id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-3869 | The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'woocommerce_json_search_coupons' function . This makes it possible for attackers with subscriber level access to view coupon codes. | [] | null | 4.3 | null | null |
|
GHSA-293r-f52g-2w34 | Macromedia Dreamweaver uses weak encryption to store FTP passwords, which could allow local users to easily decrypt the passwords of other users. | [] | null | null | null | null |
|
GHSA-hh4m-7c6g-g8m7 | Double free vulnerability in the ftpprchild function in ftppr in 3proxy 0.5 through 0.5.3i allows remote attackers to cause a denial of service (daemon crash) via multiple OPEN commands to the FTP proxy. | [] | null | null | null | null |
|
GHSA-hhg9-7r53-5rpr | Memory leak in Simple Network Management Protocol (SNMP) agent (snmp.exe) for Windows NT 4.0 before Service Pack 4 allows remote attackers to cause a denial of service (memory consumption) via a large number of SNMP packets with Object Identifiers (OIDs) that cannot be decoded. | [] | null | null | null | null |
|
GHSA-jxcg-2g7w-v53p | Kaseya Traverse before 9.5.20 allows OS command injection attacks against user accounts, associated with a Netflow Top Applications reporting API call. This is exploitable by an authenticated attacker who submits a modified JSON field within POST data. | [] | null | null | null | null |
|
CVE-2022-0555 | Subiquity Shows Guided Storage Passphrase in Plaintext with Read-all Permissions | [
"cpe:2.3:a:canonical:subiquity:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
GHSA-9rfq-ff3x-cwxp | The iMember360 plugin 3.8.012 through 3.9.001 for WordPress does not properly restrict access, which allows remote attackers to delete arbitrary users via a request containing a user name in the Email parameter and the API key in the i4w_clearuser parameter. | [] | null | null | null | null |
|
GHSA-x4xc-8g7v-c85h | The SiteGround Security WordPress plugin before 1.3.1 does not properly sanitize user input before using it in an SQL query, leading to an authenticated SQL injection issue. | [] | null | 8.8 | null | null |
|
GHSA-ccx5-jh35-2p3c | Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally. | [] | null | 7.8 | null | null |
|
GHSA-qphq-c5f9-q7v9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Iqonic Design WP Roadmap – Product Feedback Board allows Stored XSS.This issue affects WP Roadmap – Product Feedback Board: from n/a through 1.0.8. | [] | null | 5.9 | null | null |
|
CVE-2009-2022 | fipsCMS Light 2.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file and obtain sensitive information via a direct request for _fipsdb/db.mdb. | [
"cpe:2.3:a:fipsasp:fipscms_light:2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2012-2864 | Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow." | [
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.8:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.9:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.11:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.13:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.14:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.15:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.17:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.18:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.31:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.32:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.33:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.34:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.35:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.36:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.37:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.38:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.39:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.41:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.46:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.47:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.48:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.49:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.50:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:21.0.1180.79:*:*:*:*:*:*:*",
"cpe:2.3:h:acer:ac700_chromebook:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:cr-48_chromebook:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:series_5_550_chromebook:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:series_5_chromebook:-:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2024:8337 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.2 for RHEL 9 | go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:run_once_duration_override_operator:1.1::el9"
] | null | 5.9 | null | null |
CVE-2024-38274 | moodle: stored XSS via calendar's event title when deleting the event | Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt. | [] | null | 6.1 | null | null |
CVE-2023-42782 | A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number. | [
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer-bigdata:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*"
] | null | 5 | null | null |
|
CVE-2022-47332 | In wlan driver, there is a possible missing permission check. This could lead to local information disclosure. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2014:2009 | Red Hat Security Advisory: kernel security update | kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | 8.4 | null |
GHSA-7j7c-vr66-8955 | In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120276962 | [] | null | 7.5 | null | null |
|
GHSA-6hj3-2gfg-5j44 | A stored cross-site scripting (XSS) vulnerability in the Inline Table Editing application before 3.8.0 for Confluence allows attackers to store and execute arbitrary JavaScript via a crafted payload injected into the tables. | [] | null | 5.4 | null | null |
|
GHSA-m9gr-8xj6-cq2p | phpcart.php in PHPCart 3.2 allows remote attackers to change product price information by modifying the (1) price or (2) postage parameters. NOTE: it was later reported that 3.4 through 4.6.4 are also affected. | [] | null | null | null | null |
|
CVE-2008-4705 | SQL injection vulnerability in success_story.php in php Online Dating Software MyPHPDating allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:phponlinedatingsoftware:myphpdating:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-9jhm-8m8c-c3f4 | SSRF in Sydent due to missing validation of hostnames | ImpactSydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.PatchesFixed in 9e57334, 8936925, 3d531ed, 0f00412WorkaroundsA potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.For more informationIf you have any questions or comments about this advisory, email us at [email protected]. | [] | 6.3 | 7.7 | null | null |
CVE-2019-12243 | Istio 1.1.x through 1.1.6 has Incorrect Access Control. | [
"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5.4 |
|
GHSA-rvjp-mhp8-5xmw | The Where Did You Hear About Us Checkout Field for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via order meta in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with shop manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.5 | null | null |
|
CVE-2017-1000187 | In SWFTools, an address access exception was found in pdf2swf. FoFiTrueType::writeTTF() | [
"cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.3 |
|
CVE-2024-52676 | Itsourcecode Online Discussion Forum Project v.1.0.0 is vulnerable to Cross Site Scripting (XSS) via /bcc_forum/members/home.php. | [
"cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2004-0032 | Cross-site scripting (XSS) vulnerability in search.php in PHPGEDVIEW 2.61 allows remote attackers to inject arbitrary HTML and web script via the firstname parameter. | [
"cpe:2.3:a:phpgedview:phpgedview:2.61:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-6jvf-9896-2hgg | Cross-site scripting (XSS) vulnerability in the htp PL/SQL package for Oracle 9i Application Server (9iAS) allows remote attackers to inject arbitrary web script or HTML via the cbuf parameter to htp.print. | [] | null | null | null | null |
|
CVE-2014-8451 | An unspecified JavaScript API in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2014-8448. | [
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.04:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.06:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.07:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.08:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.09:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-4hxw-v2j3-4qv8 | An issue in the component route\user.php of Xiuno BBS v4.0.4 allows attackers to enumerate usernames. | [] | null | null | null | null |
|
CVE-2015-2449 | Microsoft Internet Explorer 7 through 11 and Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "ASLR Bypass." | [
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-27525 | Information Exposure vulnerability in JP1/IT Desktop Management 2 - Smart Device Manager | Information Exposure vulnerability in Hitachi JP1/IT Desktop Management 2 - Smart Device Manager on Windows.This issue affects JP1/IT Desktop Management 2 - Smart Device Manager: from 12-00 before 12-00-08, from 11-10 through 11-10-08, from 11-00 through 11-00-05, from 10-50 through 10-50-06. | [] | null | 3.9 | null | null |
GHSA-wjqw-p7j2-5gx2 | The Intellian C700 web panel allows you to add firewall rules. Each of these rules has an associated ID, but there is a problem when adding a new rule, the ID used to create the database entry may be different from the JSON ID. If the rule needs to be deleted later, the system will use the JSON ID and therefore fail. This can be exploited by an attacker to create rules that cannot be deleted unless the device is reset to factory defaults. | [] | 6.3 | null | null | null |
|
CVE-2024-7375 | SourceCodester Simple Realtime Quiz System my_quiz_result.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester Simple Realtime Quiz System 1.0. This issue affects some unknown processing of the file /my_quiz_result.php. The manipulation of the argument quiz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273359. | [
"cpe:2.3:a:sourcecodester:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-7jh2-q8mj-7c4r | The Chained Quiz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.2.4. This is due to missing nonce validation on the manage() function. This makes it possible for unauthenticated attackers to delete submitted quiz responses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
CVE-2007-2918 | Multiple stack-based buffer overflows in ActiveX controls (1) VibeC in (a) vibecontrol.dll, (2) CallManager and (3) ViewerClient in (b) StarClient.dll, (4) ComLink in (c) uicomlink.dll, and (5) WebCamXMP in (d) wcamxmp.dll in Logitech VideoCall allow remote attackers to cause a denial of service (browser crash) and execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:logitech:videocall:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-pjx7-3rv2-9x45 | ** DISPUTED ** OctoPrint through 1.3.9 allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests on port 8081. NOTE: the vendor disputes the significance of this report because their documentation states that with "blind port forwarding ... Putting OctoPrint onto the public internet is a terrible idea, and I really can't emphasize that enough." | [] | null | null | 9.1 | null |
|
GHSA-fcw6-ccq2-f46p | The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some of its Testimonial fields before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. The attack requires a specific view to be performed | [] | null | 4.8 | null | null |
|
GHSA-2x27-qff4-6hf8 | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution. | [] | null | null | null | null |
|
CVE-2023-50481 | An issue was discovered in blinksocks version 3.3.8, allows remote attackers to obtain sensitive information via weak encryption algorithms in the component /presets/ssr-auth-chain.js. | [
"cpe:2.3:a:blinksocks:blinksocks:3.3.8:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2023-33318 | WordPress WooCommerce Follow-Up Emails Plugin <= 4.9.40 is vulnerable to Arbitrary File Upload | Unrestricted Upload of File with Dangerous Type vulnerability in WooCommerce AutomateWoo.This issue affects AutomateWoo: from n/a through 4.9.40.
| [
"cpe:2.3:a:woocommerce:automatewoo:*:*:*:*:*:wordpress:*:*"
] | null | 9.9 | null | null |
CVE-2024-47326 | WordPress Share This Image plugin <= 2.01 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ILLID Share This Image allows Reflected XSS.This issue affects Share This Image: from n/a through 2.01. | [] | null | 7.1 | null | null |
CVE-2022-48879 | efi: fix NULL-deref in init error path | In the Linux kernel, the following vulnerability has been resolved:
efi: fix NULL-deref in init error path
In cases where runtime services are not supported or have been disabled,
the runtime services workqueue will never have been allocated.
Do not try to destroy the workqueue unconditionally in the unlikely
event that EFI initialisation fails to avoid dereferencing a NULL
pointer. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-q4p6-fc6x-phmp | Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell. | [] | null | null | 7.2 | null |
|
GHSA-882q-wcp5-p64r | Cross-Site Request Forgery (CSRF) vulnerability in JumpDEMAND Inc. ActiveDEMAND.This issue affects ActiveDEMAND: from n/a through 0.2.43. | [] | null | 4.3 | null | null |
|
CVE-2020-7129 | A remote execution of arbitrary commands vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2. | [
"cpe:2.3:a:arubanetworks:airwave_glass:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 9 |
|
CVE-2017-14375 | EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system. | [
"cpe:2.3:a:dell:emc_unisphere:*:*:*:*:*:vmax:*:*",
"cpe:2.3:a:emc:solutions_enabler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:vasa:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:vmax_emanagement:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
RHSA-2019:1421 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.2 on RHEL 8 security update | picketlink: reflected XSS in SAMLRequest via RelayState parameter picketlink: URL injection via xinclude parameter undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 5.3 | null |
CVE-2023-38020 | IBM SOAR QRadar Plugin App log injection | IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576. | [
"cpe:2.3:a:ibm:soar_qradar_plugin_app:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-mhm3-7xrh-62qv | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Hero Mega Menu - Responsive WordPress Menu Plugin allows Reflected XSS. This issue affects Hero Mega Menu - Responsive WordPress Menu Plugin: from n/a through 1.16.5. | [] | null | 7.1 | null | null |
|
GHSA-wvhm-r52c-qwwh | Incomplete filtering of JavaScript code in different configuration fields of the web based interface of the VIDEOJET multi 4000 allows an attacker with administrative credentials to store JavaScript code which will be executed for all administrators accessing the same configuration option. | [] | null | 4.8 | null | null |
|
GHSA-fw7h-2grr-4rjq | KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code. | [] | null | 5.4 | null | null |
|
CVE-2024-31204 | mailcow Cross-site Scripting Vulnerability via Exception Handler | mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability resides in the exception handling mechanism, specifically when not operating in DEV_MODE. The system saves exception details into a session array without proper sanitization or encoding. These details are later rendered into HTML and executed in a JavaScript block within the user's browser, without adequate escaping of HTML entities. This flaw allows for Cross-Site Scripting (XSS) attacks, where attackers can inject malicious scripts into the admin panel by triggering exceptions with controlled input. The exploitation method involves using any function that might throw an exception with user-controllable argument. This issue can lead to session hijacking and unauthorized administrative actions, posing a significant security risk. Version 2024-04 contains a fix for the issue. | [
"cpe:2.3:a:mailcow:mailcow_dockerized:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-m7h8-8q5m-8g9r | An issue was discovered in SolarWinds N-Central 12.3.0.670. The local database does not require authentication: security is only based on ability to access a network interface. The database has keys and passwords. | [] | null | null | null | null |
|
CVE-2024-13619 | LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes < 8.0.1 - Reflected XSS | The LifterLMS WordPress plugin before 8.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | [] | null | 6.1 | null | null |
GHSA-ppg2-hw6f-p95v | Cisco Unified Communications Manager (UCM) 8.0 through 8.6 allows remote attackers to bypass an XSS protection mechanism via a crafted parameter, aka Bug ID CSCuu15266. | [] | null | null | null | null |
|
GHSA-4mf2-f3wh-gvf2 | Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy | Impact_What kind of vulnerability is it? Who is impacted?_
For users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect.For example, if a whitelist domain was configured for `.example.com`, the intention is that subdomains of `example.com` are allowed.
Instead, `example.com` and `badexample.com` could also match.Patches_Has the problem been patched? What versions should users upgrade to?_
This is fixed in version 7.0.0 onwards.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain.Original Issue Posted by @semoac:Whitelist Domain feature is not working as expected because is not matching a dot to ensure the redirect is a subdomain.Expected BehaviorIf whitelist domain is set to `.example.com` , then `hack.alienexample.com` should be rejected as a valid redirect.Current BehaviorThe code is removing the `dot` from `.example.com` and only checking if the redirect string end with `example.com`Possible SolutionHere
https://github.com/oauth2-proxy/oauth2-proxy/blob/c377466411f2aee180a732187edb638f2f7e57fb/oauthproxy.go#L661Include the dot when checking the string:Steps to Reproduce (for bugs)Users of `github.com/oauth2-proxy/oauth2-proxy` are advised to update to `github.com/oauth2-proxy/oauth2-proxy/v7` | [] | null | 5.4 | null | null |
CVE-2015-6596 | mediaserver in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bugs 20731946 and 20719651, a different vulnerability than CVE-2015-7717. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-36jv-w59f-85w3 | The WP Maps WordPress plugin before 4.7.2 does not sanitise and escape some of its Map settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 3.5 | null | null |
|
GHSA-ffx4-qrmq-w356 | Missing Authorization vulnerability in Saturday Drive Ninja Forms.This issue affects Ninja Forms: from n/a through 3.6.25. | [] | null | 7.6 | null | null |
|
GHSA-wggh-6fmq-953v | Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command. | [] | null | null | 5.9 | null |
|
GHSA-25rw-v6g3-5hgc | Multiple race conditions in the CPU Performance Counters (cpc) subsystem in the kernel in Sun Solaris 10 allow local users to cause a denial of service (panic) via unspecified vectors related to kcpc_unbind and kcpc_restore. | [] | null | null | null | null |
|
CVE-2021-29047 | The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer. | [
"cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.3.5:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-4h9w-7r8x-ppq7 | FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections. | [] | null | null | null | null |
|
GHSA-4xvx-54qc-h5fx | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Pearl - Corporate Business allows PHP Local File Inclusion.This issue affects Pearl - Corporate Business: from n/a before 3.4.8. | [] | null | 8.1 | null | null |
|
CVE-2024-0740 | Eclipse Target Management <= 4.5.500 Command Injection | Eclipse Target Management: Terminal and Remote System Explorer (RSE) version <= 4.5.400 has a remote code execution vulnerability that does not require authentication.
The fixed version is included in Eclipse IDE 2024-03
| [
"cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-fp6q-p4pg-p977 | Opera before 11.10 does not properly handle hidden animated GIF images, which allows remote attackers to cause a denial of service (CPU consumption) via an image file that triggers continual repaints. | [] | null | null | null | null |
|
GHSA-22j9-95fq-2m3h | IBM Cognos Analytics 11.0 and 11.1 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or cause the web server to make HTTP requests to arbitrary domains. IBM X-Force ID: 147369. | [] | null | 8.8 | null | null |
|
CVE-2013-0590 | Cross-site scripting (XSS) vulnerability in iNotes 8.5.x in IBM Lotus Domino 8.5 before 8.5.3 FP5 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, aka SPR PTHN95XNR3, a different vulnerability than CVE-2013-0591. | [
"cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:8.5.3.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-rgpr-w35w-547v | In Bravo Tejari Procurement Portal, uploaded files are not properly validated by the application either on the client or the server side. An attacker can take advantage of this vulnerability and upload malicious executable files to compromise the application, as demonstrated by an esop/evm/OPPreliminaryForms.do?formId=857 request. | [] | null | null | 8.8 | null |
|
GHSA-276r-jxx7-v78h | Use after free in Browser UI in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who had convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific user interactions. | [] | null | 8.8 | null | null |
|
CVE-2023-36710 | Windows Media Foundation Core Remote Code Execution Vulnerability | Windows Media Foundation Core Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2017-15307 | Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on specific device information. | [
"cpe:2.3:o:huawei:honor_8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_8:-:*:*:*:*:*:*:*"
] | null | null | 2.3 | 1.9 |
|
CVE-2023-3622 | Access Control Bypass Vulnerability in the SolarWinds Platform |
Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read arbitrary resource | [
"cpe:2.3:a:solarwinds:solarwinds_platform:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2023-28731 | Unauthenticated RCE affecting the AcyMailing plugin for Joomla | AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected.
This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.
| [
"cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:joomla\\!:*:*"
] | null | 9.8 | null | null |
CVE-2007-0149 | EMembersPro 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for users.mdb. | [
"cpe:2.3:a:ememberspro:ememberspro:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2011-0909 | Cross-site scripting (XSS) vulnerability in Vanilla Forums before 2.0.17.6 allows remote attackers to inject arbitrary web script or HTML via the p parameter to an unspecified component, a different vulnerability than CVE-2011-0526. | [
"cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vanillaforums:vanilla:2.0.17.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8668-w4w3-r36q | SQL injection vulnerability in index.php in Hi Web Wiesbaden Live Shopping Multi Portal System allows remote attackers to execute arbitrary SQL commands via the artikel parameter. | [] | null | null | null | null |
|
CVE-2024-48860 | QHora | An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.
We have already fixed the vulnerability in the following version:
QuRouter 2.4.3.103 and later | [
"cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"
] | 9.5 | null | null | null |
GHSA-vmrr-46g9-357m | Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution. | [] | null | 7.5 | null | null |
|
GHSA-rj4r-5q3x-jcjp | Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page. | [] | null | 6.5 | null | null |
|
GHSA-mphw-9ggw-rxxh | Cross-site scripting (XSS) vulnerability in the Adobe Flex SDK 3.x and 4.x before 4.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to the loading of modules from different domains. | [] | null | null | null | null |
|
GHSA-qff9-cfrr-c89x | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 8.8 | null |
|
GHSA-cqw2-wf8p-j3j7 | A denial of service vulnerability in the Android media framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36592202. | [] | null | null | 5.5 | null |
|
GHSA-9v2q-q88j-mr44 | Cross-Site Request Forgery (CSRF) vulnerability in WP Sunshine Sunshine Photo Cart plugin <= 2.9.13 versions. | [] | null | 8.8 | null | null |
|
GHSA-xcrr-x93h-rv4v | Arbitrary file deletion vulnerability in Jenkins Scriptler Plugin | Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system. | [] | null | 8.1 | null | null |
RHSA-2011:1798 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update | Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
CVE-2024-37001 | Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software | A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-4343-6j55-fcq3 | In shouldBlockFromTree of ExternalStorageProvider.java, there is a possible permissions bypass. This could lead to local escalation of privilege, allowing an app to read private app directories in external storage, which should be restricted in Android 11, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157320644 | [] | null | 7.8 | null | null |
|
GHSA-wj5f-6f57-f3p5 | piwigo has XSS in password.php | [] | null | null | null | null |
|
GHSA-6g65-3cf7-chxv | A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user's home or the installation of third party global themes. | [] | null | 3.1 | null | null |
|
GHSA-j8j2-69r7-q88p | The WS Form LITE and Pro WordPress plugins before 1.8.176 do not sanitise and escape submitted form data, allowing unauthenticated attacker to submit XSS payloads which will get executed when a privileged user will view the related submission | [] | null | 6.1 | null | null |
|
CVE-2021-21144 | Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2008-1550 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in CubeCart 4.2.1 allow remote attackers to inject arbitrary web script or HTML via (1) the _a parameter in a searchStr action and the (2) Submit parameter. | [
"cpe:2.3:a:cubecart:cubecart:4.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gg9r-7879-9jhr | Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. | [] | null | null | null | null |
|
GHSA-qh2h-wv23-f83f | An authenticated Path Traversal vulnerability exists in Instant AOS-8 and AOS-10. Successful exploitation of this vulnerability allows an attacker to copy arbitrary files to a user readable location from the command line interface of the underlying operating system, which could lead to a remote unauthorized access to files. | [] | null | 6.8 | null | null |
|
GHSA-xhfg-9rjc-3pv6 | Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | [] | null | null | 6.5 | null |
|
CVE-2021-20374 | IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 195522. | [
"cpe:2.3:a:ibm:maximo_asset_management:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
|
GHSA-j9rc-2hv9-v5v8 | In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUID binary. An attacker can abuse this vulnerability to know if a directory exists or not anywhere in the fs. The binary will use `opendir()` as root directly without checking the path, letting the attacker provide an arbitrary path. | [] | null | 3.3 | null | null |
|
CVE-2020-10277 | RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation | There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine. | [
"cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*"
] | null | null | 6.4 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.