id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2021-47537
|
octeontx2-af: Fix a memleak bug in rvu_mbox_init()
|
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: Fix a memleak bug in rvu_mbox_init()
In rvu_mbox_init(), mbox_regions is not freed or passed out
under the switch-default region, which could lead to a memory leak.
Fix this bug by changing 'return err' to 'goto free_regions'.
This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.
Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.
Builds with CONFIG_OCTEONTX2_AF=y show no new warnings,
and our static analyzer no longer warns about this code.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
ICSA-18-158-01
|
Rockwell Automation RSLinx Classic and FactoryTalk Linx Gateway
|
An unquoted search path or element may allow an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation.CVE-2018-10619 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.8 | null | null |
CVE-2025-47988
|
Azure Monitor Agent Remote Code Execution Vulnerability
|
Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.
|
[] | null | 7.5 | null | null | null |
GHSA-wpx2-5m9q-j3g7
|
In the Linux kernel, the following vulnerability has been resolved:KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCUIf allocating a new instance of an I/O bus fails when unregistering a
device, wait to destroy the device until after all readers are guaranteed
to see the new null bus. Destroying devices before the bus is nullified
could lead to use-after-free since readers expect the devices on their
reference of the bus to remain valid.
|
[] | null | 7.8 | null | null | null |
|
GHSA-whv6-rj84-2vh2
|
Cross-Site Scripting in nextcloud-vue-collections
|
Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's browser.RecommendationUpgrade to version 0.4.2 or later.
|
[] | null | null | null | null | null |
CVE-2002-1019
|
The library feature for Adobe Content Server 3.0 allows a remote attacker to check out an eBook for an arbitrary length of time via a modified loanMin parameter to download.asp.
|
[
"cpe:2.3:a:adobe:adobe_content_server:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-pxgr-9vwp-grpq
|
Cross-site scripting (XSS) vulnerability in the Monster Menus module 7.x-1.x before 7.x-1.12 for Drupal allows remote authenticated users with permissions to add pages to inject arbitrary web script or HTML via a title in the page settings.
|
[] | null | null | null | null | null |
|
GHSA-5fv4-m5x3-j32p
|
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
|
[] | null | null | null | null | null |
|
CVE-2019-13071
|
CSRF in the Agent/Center component of CyberPower PowerPanel Business Edition 3.4.0 allows an attacker to submit POST requests to any forms in the web application. This can be exploited by tricking an authenticated user into visiting an attacker controlled web page.
|
[
"cpe:2.3:a:cyberpowersystems:powerpanel:3.4.0:*:*:*:business:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2020-3747
|
Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2025-27306
|
WordPress Pathomation plugin <= 2.5.1 - Stored Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pathomation Pathomation allows Stored XSS. This issue affects Pathomation: from n/a through 2.5.1.
|
[] | null | 6.5 | null | null | null |
CVE-2022-22736
|
If Firefox was installed to a world-writable directory, a local privilege escalation could occur when Firefox searched the current directory for system libraries. However the install directory is not world-writable by default.<br>*This bug only affects Firefox for Windows in a non-default installation. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
RHSA-2024:1574
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.3 | null | null | null |
RHSA-2024:6239
|
Red Hat Security Advisory: resource-agents security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 4.4 | null | null | null |
GHSA-52ch-ghxv-66qc
|
An improper neutralization of special elements used in an os command ('OS Command Injection') [CWE-78] in FortiWeb 7.0.0 through 7.0.1, 6.3.0 through 6.3.19, 6.4 all versions may allow an authenticated attacker to execute arbitrary shell code as `root` user via crafted HTTP requests.
|
[] | null | 8.8 | null | null | null |
|
GHSA-5q4q-957p-wvvc
|
Multiple cross-site scripting (XSS) vulnerabilities in MetalGenix GeniXCMS before 0.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter in the categories page to gxadmin/index.php or (2) page parameter to index.php.
|
[] | null | null | null | null | null |
|
GHSA-rw2q-93pv-wvmq
|
DOSBox 0.74-2 has Incorrect Access Control.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-38951
|
ZKTeco BioTime 8.5.5 through 9.x before 9.0.1 (20240617.19506) allows authenticated attackers to create or overwrite arbitrary files on the server via crafted requests to /base/sftpsetting/ endpoints that abuse a path traversal issue in the Username field and a lack of input sanitization on the SSH Key field. Overwriting specific files may lead to arbitrary code execution as NT AUTHORITY\SYSTEM.
|
[
"cpe:2.3:a:zkteco:biotime:8.5.5:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2021-24631
|
Unlimited PopUps <= 4.5.3 - Author+ SQL Injection
|
The Unlimited PopUps WordPress plugin through 4.5.3 does not sanitise or escape the did GET parameter before using it in a SQL statement, available to users as low as editor, leading to an authenticated SQL Injection
|
[
"cpe:2.3:a:unlimited_popups_project:unlimited_popups:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 | null |
GHSA-6657-9743-4mc6
|
Tribal Systems Zenario CMS vulnerable to Session Fixation
|
Tribal Systems Zenario CMS 9.3.57595 is vulnerable to session fixation. In Zenario CMS, the user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after user logout and login again into the application when "Remember me" option active. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with. The attack may be initiated remotely and an exploit has been disclosed.
|
[] | null | 5.4 | null | null | null |
GHSA-prj6-hx5v-v39w
|
In setRequirePmfInternal of sta_network.cpp, there is a possible default value being improperly applied due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142797954
|
[] | null | null | null | null | null |
|
RHSA-2010:0125
|
Red Hat Security Advisory: systemtap security update
|
systemtap: Crash with systemtap script using __get_argv()
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-52vj-mgh7-f6r4
|
A password for accessing a WWW URL is guessable.
|
[] | null | null | null | null | null |
|
CVE-2025-30731
|
Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data as well as unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
|
[] | null | 3.6 | null | null | null |
|
GHSA-cpqm-vp2r-5676
|
ILIAS 7.21 and 8.0_beta1 through 8.2 is vulnerable to reflected Cross-Site Scripting (XSS).
|
[] | null | 6.1 | null | null | null |
|
GHSA-wx53-3c9r-58r2
|
A stack-based buffer overflow in the Command Centre Server allows an attacker to cause a denial of service attack via assigning cardholders to an Access Group.This issue affects Command Centre: vEL8.80 prior to vEL8.80.1192 (MR2)
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-7298
|
In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (which could be obtained via DNS spoofing of www.meine-homematic.de or other approaches) can exploit this issue in order to provide arbitrary malicious firmware updates to the CCU2. This can result in a full system compromise.
|
[
"cpe:2.3:o:eq-3:homematic_central_control_unit_ccu2_firmware:2.29.22:*:*:*:*:*:*:*",
"cpe:2.3:h:eq-3:homematic_central_control_unit_ccu2:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | 9.3 | null |
|
CVE-2024-3377
|
SourceCodester Computer Laboratory Management System cross site scripting
|
A vulnerability classified as problematic was found in SourceCodester Computer Laboratory Management System 1.0. This vulnerability affects unknown code of the file /classes/SystemSettings.php?f=update_settings. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259498 is the identifier assigned to this vulnerability.
|
[] | null | 4.3 | 4.3 | 5 | null |
GHSA-9398-vwrg-v86m
|
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.4. A malicious application may be able to execute arbitrary code with kernel privileges.
|
[] | null | null | null | null | null |
|
CVE-2020-15483
|
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The physical UART debug port provides a shell, without requiring a password, with complete access.
|
[
"cpe:2.3:o:niscomed:m1000_multipara_patient_monitor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:niscomed:m1000_multipara_patient_monitor:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | 7.2 | null |
|
CVE-2018-11836
|
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper length check can lead to out-of-bounds access in WLAN function.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2021-0348
|
In vpu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11; Patch ID: ALPS05349201.
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | 7.2 | null |
|
GHSA-69m6-42x6-85hc
|
A double free in cleanup_index in index.c in Halibut 1.2 allows an attacker to cause a denial of service or possibly have other unspecified impact via a crafted text document.
|
[] | null | 7.8 | null | null | null |
|
CVE-2019-1356
|
An information disclosure vulnerability exists when Microsoft Edge based on Edge HTML improperly handles objects in memory, aka 'Microsoft Edge based on Edge HTML Information Disclosure Vulnerability'.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2015-8036
|
Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session. NOTE: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges.
|
[
"cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-fhm6-vp9j-33f9
|
A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.
|
[] | null | 8.1 | null | null | null |
|
GHSA-q6r8-7f8c-3669
|
A vulnerability classified as critical has been found in PHPGurukul Medical Card Generation System 1.0. This affects an unknown part of the file /admin/edit-card-detail.php of the component Managecard Edit Card Detail Page. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 4.7 | null | null | null |
|
CVE-2007-4262
|
Unrestricted file upload vulnerability in EZPhotoSales 1.9.3 and earlier allows remote authenticated administrators to upload and execute arbitrary PHP code under OnlineViewing/galleries/.
|
[
"cpe:2.3:a:ez_photo_sales:ez_photo_sales:*:*:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
CVE-2023-3953
|
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory
Buffer vulnerability exists that could cause memory corruption when an authenticated user
opens a tampered log file from GP-Pro EX.
|
[
"cpe:2.3:a:schneider-electric:pro-face_gp-pro_ex:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2002-1484
|
DB4Web server, when configured to use verbose debug messages, allows remote attackers to use DB4Web as a proxy and attempt TCP connections to other systems (port scan) via a request for a URL that specifies the target IP address and port, which produces a connection status in the resulting error message.
|
[
"cpe:2.3:a:siemens:db4web:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:db4web:3.6:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-p6m4-p35j-fc6j
|
IBM Jazz Foundation (IBM Rational Collaborative Lifecycle Management 5.0 and 6.0) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133127.
|
[] | null | null | 5.4 | null | null |
|
CVE-2013-4171
|
Multiple cross-site scripting (XSS) vulnerabilities in Apache Roller before 5.0.2 allow remote attackers to inject arbitrary web script or HTML via vectors related to the search results in the (1) RSS and (2) Atom feed templates.
|
[
"cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:roller:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:roller:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:roller:5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2005-3298
|
Multiple buffer overflows in OpenWBEM on SuSE Linux 9 allow remote attackers to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-1000431
|
eZ Systems eZ Publish version 5.4.0 to 5.4.9, and 5.3.12 and older, is vulnerable to an XSS issue in the search module, resulting in a risk of attackers injecting scripts which may e.g. steal authentication credentials.
|
[
"cpe:2.3:a:ez:ez_publish:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-6gx7-hq95-pp94
|
IBM Robotic Process Automation with Automation Anywhere 11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152671.
|
[] | null | null | 5.4 | null | null |
|
CVE-2024-1551
|
Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
|
[] | null | 6.1 | null | null | null |
|
GHSA-mv62-4r83-58qq
|
SLIMS (Senayan Library Management Systems) 9 Bulian v9.6.1 is vulnerable to SQL Injection via pop-scope-vocabolary.php.
|
[] | null | 4.9 | null | null | null |
|
GHSA-3874-c4vv-qxvf
|
Cross-site scripting (XSS) vulnerability in the PDF functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL in embedded PDF content.
|
[] | null | null | null | null | null |
|
GHSA-5899-79wg-h9p9
|
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Private Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 8.1 (Confidentiality and Integrity impacts).
|
[] | null | null | 8.1 | null | null |
|
GHSA-8jjv-wx3r-m7x9
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jewel Theme WP Adminify plugin <= 3.1.6 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-r6m2-74p6-hm2h
|
Multiple SQL injection vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote administrators to execute arbitrary SQL commands via the (1) jak_delete_log[] or (2) ssp parameter to admin/index.php.
|
[] | null | null | null | null | null |
|
CVE-2020-28902
|
Command Injection in Nagios Fusion 4.1.8 and earlier allows Privilege Escalation from apache to root in cmd_subsys.php.
|
[
"cpe:2.3:a:nagios:fusion:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-31311
|
In increment_annotation_count of stats_event.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
|
GHSA-w2cw-x77x-6h5f
|
Missing Authorization vulnerability in Team Plugins360 All-in-One Video Gallery.This issue affects All-in-One Video Gallery: from n/a through 3.5.2.
|
[] | null | 4.3 | null | null | null |
|
GHSA-97cq-v4mw-v427
|
The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Age Gate widget in all versions up to, and including, 5.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2022-41773
|
Delta Electronics DIAEnergie
|
The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a SQL injection that exists in CheckDIACloud. A low-privileged authenticated attacker could exploit this issue to inject arbitrary SQL queries.
|
[
"cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2009-4999
|
Cross-site scripting (XSS) vulnerability in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 3.5.1 before 3.5.1-016 allows remote attackers to inject arbitrary web script or HTML via the Name field.
|
[
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:001:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:002:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:003:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:004:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:005:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:006:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:007:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:008:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:009:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:010:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:011:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:012:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:013:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:014:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:015:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-1999-0283
|
The Java Web Server would allow remote users to obtain the source code for CGI programs.
|
[] | null | null | null | 10 | null |
|
CVE-2023-45629
|
WordPress Responsive Image Gallery, Gallery Album Plugin <= 2.0.3 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 versions.
|
[
"cpe:2.3:a:wpdevart:gallery_-_image_and_video_gallery_with_thumbnails:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2010-0335
|
Cross-site scripting (XSS) vulnerability in the Vote rank for news (vote_for_tt_news) extension 1.0.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:francisco_cifuentes:vote_for_tt_news:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2006-5916
|
Intego VirusBarrier X4 allows context-dependent attackers to bypass virus protection by quickly injecting many infected files into the filesystem, which prevents VirusBarrier from processing all the files.
|
[
"cpe:2.3:a:intego:virusbarrier:x4:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-7896-9859-h9rc
|
In the Linux kernel, the following vulnerability has been resolved:ACPI: scan: Fix a memory leak in an error handling pathIf 'acpi_device_set_name()' fails, we must free
'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.
|
[] | null | 5.5 | null | null | null |
|
GHSA-wh5j-hw7g-r9fm
|
The myCred WordPress plugin before 1.7.8 does not sanitise and escape the user parameter before outputting it back in the Points Log admin dashboard, leading to a Reflected Cross-Site Scripting
|
[] | null | null | null | null | null |
|
GHSA-3cvr-822r-rqcc
|
undici before v5.8.0 vulnerable to CRLF injection in request headers
|
ImpactIt is possible to inject CRLF sequences into request headers in Undici.The same applies to `path` and `method`PatchesUpdate to v5.8.0WorkaroundsSanitize all HTTP headers from untrusted sources to eliminate `\r\n`.Referenceshttps://hackerone.com/reports/409943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116For more informationIf you have any questions or comments about this advisory:Open an issue in [undici repository](https://github.com/nodejs/undici/issues)To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document
|
[] | null | 5.3 | null | null | null |
CVE-2006-4232
|
Race condition in the grid-proxy-init tool in Globus Toolkit 3.2.x, 4.0.x, and 4.1.0 before 20060815 allows local users to steal credential data by replacing the proxy credentials file in between file creation and the check for exclusive file access.
|
[
"cpe:2.3:a:globus:globus_toolkit:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:globus:globus_toolkit:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:globus:globus_toolkit:4.1.0:*:*:*:*:*:*:*"
] | null | null | null | 1.2 | null |
|
CVE-2008-5062
|
Directory traversal vulnerability in php/cal_pdf.php in Mini Web Calendar (mwcal) 1.2 allows remote attackers to read arbitrary files via directory traversal sequences in the thefile parameter.
|
[
"cpe:2.3:a:smolinari:mini_web_calendar:1.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2015-5549
|
Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5552, and CVE-2015-5553.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-7p6j-x2wj-cw7w
|
Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Style Remote Code Execution Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2015-4431
|
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, and CVE-2015-3134.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-prg5-hg25-8grq
|
Ability to switch channels via GET parameter enabled in production environments
|
ImpactThis vulnerability gives the ability to switch channels via the `_channel_code` GET parameter in production environments. This was meant to be enabled only when `%kernel.debug%` is set to true.However, if no `sylius_channel.debug` is set explicitly in the configuration, the default value which is `%kernel.debug%` will be not resolved and cast to boolean, enabling this debug feature even if that parameter is set to false.PatchesPatch has been provided for Sylius 1.3.x and newer - **1.3.16, 1.4.12, 1.5.9, 1.6.5**. Versions older than 1.3 are not covered by our security support anymore.WorkaroundsUnsupported versions could be patched by adding the following configuration to run in production:
|
[] | null | 4.4 | null | null | null |
CVE-2021-41158
|
FreeSWITCH vulnerable to SIP digest leak for configured gateways
|
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, an attacker can perform a SIP digest leak attack against FreeSWITCH and receive the challenge response of a gateway configured on the FreeSWITCH server. This is done by challenging FreeSWITCH's SIP requests with the realm set to that of the gateway, thus forcing FreeSWITCH to respond with the challenge response which is based on the password of that targeted gateway. Abuse of this vulnerability allows attackers to potentially recover gateway passwords by performing a fast offline password cracking attack on the challenge response. The attacker does not require special network privileges, such as the ability to sniff the FreeSWITCH's network traffic, to exploit this issue. Instead, what is required for this attack to work is the ability to cause the victim server to send SIP request messages to the malicious party. Additionally, to exploit this issue, the attacker needs to specify the correct realm which might in some cases be considered secret. However, because many gateways are actually public, this information can easily be retrieved. The vulnerability appears to be due to the code which handles challenges in `sofia_reg.c`, `sofia_reg_handle_sip_r_challenge()` which does not check if the challenge is originating from the actual gateway. The lack of these checks allows arbitrary UACs (and gateways) to challenge any request sent by FreeSWITCH with the realm of the gateway being targeted. This issue is patched in version 10.10.7. Maintainers recommend that one should create an association between a SIP session for each gateway and its realm to make a check be put into place for this association when responding to challenges.
|
[
"cpe:2.3:a:freeswitch:freeswitch:*:*:*:*:*:*:*:*"
] | null | 5.8 | null | null | null |
GHSA-58p6-fr22-mj6w
|
Multiple cross-site scripting (XSS) vulnerabilities in BlueCollar i-Gallery 3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) n or (2) d parameter in igallery.asp, or (3) an unspecified parameter related to search, possibly the Search Gallery field, or the myquery parameter, in search.asp. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-7c95-7m79-qf33
|
An issue was dicovered in vtiger crm 7.2. Union sql injection in the calendar exportdata feature.
|
[] | null | null | null | null | null |
|
CVE-2021-0262
|
Junos OS: QFX10002-60C: Use after free vulnerability found during static code analysis
|
Through routine static code analysis of the Juniper Networks Junos OS software codebase, the Secure Development Life Cycle team identified a Use After Free vulnerability in PFE packet processing on the QFX10002-60C switching platform. Exploitation of this vulnerability may allow a logically adjacent attacker to trigger a Denial of Service (DoS). Continued exploitation of this vulnerability will sustain the Denial of Service (DoS) condition. This issue only affects QFX10002-60C devices. No other product or platform is vulnerable to this issue. This issue affects Juniper Networks Junos OS on QFX10002-60C: 19.1 version 19.1R3-S1 and later versions; 19.1 versions prior to 19.1R3-S3; 19.2 version 19.2R2 and later versions; 19.2 versions prior to 19.2R3-S1; 20.2 versions prior to 20.2R1-S2. This issue does not affect Juniper Networks Junos OS: versions prior to 19.1R3; 19.2 versions prior to 19.2R2; any version of 19.3; version 20.2R2 and later releases.
|
[
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2025-5361
|
Campcodes Online Hospital Management System contact.php sql injection
|
A vulnerability, which was classified as critical, has been found in Campcodes Online Hospital Management System 1.0. This issue affects some unknown processing of the file /contact.php. The manipulation of the argument fullname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2025-45737
|
An issue in NetEase (Hangzhou) Network Co., Ltd NeacSafe64 Driver before v1.0.0.8 allows attackers to escalate privileges via sending crafted IOCTL commands to the NeacSafe64.sys component.
|
[] | null | 6.5 | null | null | null |
|
CVE-2022-43366
|
IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to access sensitive information via the checkLoginUser, ate, telnet, version, setDebugCfg, and boot interfaces.
|
[
"cpe:2.3:o:ip-com:ew9_firmware:15.11.0.14:*:*:*:*:*:*:*",
"cpe:2.3:h:ip-com:ew9:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2021-3345
|
_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
|
[
"cpe:2.3:a:gnupg:libgcrypt:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2023-27130
|
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via an arbitrarily supplied URL parameter.
|
[
"cpe:2.3:a:typecho:typecho:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
|
CVE-2021-38690
|
Stack Overflow Vulnerability in QVR Elite, QVR Pro and QVR Guard
|
A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QVR Elite, QVR Pro, QVR Guard: QuTS hero h5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QuTS hero h4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 4.5.4: QVR Guard 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Guard 2.1.3.0 (2021/12/06) and later
|
[
"cpe:2.3:a:qnap:qvr_elite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qvr_guard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qvr_pro:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
CVE-2018-5521
|
On F5 BIG-IP 12.1.0-12.1.3.1, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, carefully crafted URLs can be used to reflect arbitrary content into GeoIP lookup responses, potentially exposing clients to XSS.
|
[
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:11.2.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-fr5h-rqp8-mj6g
|
Next.js Server-Side Request Forgery in Server Actions
|
ImpactA Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions by security researchers at Assetnote. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself.PrerequisitesNext.js (`<14.1.1`) is running in a self-hosted* manner.The Next.js application makes use of Server Actions.The Server Action performs a redirect to a relative path which starts with a `/`.\* Many hosting providers (including Vercel) route requests based on the Host header, so we do not believe that this vulnerability affects any Next.js applications where routing is done in this manner.PatchesThis vulnerability was patched in [#62561](https://github.com/vercel/next.js/pull/62561) and fixed in Next.js `14.1.1`.WorkaroundsThere are no official workarounds for this vulnerability. We recommend upgrading to Next.js `14.1.1`.CreditVercel and the Next.js team thank Assetnote for responsibly disclosing this issue to us, and for working with us to verify the fix. Thanks to:Adam Kues - Assetnote
Shubham Shah - Assetnote
|
[] | null | 7.5 | null | null | null |
GHSA-3rjp-6929-2mrw
|
HTTP server in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51) stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain usernames and directory paths via a direct URL request.
|
[] | null | null | null | null | null |
|
GHSA-6f6j-3r46-xqfh
|
Heap buffer overflow in GPU in Google Chrome on Android prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 8.8 | null | null | null |
|
CVE-2006-4320
|
PHP remote file inclusion vulnerability in sef.php in the OpenSEF 2.0.0 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[
"cpe:2.3:a:opensef_project:opensef:2.0-beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:opensef_project:opensef:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:opensef_project:opensef:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:opensef_project:opensef:2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:opensef_project:opensef:2.0_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:opensef_project:opensef:2.0_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:opensef_project:opensef:2.0_rc5_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:opensef_project:opensef:2.0_rc5_sp2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8r4g-xwxx-qhqq
|
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.0 via deserialization of untrusted input in the 'process_entry' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
|
[] | null | 8.1 | null | null | null |
|
CVE-2014-0730
|
Cisco Unified Computing System (UCS) Central Software 1.1 and earlier allows local users to gain privileges via a CLI copy command in a local-mgmt context, aka Bug ID CSCul53128.
|
[
"cpe:2.3:a:cisco:unified_computing_system_central_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system_central_software:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2006-5304
|
PHP remote file inclusion vulnerability in inc/settings.php in IncCMS Core 1.0.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the inc_dir parameter.
|
[
"cpe:2.3:a:inccms_technology:inccms_core:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-29628
|
In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit.
|
[
"cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:beta1-p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-m98v-p9vf-rj56
|
Certain NETGEAR devices are affected by denial of service. This affects EX7500 before 1.0.0.72, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, RBRE960 before 6.0.3.68, RBSE960 before 6.0.3.68, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12.
|
[] | null | null | null | null | null |
|
GHSA-xgpm-76vc-4m4p
|
The mintToken function of a smart contract implementation for CM, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | null | 7.5 | null | null |
|
CVE-2009-1368
|
Directory traversal vulnerability in index.php in moziloCMS 1.11 allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter. NOTE: this might be the same issue as CVE-2008-6126.2, which may have been fixed in 1.10.3.
|
[
"cpe:2.3:a:mozilo:mozilocms:1.11:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-10100
|
Vulnerability in the PeopleSoft Enterprise PRTL Interaction Hub component of Oracle PeopleSoft Products (subcomponent: HTML Area). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PRTL Interaction Hub. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PRTL Interaction Hub, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PRTL Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PRTL Interaction Hub accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_prtl_interaction_hub:9.1.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 | null |
|
CVE-2022-38784
|
Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
|
[
"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-c8hq-x4mm-p6q6
|
Memory handling issues in xcb
|
An issue was discovered in the xcb crate through 2020-12-10 for Rust. base::Error does not have soundness. Because of the public ptr field, a use-after-free or double-free can occur.
|
[] | null | 5.5 | null | null | null |
GHSA-32rj-jrg6-x2qj
|
Multiple cross-site scripting (XSS) vulnerabilities in AlstraSoft Text Ads Enterprise allow remote attackers to inject arbitrary web script or HTML via the (1) r parameter to (a) forgot_uid.php, the (2) query or (3) sk parameter to (b) search_results.php, or (4) the pageId parameter to (c) website_page.php.
|
[] | null | null | null | null | null |
|
GHSA-qg5q-gxwj-cgv6
|
eScan Agent Application (MWAGENT.EXE) 4.0.2.98 in MicroWorld Technologies eScan 14.0 allows remote or local attackers to execute arbitrary commands by sending a carefully crafted payload to TCP port 2222.
|
[] | null | null | 9.8 | null | null |
|
GHSA-j868-jgmx-g49r
|
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 5.5.06, 6.0, 6.1, and 6.2 allows local users to affect confidentiality via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-rhmf-xrpg-5wj8
|
Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | null | null | null |
|
cisco-sa-lisp-3gYXs3qP
|
Cisco IOS and IOS XE Software Locator ID Separation Protocol Denial of Service Vulnerability
|
A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.
This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Note: This vulnerability could be exploited over either IPv4 or IPv6 transport.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056"].
|
[] | null | 8.6 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.