by the 'wp_ajax_nopriv_stm_lms_register' AJAX action. This makes it possible for unauthenticated attackers to register a user with administrator-level privileges when MasterStudy LMS Pro is installed and the LMS Forms Editor add-on is enabled.
|
[
"cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-mwp6-j9wf-968c
|
Critical severity vulnerability that affects generator-jhipster
|
Account takeover and privilege escalation is possible in applications generated by generator-jhipster before 6.3.0. This is due to a vulnerability in the generated java classes: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)Generated applications must be manually patched, following instructions in the release notes: https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html
|
[] | null | 9.8 | null | null | null |
PYSEC-2019-12
| null |
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
|
[] | null | null | null | null | null |
CVE-2011-5267
|
Multiple cross-site scripting (XSS) vulnerabilities in spell-check-savedicts.php in the SpellChecker module in Xinha, as used in WikiWig 5.01 and possibly other products, allow remote attackers to inject arbitrary web script or HTML via the (1) to_p_dict or (2) to_r_list parameter. NOTE: this issue might be related to the htmlarea plugin and CVE-2013-5670.
|
[
"cpe:2.3:a:wikiwig_project:wikiwig:5.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-24678
|
WordPress Listamester Plugin <= 2.3.4 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Listamester Listamester allows Stored XSS. This issue affects Listamester: from n/a through 2.3.4.
|
[] | null | 6.5 | null | null | null |
GHSA-92g4-6xjf-gvgm
|
Teradici PCoIP Graphics Agent for Windows prior to 21.03 does not validate NVENC.dll. An attacker could replace the .dll and redirect pixels elsewhere.
|
[] | null | null | null | null | null |
|
CVE-2022-0593
|
Login with phone number < 1.3.7 - Unauthenticated remote plugin deletion
|
The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation.
|
[
"cpe:2.3:a:idehweb:login_with_phone_number:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 6.4 | null |
CVE-2006-3486
|
Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability
|
[
"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-994r-w2xc-hgf2
|
The pixelstats plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post_id' and 'sortby' parameters in all versions up to, and including, 0.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
|
GHSA-v63c-pgjm-vxv9
|
In the Linux kernel, the following vulnerability has been resolved:md: Don't ignore read-only array in md_check_recovery()Usually if the array is not read-write, md_check_recovery() won't
register new sync_thread in the first place. And if the array is
read-write and sync_thread is registered, md_set_readonly() will
unregister sync_thread before setting the array read-only. md/raid
follow this behavior hence there is no problem.After commit f52f5c71f3d4 ("md: fix stopping sync thread"), following
hang can be triggered by test shell/integrity-caching.sh:array is read-only. dm-raid update super block:
rs_update_sbs
ro = mddev->ro
mddev->ro = 0
-> set array read-write
md_update_sbregister new sync thread concurrently.dm-raid set array back to read-only:
rs_update_sbs
mddev->ro = rostop the array:
raid_dtr
md_stop
stop_sync_thread
set_bit(MD_RECOVERY_INTR, &mddev->recovery);
md_wakeup_thread_directly(mddev->sync_thread);
wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))sync thread done:
md_do_sync
set_bit(MD_RECOVERY_DONE, &mddev->recovery);
md_wakeup_thread(mddev->thread);daemon thread can't unregister sync thread:
md_check_recovery
if (!md_is_rdwr(mddev) &&
!test_bit(MD_RECOVERY_NEEDED, &mddev->recovery))
return;
-> -> MD_RECOVERY_RUNNING can't be cleared, hence step 4 hang;The root cause is that dm-raid manipulate 'mddev->ro' by itself,
however, dm-raid really should stop sync thread before setting the
array read-only. Unfortunately, I need to read more code before I
can refacter the handler of 'mddev->ro' in dm-raid, hence let's fix
the problem the easy way for now to prevent dm-raid regression.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2013:1302
|
Red Hat Security Advisory: xinetd security and bug fix update
|
xinetd: enables unintentional services over tcpmux port
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-4mqm-8w5p-8gjq
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Media File Renamer: Rename Files (Manual, Auto & AI).This issue affects Media File Renamer: Rename Files (Manual, Auto & AI): from n/a through 5.6.9.
|
[] | null | 6.5 | null | null | null |
|
cisco-sa-20181107-vsms-dos
|
Cisco Video Surveillance Media Server Denial of Service Vulnerability
|
A vulnerability in the web-based management interface of Cisco Video Surveillance Media Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the web-based management interface of an affected system.
The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to cause the web-based management interface to become unreachable, resulting in a DoS condition.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vsms-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vsms-dos"]
|
[] | null | null | 4.3 | null | null |
GHSA-hv74-3r93-2vw8
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
|
[] | null | null | null | null | null |
|
GHSA-q7r2-4w32-9vg9
|
Unrestricted file upload vulnerability in pfs.php in Neocrome Seditio 121 and earlier allows remote authenticated users to upload arbitrary PHP code via a filename ending with (1) .php.gif, (2) .php.jpg, or (3) .php.png.
|
[] | null | null | null | null | null |
|
CVE-2024-2026
|
The Passster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's content_protector shortcode in all versions up to, and including, 4.2.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
RHSA-2021:0088
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null | null |
GHSA-44f9-2mmc-8wmx
|
The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file.
|
[] | null | null | 9.8 | null | null |
|
CVE-2017-1459
|
IBM Security Access Manager Appliance 8.0.0 and 9.0.0 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 128378.
|
[
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_web_appliance:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_mobile:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_mobile_appliance:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_9.0_firmware:*:*:*:*:*:*:*:*"
] | null | null | 4.2 | 4.9 | null |
|
CVE-2024-11443
|
de:branding <= 1.0.2 - Authenticated (Subscriber+) Arbitrary Options Update
|
The de:branding plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the debranding_save() function in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
|
[] | null | 8.8 | null | null | null |
CVE-2023-45135
|
XWiki users can be tricked to execute scripts as the create page action doesn't display the page's title
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In `org.xwiki.platform:xwiki-platform-web` versions 7.2-milestone-2 until 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, it is possible to pass a title to the page creation action that isn't displayed at first but then executed in the second step. This can be used by an attacker to trick a victim to execute code, allowing script execution if the victim has script right or remote code execution including full access to the XWiki instance if the victim has programming right.
For the attack to work, the attacker needs to convince the victim to visit a link like `<xwiki-host>/xwiki/bin/create/NonExistingSpace/WebHome?title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)` where `<xwiki-host>` is the URL of the Wiki installation and to then click on the "Create" button on that page. The page looks like a regular XWiki page that the victim would also see when clicking the button to create a page that doesn't exist yet, the malicious code is not displayed anywhere on that page. After clicking the "Create" button, the malicious title would be displayed but at this point, the code has already been executed and the attacker could use this code also to hide the attack, e.g., by redirecting the victim again to the same page with an innocent title. It thus seems plausible that this attack could work if the attacker can place a fake "create page" button on a page which is possible with edit right.
This has been patched in `org.xwiki.platform:xwiki-platform-web` version 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by displaying the title already in the first step such that the victim can notice the attack before continuing. It is possible to manually patch the modified files from the patch in an existing installation. For the JavaScript change, the minified JavaScript file would need to be obtained from a build of XWiki and replaced accordingly.
|
[
"cpe:2.3:a:xwiki:xwiki-platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:7.2:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:7.2:milestone3:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
GHSA-jj8r-7qwj-px26
|
Untrusted search path vulnerability in ALSee 6.20.0.1 allows local users to gain privileges via a Trojan horse patchani.dll file in the current working directory, as demonstrated by a directory that contains a .ani, .bmp, .cal, .hdp, .jpe, .mac, .pbm, .pcx, .pgm, .png, .psd, .ras, .tga, or .tiff file. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2006-0644
|
Multiple directory traversal vulnerabilities in install.php in CPG-Nuke Dragonfly CMS (aka CPG Dragonfly CMS) 9.0.6.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in (1) the newlang parameter and (2) the installlang parameter in a cookie, as demonstrated by using error.php to insert malicious code into a log file, or uploading a malicious .png file, which is then included using install.php.
|
[
"cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.6_.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-24533
|
Maintenance < 4.03 - Authenticated Stored XSS
|
The Maintenance WordPress plugin before 4.03 does not sanitise or escape some of its settings, allowing high privilege users such as admin to se Cross-Site Scripting payload in them (even when the unfiltered_html capability is disallowed), which will be triggered in the frontend
|
[
"cpe:2.3:a:webfactoryltd:maintenance:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 | null |
CVE-2023-51887
|
Command Injection vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in application URL.
|
[
"cpe:2.3:a:ctan:mathtex:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-wprm-8qf4-xrc8
|
A vulnerability, which was classified as problematic, has been found in Campcodes Online Job Finder System 1.0. Affected by this issue is some unknown functionality of the file /admin/category/index.php. The manipulation of the argument view leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257384.
|
[] | null | 3.5 | null | null | null |
|
GHSA-g26g-x8f8-2wgw
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability."
|
[] | null | 7.8 | null | null | null |
|
GHSA-w7hh-rr9c-v4j6
|
The Customizer Export/Import WordPress plugin before 0.9.6 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present
|
[] | null | 7.2 | null | null | null |
|
CVE-2021-39118
|
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to discover the usernames and full names of users via an enumeration vulnerability in the /rest/api/1.0/render endpoint. The affected versions are before version 8.19.0.
|
[
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-9562-p32f-jq35
|
A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious preference values. Control of arbitrary preferences can lead to sufficient compromise such that it is generally equivalent to arbitrary code execution.<br> *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.7.
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-20551
|
An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. Attackers can bypass Factory Reset Protection (FRP) via a Class 0 Type Message. The Samsung ID is SVE-2019-14941 (October 2019).
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-0082
|
CVE
|
NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause improper privilege management by sending open file requests to the application. A successful exploit of this vulnerability might lead to local escalation of privileges, information disclosure, and data tampering
|
[
"cpe:2.3:a:nvidia:chatrtx:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
CVE-2018-18082
|
XSS exists in Waimai Super Cms 20150505 via the fname parameter to the admin.php?m=Food&a=addsave or admin.php?m=Food&a=editsave URI.
|
[
"cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-q6h5-qrfw-97jg
|
Multiple SQL injection vulnerabilities in ASPPortal 3.1.1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the downloadid parameter in download_click.asp and (2) content_ID parameter in news/News_Item.asp; authenticated administrators can also conduct attacks via (3) user_id parameter to users/add_edit_user.asp, (4) bannerid parameter to banner_adds/banner_add_edit.asp, (5) cat_id parameter to categories/add_edit_cat.asp, (6) Content_ID parameter to News/add_edit_news.asp, (7) download_id parameter to downloads/add_edit_download.asp, (8) Poll_ID parameter to poll/add_edit_poll.asp, (9) contactid parameter to contactus/contactus_add_edit.asp, (10) sortby parameter to poll/poll_list.asp, and (11) unspecified inputs to downloads/add_edit_download.asp.
|
[] | null | null | null | null | null |
|
GHSA-w53q-p36j-4538
|
Integer underflow in some Zoom Workplace Apps may allow an authenticated user to conduct a denial of service via network access.
|
[] | null | 6.5 | null | null | null |
|
CVE-2007-4492
|
Multiple unspecified vulnerabilities in the ata disk driver in Sun Solaris 8, 9, and 10 on the x86 platform before 20070821 allow local users to cause a denial of service (system panic) via unspecified ioctl functions, aka Bug 6433123.
|
[
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
CVE-2020-2320
|
Jenkins Plugin Installation Manager Tool 2.1.3 and earlier does not verify plugin downloads.
|
[
"cpe:2.3:a:jenkins:installation_manager_tool:*:*:*:*:*:jenkins:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-xx6g-jj35-pxjv
|
Cross Site Scripting vulnerability in wsgidav when directory browsing is enabled
|
ImpactImplementations using this library with directory browsing enabled may be susceptible to [Cross Site Scripting (XSS)](https://owasp.org/www-community/attacks/xss/) attacks.PatchesUsers can upgrade to v4.1.0WorkaroundsSet `dir_browser.enable = False` in the configuration. For instance, when using a Python dictionary to configure the library:For more informationNote that an attacker cannot exploit this vulnerability, by simply uploading a file or folder with a manipulated file name.
However if the WsgiDAV library is used in a scenario where untrusted data is displayed in the directory browser's user interface (e.g. 'realm' or user name, ...) XSS may happen.If you have any questions or comments about this advisory:Open an issue in [mar10/wsgidav](https://github.com/mar10/wsgidav/)See the [security policy](https://github.com/mar10/wsgidav/security/policy)
|
[] | null | 8.2 | null | null | null |
CVE-2012-3599
|
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
RHSA-2010:0459
|
Red Hat Security Advisory: openoffice.org security update
|
openoffice.org Execution of Python code when browsing macros
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null | null |
GHSA-cwj2-353m-w5fv
|
Stack-based buffer overflow in the NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 allows remote attackers to execute arbitrary code via crafted HTTP header data.
|
[] | null | null | null | null | null |
|
GHSA-gjm9-qjc7-5g2h
|
index.php?r=site%2Flogin in EduSec through 4.2.6 does not restrict sending a series of LoginForm[username] and LoginForm[password] parameters, which might make it easier for remote attackers to obtain access via a brute-force approach.
|
[] | null | null | 9.8 | null | null |
|
RHSA-2022:1361
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement&bugfix update
|
golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang.org/x/crypto: empty plaintext packet causes panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
|
[
"cpe:/a:redhat:openshift_data_foundation:4.10::el8"
] | null | 4.8 | null | null | null |
CVE-2014-0058
|
The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.
|
[
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
CVE-2006-6776
|
Multiple SQL injection vulnerabilities in Future Internet allow remote attackers to execute arbitrary SQL commands via the (1) newsId or (2) categoryid parameter in a Portal.Showpage action in index.cfm, or (3) the langId parameter in index.cfm.
|
[
"cpe:2.3:a:future_internet:future_internet:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-55vh-84h5-w3p4
|
A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/edit_category.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235247.
|
[] | null | null | 3.5 | null | null |
|
CVE-2024-31162
|
ASUS Download Master - OS Command Injection
|
The specific function parameter of ASUS Download Master does not properly filter user input. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device.
|
[
"cpe:2.3:a:asus:download_master:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2007-2073
|
PHP remote file inclusion vulnerability in index.php in Ivan Gallery Script 0.3 allows remote attackers to execute arbitrary PHP code via a URL in the gallery parameter in a new session.
|
[
"cpe:2.3:a:ivan_gallery_script:ivan_gallery_script:0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-3988
|
Signal Messenger for Android 4.24.8 may expose private information when using "disappearing messages." If a user uses the photo feature available in the "attach file" menu, then Signal will leave the picture in its own cache directory, which is available to any application on the system.
|
[
"cpe:2.3:a:signal:private_messenger:4.24.8:*:*:*:*:android:*:*"
] | null | null | 3.3 | null | null |
|
GHSA-w7hr-2cw5-qqgq
|
The 17046 Ethernet card before 94450214LFMT100SEM-L.R3-CL for the GE Digital Energy Hydran M2 does not properly generate random values for TCP Initial Sequence Numbers (ISNs), which makes it easier for remote attackers to spoof packets by predicting these values.
|
[] | null | null | null | null | null |
|
CVE-2021-40787
|
Adobe Premiere Elements M4A file memory corruption vulnerability could lead to arbitrary code execution
|
Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
|
[
"cpe:2.3:a:adobe:premiere_elements:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-mp2f-25wx-mmj7
|
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the AMQP dissector could crash. This was addressed in epan/dissectors/packet-amqp.c by checking for successful list dissection.
|
[] | null | null | 7.5 | null | null |
|
GHSA-q97p-69vq-fvh2
|
Unrestricted file upload vulnerability in plog-admin/plog-upload.php in Plogger 1.0 RC1 and earlier allows remote authenticated users to execute arbitrary code by uploading a ZIP file that contains a PHP file and a non-zero length PNG file, then accessing the PHP file via a direct request to it in plog-content/uploads/archive/.
|
[] | null | null | null | null | null |
|
CVE-2018-7712
|
The validateInputImageSize function in modules/imgcodecs/src/loadsave.cpp in OpenCV 3.4.1 allows remote attackers to cause a denial of service (assertion failure) because (size.height <= (1<<20)) may be false. Note: “OpenCV CV_Assert is not an assertion (C-like assert()), it is regular C++ exception which can raised in case of invalid or non-supported parameters.
|
[
"cpe:2.3:a:opencv:opencv:3.4.1:*:*:*:*:*:*:*"
] | null | 7.5 | 7.5 | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.