id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2025-24633 | WordPress Build Private Store For Woocommerce plugin <= 1.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in silverplugins217 Build Private Store For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Build Private Store For Woocommerce: from n/a through 1.0. | [] | null | 5.3 | null | null |
GHSA-w9v5-j4w6-fq3m | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1. | [] | null | null | null | null |
|
CVE-2016-8713 | A remote out of bound write / memory corruption vulnerability exists in the PDF parsing functionality of Nitro Pro 10.5.9.9. A specially crafted PDF file can cause a vulnerability resulting in potential memory corruption. An attacker can send the victim a specific PDF file to trigger this vulnerability. | [
"cpe:2.3:a:gonitro:nitro_pdf_pro:10.5.5.9:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
GHSA-j4gw-3wf4-m484 | HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22018, CVE-2022-29119, CVE-2022-30188. | [] | null | 7.8 | null | null |
|
CVE-2008-4140 | Cross-site scripting (XSS) vulnerability in admin.php in Quick.Cart 3.1 allows remote attackers to inject arbitrary web script or HTML via the query string. | [
"cpe:2.3:a:opensolution:quick.cart:3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-29227 | Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Layout.LayoutSave webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to inject SQL commands via unspecified vectors. | [
"cpe:2.3:a:synology:surveillance_station:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
cisco-sa-dcnm-authbypass-YVJzqgk2 | Cisco Data Center Network Manager Authorization Bypass Vulnerability | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization.
The vulnerability is due to a failure to limit access to resources that are intended for users with Administrator privileges. An attacker could exploit this vulnerability by convincing a user to click a malicious URL. A successful exploit could allow a low-privileged attacker to list, view, create, edit, and delete templates in the same manner as a user with Administrator privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2"] | [] | null | 6.3 | null | null |
GHSA-5xfw-3664-6rwg | SQL injection vulnerability in category.php in Prozilla Webring allows remote attackers to execute arbitrary SQL commands via the cat parameter. | [] | null | null | null | null |
|
GHSA-4vqg-hq2v-8672 | Missing Authorization vulnerability in WPFactory Cost of Goods for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cost of Goods for WooCommerce: from n/a through 2.8.6. | [] | null | 5.4 | null | null |
|
CVE-2016-4882 | Cross-site request forgery (CSRF) vulnerability in baserCMS version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. | [
"cpe:2.3:a:basercms:basercms:3.0.10:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2021-45651 | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK50 before 2.7.3.22, RBR50 before 2.7.3.22, and RBS50 before 2.7.3.22. | [
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
GHSA-9mjh-fjw4-45p5 | Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6698. | [] | null | null | null | null |
|
GHSA-67cv-mr76-54w6 | Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash. | [] | null | null | 8.8 | null |
|
CVE-2023-44361 | ZDI-CAN-22041: Adobe Acrobat Reader DC AcroForm Doc Object Use-After-Free Information Disclosure Vulnerability | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 5.5 | null | null |
GHSA-w8wf-rhcx-wvhg | Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. | [] | null | 9.8 | null | null |
|
GHSA-p8v5-fvvw-942p | Buffer overflows in Ecartis (formerly Listar) 1.0.0 before snapshot 20020125 allows remote attackers to execute arbitrary code via (1) address_match() of mystring.c or (2) other functions in tolist.c. | [] | null | null | null | null |
|
GHSA-w8gm-v2v6-g83p | An Insecure Direct Object Reference (IDOR) issue in fn2Web in ihb eG FlexNow before 2.04.09.016 allows remote authenticated attackers to obtain sensitive student information (final grades, study courses, degrees) by changing the student ID parameter in the HTTP POST request to the FrontControllerSS endpoint. | [] | null | 4.3 | null | null |
|
RHSA-2004:073 | Red Hat Security Advisory: metamail security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
GHSA-pw87-gfp2-xhvr | Untrusted search path in CleanZoom before file date 07/24/2023 may allow a privileged user to conduct an escalation of privilege via local access. | [] | null | 7.2 | null | null |
|
CVE-2005-1172 | Cross-site scripting (XSS) vulnerability in init.inc.php in Coppermine Photo Gallery 1.3.x allows remote attackers to inject arbitrary web script or HTML via the X-Forwarded-For parameter. | [
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.1_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.1_beta_2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.2.2_b:*:*:*:*:*:*:*",
"cpe:2.3:a:coppermine:coppermine_photo_gallery:1.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-ffxw-f5f8-xhhf | The WBEMSingleView.ocx ActiveX control 1.50.1131.0 in Microsoft WMI Administrative Tools 1.1 and earlier allows remote attackers to execute arbitrary code via a crafted argument to the ReleaseContext method, a different vector than CVE-2010-3973, possibly an untrusted pointer dereference. | [] | null | null | null | null |
|
CVE-2024-40656 | In handleCreateConferenceComplete of ConnectionServiceWrapper.java, there is a possible way to reveal images across users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-7mfg-j3fx-9vhc | A vulnerability was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. It has been classified as problematic. Affected is an unknown function of the file navbar.php. The manipulation of the argument id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256956. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 3.5 | null | null |
|
GHSA-jfr6-2c38-mp7q | The nsTableFrame::InsertFrames function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly perform a cast of a frame variable during processing of mixed row-group and column-group frames, which might allow remote attackers to execute arbitrary code via a crafted web site. | [] | null | null | null | null |
|
GHSA-6726-5cj2-9h6f | Multiple heap-based buffer underflows in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x through 4.10.4 and 5.x before 5.4.2 allow remote attackers to execute arbitrary code via (1) a crafted Content-Length HTTP header or (2) a large HTTP request, related to an integer overflow that triggers a heap-based buffer overflow. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-0840. | [] | null | null | null | null |
|
GHSA-fp49-vmmw-4q8x | Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop. | [] | null | 5.3 | null | null |
|
CVE-2022-4173 | Avast and AVG Antivirus for Windows vulnerable to Privilege Escalation | A vulnerability within the malware removal functionality of Avast and AVG Antivirus allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avast and AVG Antivirus version 22.10.
| [
"cpe:2.3:a:avast:avast:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avast:avg_antivirus:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
GHSA-r9c6-jqpc-j4f9 | Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have an out of bound read vulnerability. Successful exploitation could lead to memory leak. | [] | null | null | null | null |
|
GHSA-xm83-77f2-89mq | Dell SupportAssist for Home PCs version 3.14.1 and prior versions contain a privilege escalation vulnerability in the installer. A local low privileged authenticated attacker may potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with elevated privileges. | [] | null | 7.3 | null | null |
|
CVE-2013-5107 | Directory traversal vulnerability in RockMongo 1.1.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the ROCK_LANG cookie, as demonstrated in a login.index action to index.php. | [
"cpe:2.3:a:rockmongo:rockmongo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rockmongo:rockmongo:1.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-78r2-mpvm-vff5 | Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [] | null | null | 8.8 | null |
|
GHSA-9mw4-c3fw-663h | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VibeThemes VibeBP allows SQL Injection.This issue affects VibeBP: from n/a before 1.9.9.5.1. | [] | null | 8.5 | null | null |
|
CVE-2004-1034 | Buffer overflow in the http_open function in Kaffeine before 0.5, whose code is also used in gxine before 0.3.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long Content-Type header for a Real Audio Media (.ram) playlist file. | [
"cpe:2.3:a:kaffeine:kaffeine_player:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kaffeine:kaffeine_player:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kaffeine:kaffeine_player:0.4.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:kaffeine:kaffeine_player:0.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:gxine:0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-pc8p-68gv-cv22 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admpass parameter in the setPasswordCfg function. | [] | null | 9.8 | null | null |
|
ICSA-22-013-04 | Siemens SIPROTEC 5 Devices | An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information. | [] | null | 6.5 | null | null |
RHSA-2019:3267 | Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift-enterprise-cli-container security update | kubernetes: `kubectl cp` allows for arbitrary file write via double symlinks | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 5.3 | null |
CVE-2018-17322 | Cross-site scripting (XSS) vulnerability in index.php/index/category/index in YUNUCMS 1.1.4 allows remote attackers to inject arbitrary web script or HTML via the area parameter. | [
"cpe:2.3:a:yunucms:yunucms:1.1.4:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-qpgj-h8c3-pw8q | PHP remote file inclusion vulnerability in index.php in John Himmelman (aka DaRk2k1) PowerPortal 1.3a allows remote attackers to execute arbitrary PHP code via a URL in the file_name[] parameter. | [] | null | null | null | null |
|
CVE-2015-0483 | Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect integrity via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-r3qr-64rx-w8vp | Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to TIFF file parsing. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 7.8 | null |
|
CVE-2009-4994 | Cross-site scripting (XSS) vulnerability in frmKBSearch.aspx in SmarterTools SmarterTrack before 4.0.3504 allows remote attackers to inject arbitrary web script or HTML via the search parameter. | [
"cpe:2.3:a:smartertools:smartertrack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.0.3040:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.1.3050:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.1.3089:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.5.3126:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.5.3159:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.5.3167:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3216:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3217:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3229:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3246:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3267:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3274:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3309:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3355:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3411:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:3.6.3413:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:4.0.3387:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:4.0.3399:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:4.0.3411:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:4.0.3413:*:*:*:*:*:*:*",
"cpe:2.3:a:smartertools:smartertrack:4.0.3435:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2005-1628 | apage.cgi in WebAPP 0.9.9.2.1, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter. | [
"cpe:2.3:a:web-app.org:webapp:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:web-app.org:webapp:0.9.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:web-app.org:webapp:0.9.9.2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-32437 | WordPress eCommerce Product Catalog plugin <= 3.3.28 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in impleCode eCommerce Product Catalog.This issue affects eCommerce Product Catalog: from n/a through 3.3.28.
| [] | null | 4.3 | null | null |
CVE-2022-37152 | An issue was discovered in Online Diagnostic Lab Management System 1.0, There is a SQL injection vulnerability via "dob" parameter in "/classes/Users.php?f=save_client" | [
"cpe:2.3:a:online_diagnostic_lab_management_system_project:online_diagnostic_lab_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-wvxv-hx3q-c798 | Stack buffer overflow in Printing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit stack corruption via a crafted HTML page. | [] | null | null | null | null |
|
GHSA-9r9q-wj4f-283m | The Homey Login Register plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.4.0. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role. | [] | null | 9.8 | null | null |
|
CVE-2018-8409 | A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1. | [
"cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system.io.pipelines:4.5.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-m45c-v46h-c788 | lollms path traversal vulnerability allows overriding of config.yaml file, leading to RCE | A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`. | [] | null | null | 7.4 | null |
CVE-2014-7779 | The Kuran'in Bilimsel Mucizeleri (aka com.wKurannBilimselMucizeleri) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:kuran\\'in_bilimsel_mucizeleri_project:kuran\\'in_bilimsel_mucizeleri:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2020-10496 | CSRF in admin/edit-article.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit an article, given the id, via a crafted request. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
CVE-2018-21039 | An issue was discovered on Samsung mobile devices with N(7.0) software. With the Location permission for the compass feature in Quick Tools (aka QuickTools), an attacker can bypass the lockscreen. The Samsung ID is SVE-2018-12053 (December 2018). | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-8f5c-7m5h-v8mf | tcprewrite in tcpreplay before 4.1.2 allows remote attackers to cause a denial of service (segmentation fault) via a large frame, a related issue to CVE-2017-14266. | [] | null | null | 7.5 | null |
|
CVE-2017-10849 | Untrusted search path vulnerability in Self-extracting document generated by DocuWorks 8.0.7 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:fujixerox:docuworks:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-5hmh-qwj4-xcc3 | E-Business Designer (eBD) 3.1.4 and earlier allows remote attackers to obtain the full path of the web server via "'" characters, and possibly other invalid values, in (1) the id parameter to form_grupo.html, or requests to the (2) archivos/ and (3) files/ directories. NOTE: this issue might be resultant from SQL injection. | [] | null | null | null | null |
|
GHSA-86x6-x7r9-8qmv | Heap-based buffer overflow in Animation codec content handling in Apple QuickTime before 7.4.5 on Windows allows remote attackers to execute arbitrary code via a crafted movie with run length encoding. | [] | null | null | null | null |
|
CVE-2019-16401 | Samsung Galaxy S8 plus (Android version: 8.0.0, Build Number: R16NW.G955USQU5CRG3, Baseband Vendor: Qualcomm Snapdragon 835, Baseband: G955USQU5CRG3), Samsung Galaxy S3 (Android version: 4.3, Build Number: JSS15J.I9300XXUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: I9300XXUGNA8), and Samsung Galaxy Note 2 (Android version: 4.3, Build Number: JSS15J.I9300XUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: N7100DDUFND1) devices allow injection of AT+CIMI and AT+CGSN over Bluetooth, leaking sensitive information such as IMSI, IMEI, call status, call setup stage, internet service status, signal strength, current roaming status, battery level, and call held status. | [
"cpe:2.3:o:samsung:galaxy_s8_plus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s8_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:galaxy_s3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:galaxy_note_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_note_2:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
GHSA-49vj-5fcp-ch84 | Flash Player Desktop Runtime versions 32.0.0.114 and earlier, Flash Player for Google Chrome versions 32.0.0.114 and earlier, and Flash Player for Microsoft Edge and Internet Explorer 11 versions 32.0.0.114 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | null | null |
|
CVE-2024-26644 | btrfs: don't abort filesystem when attempting to snapshot deleted subvolume | In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't abort filesystem when attempting to snapshot deleted subvolume
If the source file descriptor to the snapshot ioctl refers to a deleted
subvolume, we get the following abort:
BTRFS: Transaction aborted (error -2)
WARNING: CPU: 0 PID: 833 at fs/btrfs/transaction.c:1875 create_pending_snapshot+0x1040/0x1190 [btrfs]
Modules linked in: pata_acpi btrfs ata_piix libata scsi_mod virtio_net blake2b_generic xor net_failover virtio_rng failover scsi_common rng_core raid6_pq libcrc32c
CPU: 0 PID: 833 Comm: t_snapshot_dele Not tainted 6.7.0-rc6 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014
RIP: 0010:create_pending_snapshot+0x1040/0x1190 [btrfs]
RSP: 0018:ffffa09c01337af8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff9982053e7c78 RCX: 0000000000000027
RDX: ffff99827dc20848 RSI: 0000000000000001 RDI: ffff99827dc20840
RBP: ffffa09c01337c00 R08: 0000000000000000 R09: ffffa09c01337998
R10: 0000000000000003 R11: ffffffffb96da248 R12: fffffffffffffffe
R13: ffff99820535bb28 R14: ffff99820b7bd000 R15: ffff99820381ea80
FS: 00007fe20aadabc0(0000) GS:ffff99827dc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000559a120b502f CR3: 00000000055b6000 CR4: 00000000000006f0
Call Trace:
<TASK>
? create_pending_snapshot+0x1040/0x1190 [btrfs]
? __warn+0x81/0x130
? create_pending_snapshot+0x1040/0x1190 [btrfs]
? report_bug+0x171/0x1a0
? handle_bug+0x3a/0x70
? exc_invalid_op+0x17/0x70
? asm_exc_invalid_op+0x1a/0x20
? create_pending_snapshot+0x1040/0x1190 [btrfs]
? create_pending_snapshot+0x1040/0x1190 [btrfs]
create_pending_snapshots+0x92/0xc0 [btrfs]
btrfs_commit_transaction+0x66b/0xf40 [btrfs]
btrfs_mksubvol+0x301/0x4d0 [btrfs]
btrfs_mksnapshot+0x80/0xb0 [btrfs]
__btrfs_ioctl_snap_create+0x1c2/0x1d0 [btrfs]
btrfs_ioctl_snap_create_v2+0xc4/0x150 [btrfs]
btrfs_ioctl+0x8a6/0x2650 [btrfs]
? kmem_cache_free+0x22/0x340
? do_sys_openat2+0x97/0xe0
__x64_sys_ioctl+0x97/0xd0
do_syscall_64+0x46/0xf0
entry_SYSCALL_64_after_hwframe+0x6e/0x76
RIP: 0033:0x7fe20abe83af
RSP: 002b:00007ffe6eff1360 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fe20abe83af
RDX: 00007ffe6eff23c0 RSI: 0000000050009417 RDI: 0000000000000003
RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fe20ad16cd0
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe6eff13c0 R14: 00007fe20ad45000 R15: 0000559a120b6d58
</TASK>
---[ end trace 0000000000000000 ]---
BTRFS: error (device vdc: state A) in create_pending_snapshot:1875: errno=-2 No such entry
BTRFS info (device vdc: state EA): forced readonly
BTRFS warning (device vdc: state EA): Skipping commit of aborted transaction.
BTRFS: error (device vdc: state EA) in cleanup_transaction:2055: errno=-2 No such entry
This happens because create_pending_snapshot() initializes the new root
item as a copy of the source root item. This includes the refs field,
which is 0 for a deleted subvolume. The call to btrfs_insert_root()
therefore inserts a root with refs == 0. btrfs_get_new_fs_root() then
finds the root and returns -ENOENT if refs == 0, which causes
create_pending_snapshot() to abort.
Fix it by checking the source root's refs before attempting the
snapshot, but after locking subvol_sem to avoid racing with deletion. | [] | null | 5.5 | null | null |
CVE-2024-8298 | Memory request vulnerability in the memory management module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
CVE-2024-46920 | An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadInputBuffers. | [] | null | 6.5 | null | null |
|
GHSA-93q2-9p4x-289c | Windows User Interface Application Core Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-j2v6-jq3p-wj4f | A vulnerability classified as critical has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected is an unknown function of the file admin/products/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-224622 is the identifier assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2005-1883 | global.php in YaPiG 0.92b allows remote attackers to include arbitrary local files via the BASE_DIR parameter. | [
"cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-83rw-phwp-pvfh | Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access. | [] | null | 4.3 | null | null |
|
CVE-2020-5411 | Jackson Configuration Allows Code Execution with Unknown "Serialization Gadgets" | When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown "deserialization gadgets" when enabling default typing. | [
"cpe:2.3:a:pivotal_software:spring_batch:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 |
GHSA-4292-w862-9w9c | Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors. | [] | null | null | null | null |
|
CVE-2017-7466 | Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges. | [
"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*"
] | null | null | 8 | null |
|
CVE-2019-1602 | Cisco NX-OS Software Privilege Escalation Vulnerability | A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive data that could be used to elevate their privileges to administrator. The vulnerability is due to improper implementation of filesystem permissions. An attacker could exploit this vulnerability by logging in to the CLI of an affected device, accessing a specific file, and leveraging this information to authenticate to the NX-API server. A successful exploit could allow an attacker to make configuration changes as administrator. Note: NX-API is disabled by default. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5). | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2024-6657 | BLE peripheral DoS after few cycles of connect/disconnects | A denial of service may be caused to a single peripheral device in a BLE network when multiple central
devices continuously connect and disconnect to the peripheral. A hard reset is required to recover the peripheral device. | [] | null | 6.5 | null | null |
CVE-2020-14823 | Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.2.3 - 12.2.10. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle CRM Technical Foundation accessible data as well as unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:customer_relationship_management_technical_foundation:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2023-39377 | SiberianCMS - CWE-434: Unrestricted Upload of File with Dangerous Type - A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method | SiberianCMS - CWE-434: Unrestricted Upload of File with Dangerous Type - A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method | [
"cpe:2.3:a:siberiancms:siberiancms:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
GHSA-chj7-84jj-c8jf | SQL injection vulnerability in directory.php in Prozilla Entertainers 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the cat parameter. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
RHSA-2024:6843 | Red Hat Security Advisory: pcp security update | pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 4.4 | null | null |
CVE-2018-5277 | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e000. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | [
"cpe:2.3:a:malwarebytes:malwarebytes:3.3.1.2183:*:*:*:premium:*:*:*"
] | null | null | 7.8 | 6.1 |
|
CVE-2019-20148 | An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 8.13 through 12.6.1. It has Incorrect Access Control. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | 4.3 |
|
CVE-2021-24819 | Page/Post Content Shortcode <= 1.0 - Contributor+ Arbitrary Posts/Pages Access | The Page/Post Content Shortcode WordPress plugin through 1.0 does not have proper authorisation in place, allowing users with a role as low as contributor to access draft/private/password protected/trashed posts/pages they should not be allowed to, including posts created by other users such as admins and editors. | [
"cpe:2.3:a:page\\/post_content_shortcode_project:page\\/post_content_shortcode:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | 4 |
CVE-2011-3871 | Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files. | [
"cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:0.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:0.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:0.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:0.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:0.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:0.25.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:0.25.6:*:*:*:*:*:*:*"
] | null | null | null | 6.2 |
|
GHSA-5673-2x9h-2626 | Unauthenticated attackers can perform actions, using SSH private keys, by knowing the IP address and having access to the same network of one of the machines in the HA or Cluster group. This vulnerability has been closed by enhancing LoadMaster partner communications to require a shared secret that must be exchanged between the partners before communication can proceed. | [] | null | 7.5 | null | null |
|
GHSA-jcwq-43pm-wp74 | Improper group membership validation when deleting a user account in GitLab >=7.12 allows a user to delete own account without deleting/transferring their group. | [] | null | null | null | null |
|
cisco-sa-cucm-path-trav-dKCvktvO | Cisco Unified Communications Products Path Traversal Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to access sensitive data on an affected device.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 4.3 | null | null |
GHSA-vwh7-wh36-fc3v | IBM Tivoli Endpoint Manager is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 123858. | [] | null | null | 8.8 | null |
|
GHSA-gm82-7rxx-g56m | The XML Service interface in Citrix XenApp 6.5 and 6.5 Feature Pack 1 allows remote attackers to execute arbitrary code via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2024:9729 | Red Hat Security Advisory: squid security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
GHSA-fwr6-xpvf-mh7v | Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password. | [] | null | null | null | null |
|
GHSA-mxqp-7p7q-w96p | Directory traversal vulnerability in the console version of PKZip (pkzipc) 4.00 and earlier allows attackers to overwrite arbitrary files during archive extraction with the -rec (recursive) option via a .. (dot dot) attack on the archived files. | [] | null | null | null | null |
|
GHSA-67jh-vhcp-3f86 | Off-by-one error in afs_pioctl.c in OpenAFS before 1.6.16 might allow local users to cause a denial of service (memory overwrite and system crash) via a pioctl with an input buffer size of 4096 bytes. | [] | null | null | 7.8 | null |
|
GHSA-f2v8-h69h-xg4j | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an XFA '\n' POST injection vulnerability. Successful exploitation could lead to a security bypass. | [] | null | null | 9.8 | null |
|
GHSA-3qq5-8frq-x9jh | Directory traversal vulnerability in webftp.php in SysCP WebFTP 1.2.6 and possibly earlier allows remote attackers to include and execute arbitrary local PHP scripts, and possibly read other types of files, via a .. (dot dot) and a trailing null in the webftp_language parameter. | [] | null | null | null | null |
|
GHSA-m4gc-r3fg-3xcp | Foxit PDF Reader U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22910. | [] | null | null | 3.3 | null |
|
CVE-2023-51313 | PHPJabbers Restaurant Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file. | [] | null | 8.8 | null | null |
|
CVE-2024-10392 | AI Power: Complete AI Pack <= 1.8.89 - Unauthenticated Arbitrary File Upload | The AI Power: Complete AI Pack plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'handle_image_upload' function in all versions up to, and including, 1.8.89. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | [
"cpe:2.3:a:aipower:aipower:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2023-45063 | WordPress AI Content Writing Assistant (Content Writer, ChatGPT, Image Generator) All in One Plugin <= 1.1.5 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <= 1.1.5 versions. | [
"cpe:2.3:a:rayhan1:ai_content_writing_assistant:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-ch5v-h69f-mxc8 | libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate). | [] | null | null | null | null |
|
CVE-2024-53839 | In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
CVE-2018-19627 | In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by adjusting a buffer boundary. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-ppjv-38xc-pvpx | In MISP before 2.4.187, __uploadLogo in app/Controller/OrganisationsController.php does not properly check for a valid logo upload. | [] | null | 9.8 | null | null |
|
CVE-2017-10744 | XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "Read Access Violation on Control Flow starting at COMCTL32!CToolTipsMgr::s_ToolTipsWndProc+0x0000000000000032." | [
"cpe:2.3:a:xnview:xnview:2.40:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-729f-rvfg-qjq3 | Siemens SIMATIC NET PC-Software before 13 SP2 allows remote attackers to cause a denial of service (OPC UA service outage) via crafted TCP packets. | [] | null | null | 7.5 | null |
|
RHEA-2023:6741 | Red Hat Enhancement Advisory: .NET 8.0 bugfix update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
GHSA-9jf6-5hvj-3j5r | Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to sites that set the document.domain property or have the same document.domain. | [] | null | null | null | null |
Subsets and Splits