id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-3869
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'woocommerce_json_search_coupons' function . This makes it possible for attackers with subscriber level access to view coupon codes.
[]
null
4.3
null
null
GHSA-293r-f52g-2w34
Macromedia Dreamweaver uses weak encryption to store FTP passwords, which could allow local users to easily decrypt the passwords of other users.
[]
null
null
null
null
GHSA-hh4m-7c6g-g8m7
Double free vulnerability in the ftpprchild function in ftppr in 3proxy 0.5 through 0.5.3i allows remote attackers to cause a denial of service (daemon crash) via multiple OPEN commands to the FTP proxy.
[]
null
null
null
null
GHSA-hhg9-7r53-5rpr
Memory leak in Simple Network Management Protocol (SNMP) agent (snmp.exe) for Windows NT 4.0 before Service Pack 4 allows remote attackers to cause a denial of service (memory consumption) via a large number of SNMP packets with Object Identifiers (OIDs) that cannot be decoded.
[]
null
null
null
null
GHSA-jxcg-2g7w-v53p
Kaseya Traverse before 9.5.20 allows OS command injection attacks against user accounts, associated with a Netflow Top Applications reporting API call. This is exploitable by an authenticated attacker who submits a modified JSON field within POST data.
[]
null
null
null
null
CVE-2022-0555
Subiquity Shows Guided Storage Passphrase in Plaintext with Read-all Permissions
[ "cpe:2.3:a:canonical:subiquity:*:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-9rfq-ff3x-cwxp
The iMember360 plugin 3.8.012 through 3.9.001 for WordPress does not properly restrict access, which allows remote attackers to delete arbitrary users via a request containing a user name in the Email parameter and the API key in the i4w_clearuser parameter.
[]
null
null
null
null
GHSA-x4xc-8g7v-c85h
The SiteGround Security WordPress plugin before 1.3.1 does not properly sanitize user input before using it in an SQL query, leading to an authenticated SQL injection issue.
[]
null
8.8
null
null
GHSA-ccx5-jh35-2p3c
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
[]
null
7.8
null
null
GHSA-qphq-c5f9-q7v9
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Iqonic Design WP Roadmap – Product Feedback Board allows Stored XSS.This issue affects WP Roadmap – Product Feedback Board: from n/a through 1.0.8.
[]
null
5.9
null
null
CVE-2009-2022
fipsCMS Light 2.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file and obtain sensitive information via a direct request for _fipsdb/db.mdb.
[ "cpe:2.3:a:fipsasp:fipscms_light:2.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2012-2864
Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.5:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.6:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.7:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.8:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.9:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.10:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.11:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.13:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.14:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.15:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.17:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.18:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.31:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.32:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.33:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.34:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.35:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.36:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.37:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.38:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.39:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.41:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.46:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.47:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.48:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.49:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.50:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:21.0.1180.79:*:*:*:*:*:*:*", "cpe:2.3:h:acer:ac700_chromebook:-:*:*:*:*:*:*:*", "cpe:2.3:h:google:cr-48_chromebook:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:series_5_550_chromebook:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:series_5_chromebook:-:*:*:*:*:*:*:*" ]
null
null
null
10
RHSA-2024:8337
Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.2 for RHEL 9
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:run_once_duration_override_operator:1.1::el9" ]
null
5.9
null
null
CVE-2024-38274
moodle: stored XSS via calendar's event title when deleting the event
Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.
[]
null
6.1
null
null
CVE-2023-42782
A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number.
[ "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer-bigdata:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*" ]
null
5
null
null
CVE-2022-47332
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2014:2009
Red Hat Security Advisory: kernel security update
kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
8.4
null
GHSA-7j7c-vr66-8955
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120276962
[]
null
7.5
null
null
GHSA-6hj3-2gfg-5j44
A stored cross-site scripting (XSS) vulnerability in the Inline Table Editing application before 3.8.0 for Confluence allows attackers to store and execute arbitrary JavaScript via a crafted payload injected into the tables.
[]
null
5.4
null
null
GHSA-m9gr-8xj6-cq2p
phpcart.php in PHPCart 3.2 allows remote attackers to change product price information by modifying the (1) price or (2) postage parameters. NOTE: it was later reported that 3.4 through 4.6.4 are also affected.
[]
null
null
null
null
CVE-2008-4705
SQL injection vulnerability in success_story.php in php Online Dating Software MyPHPDating allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:phponlinedatingsoftware:myphpdating:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-9jhm-8m8c-c3f4
SSRF in Sydent due to missing validation of hostnames
ImpactSydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.PatchesFixed in 9e57334, 8936925, 3d531ed, 0f00412WorkaroundsA potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.For more informationIf you have any questions or comments about this advisory, email us at [email protected].
[]
6.3
7.7
null
null
CVE-2019-12243
Istio 1.1.x through 1.1.6 has Incorrect Access Control.
[ "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*" ]
null
null
7.5
5.4
GHSA-rvjp-mhp8-5xmw
The Where Did You Hear About Us Checkout Field for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via order meta in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with shop manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.5
null
null
CVE-2017-1000187
In SWFTools, an address access exception was found in pdf2swf. FoFiTrueType::writeTTF()
[ "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.3
CVE-2024-52676
Itsourcecode Online Discussion Forum Project v.1.0.0 is vulnerable to Cross Site Scripting (XSS) via /bcc_forum/members/home.php.
[ "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2004-0032
Cross-site scripting (XSS) vulnerability in search.php in PHPGEDVIEW 2.61 allows remote attackers to inject arbitrary HTML and web script via the firstname parameter.
[ "cpe:2.3:a:phpgedview:phpgedview:2.61:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-6jvf-9896-2hgg
Cross-site scripting (XSS) vulnerability in the htp PL/SQL package for Oracle 9i Application Server (9iAS) allows remote attackers to inject arbitrary web script or HTML via the cbuf parameter to htp.print.
[]
null
null
null
null
CVE-2014-8451
An unspecified JavaScript API in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2014-8448.
[ "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.01:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.02:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.03:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.04:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.05:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.06:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.07:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.08:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.09:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-4hxw-v2j3-4qv8
An issue in the component route\user.php of Xiuno BBS v4.0.4 allows attackers to enumerate usernames.
[]
null
null
null
null
CVE-2015-2449
Microsoft Internet Explorer 7 through 11 and Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "ASLR Bypass."
[ "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2025-27525
Information Exposure vulnerability in JP1/IT Desktop Management 2 - Smart Device Manager
Information Exposure vulnerability in Hitachi JP1/IT Desktop Management 2 - Smart Device Manager on Windows.This issue affects JP1/IT Desktop Management 2 - Smart Device Manager: from 12-00 before 12-00-08, from 11-10 through 11-10-08, from 11-00 through 11-00-05, from 10-50 through 10-50-06.
[]
null
3.9
null
null
GHSA-wjqw-p7j2-5gx2
The Intellian C700 web panel allows you to add firewall rules. Each of these rules has an associated ID, but there is a problem when adding a new rule, the ID used to create the database entry may be different from the JSON ID. If the rule needs to be deleted later, the system will use the JSON ID and therefore fail. This can be exploited by an attacker to create rules that cannot be deleted unless the device is reset to factory defaults.
[]
6.3
null
null
null
CVE-2024-7375
SourceCodester Simple Realtime Quiz System my_quiz_result.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Realtime Quiz System 1.0. This issue affects some unknown processing of the file /my_quiz_result.php. The manipulation of the argument quiz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273359.
[ "cpe:2.3:a:sourcecodester:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-7jh2-q8mj-7c4r
The Chained Quiz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.2.4. This is due to missing nonce validation on the manage() function. This makes it possible for unauthenticated attackers to delete submitted quiz responses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2007-2918
Multiple stack-based buffer overflows in ActiveX controls (1) VibeC in (a) vibecontrol.dll, (2) CallManager and (3) ViewerClient in (b) StarClient.dll, (4) ComLink in (c) uicomlink.dll, and (5) WebCamXMP in (d) wcamxmp.dll in Logitech VideoCall allow remote attackers to cause a denial of service (browser crash) and execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:logitech:videocall:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-pjx7-3rv2-9x45
** DISPUTED ** OctoPrint through 1.3.9 allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests on port 8081. NOTE: the vendor disputes the significance of this report because their documentation states that with "blind port forwarding ... Putting OctoPrint onto the public internet is a terrible idea, and I really can't emphasize that enough."
[]
null
null
9.1
null
GHSA-fcw6-ccq2-f46p
The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some of its Testimonial fields before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. The attack requires a specific view to be performed
[]
null
4.8
null
null
GHSA-2x27-qff4-6hf8
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
CVE-2023-50481
An issue was discovered in blinksocks version 3.3.8, allows remote attackers to obtain sensitive information via weak encryption algorithms in the component /presets/ssr-auth-chain.js.
[ "cpe:2.3:a:blinksocks:blinksocks:3.3.8:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2023-33318
WordPress WooCommerce Follow-Up Emails Plugin <= 4.9.40 is vulnerable to Arbitrary File Upload
Unrestricted Upload of File with Dangerous Type vulnerability in WooCommerce AutomateWoo.This issue affects AutomateWoo: from n/a through 4.9.40.
[ "cpe:2.3:a:woocommerce:automatewoo:*:*:*:*:*:wordpress:*:*" ]
null
9.9
null
null
CVE-2024-47326
WordPress Share This Image plugin <= 2.01 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ILLID Share This Image allows Reflected XSS.This issue affects Share This Image: from n/a through 2.01.
[]
null
7.1
null
null
CVE-2022-48879
efi: fix NULL-deref in init error path
In the Linux kernel, the following vulnerability has been resolved: efi: fix NULL-deref in init error path In cases where runtime services are not supported or have been disabled, the runtime services workqueue will never have been allocated. Do not try to destroy the workqueue unconditionally in the unlikely event that EFI initialisation fails to avoid dereferencing a NULL pointer.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-q4p6-fc6x-phmp
Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.
[]
null
null
7.2
null
GHSA-882q-wcp5-p64r
Cross-Site Request Forgery (CSRF) vulnerability in JumpDEMAND Inc. ActiveDEMAND.This issue affects ActiveDEMAND: from n/a through 0.2.43.
[]
null
4.3
null
null
CVE-2020-7129
A remote execution of arbitrary commands vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
[ "cpe:2.3:a:arubanetworks:airwave_glass:*:*:*:*:*:*:*:*" ]
null
7.2
null
9
CVE-2017-14375
EMC Unisphere for VMAX Virtual Appliance (vApp) versions prior to 8.4.0.15, EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.15, EMC VASA Virtual Appliance versions prior to 8.4.0.512, and EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4 (Enginuity Release 5977.1125.1125 and earlier) contain an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the affected system.
[ "cpe:2.3:a:dell:emc_unisphere:*:*:*:*:*:vmax:*:*", "cpe:2.3:a:emc:solutions_enabler:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:vasa:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:vmax_emanagement:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
RHSA-2019:1421
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.2 on RHEL 8 security update
picketlink: reflected XSS in SAMLRequest via RelayState parameter picketlink: URL injection via xinclude parameter undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
null
5.3
null
CVE-2023-38020
IBM SOAR QRadar Plugin App log injection
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576.
[ "cpe:2.3:a:ibm:soar_qradar_plugin_app:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
GHSA-mhm3-7xrh-62qv
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Hero Mega Menu - Responsive WordPress Menu Plugin allows Reflected XSS. This issue affects Hero Mega Menu - Responsive WordPress Menu Plugin: from n/a through 1.16.5.
[]
null
7.1
null
null
GHSA-wvhm-r52c-qwwh
Incomplete filtering of JavaScript code in different configuration fields of the web based interface of the VIDEOJET multi 4000 allows an attacker with administrative credentials to store JavaScript code which will be executed for all administrators accessing the same configuration option.
[]
null
4.8
null
null
GHSA-fw7h-2grr-4rjq
KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code.
[]
null
5.4
null
null
CVE-2024-31204
mailcow Cross-site Scripting Vulnerability via Exception Handler
mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability resides in the exception handling mechanism, specifically when not operating in DEV_MODE. The system saves exception details into a session array without proper sanitization or encoding. These details are later rendered into HTML and executed in a JavaScript block within the user's browser, without adequate escaping of HTML entities. This flaw allows for Cross-Site Scripting (XSS) attacks, where attackers can inject malicious scripts into the admin panel by triggering exceptions with controlled input. The exploitation method involves using any function that might throw an exception with user-controllable argument. This issue can lead to session hijacking and unauthorized administrative actions, posing a significant security risk. Version 2024-04 contains a fix for the issue.
[ "cpe:2.3:a:mailcow:mailcow_dockerized:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-m7h8-8q5m-8g9r
An issue was discovered in SolarWinds N-Central 12.3.0.670. The local database does not require authentication: security is only based on ability to access a network interface. The database has keys and passwords.
[]
null
null
null
null
CVE-2024-13619
LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes < 8.0.1 - Reflected XSS
The LifterLMS WordPress plugin before 8.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
null
6.1
null
null
GHSA-ppg2-hw6f-p95v
Cisco Unified Communications Manager (UCM) 8.0 through 8.6 allows remote attackers to bypass an XSS protection mechanism via a crafted parameter, aka Bug ID CSCuu15266.
[]
null
null
null
null
GHSA-4mf2-f3wh-gvf2
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy
Impact_What kind of vulnerability is it? Who is impacted?_ For users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect.For example, if a whitelist domain was configured for `.example.com`, the intention is that subdomains of `example.com` are allowed. Instead, `example.com` and `badexample.com` could also match.Patches_Has the problem been patched? What versions should users upgrade to?_ This is fixed in version 7.0.0 onwards.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_ Disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain.Original Issue Posted by @semoac:Whitelist Domain feature is not working as expected because is not matching a dot to ensure the redirect is a subdomain.Expected BehaviorIf whitelist domain is set to `.example.com` , then `hack.alienexample.com` should be rejected as a valid redirect.Current BehaviorThe code is removing the `dot` from `.example.com` and only checking if the redirect string end with `example.com`Possible SolutionHere https://github.com/oauth2-proxy/oauth2-proxy/blob/c377466411f2aee180a732187edb638f2f7e57fb/oauthproxy.go#L661Include the dot when checking the string:Steps to Reproduce (for bugs)Users of `github.com/oauth2-proxy/oauth2-proxy` are advised to update to `github.com/oauth2-proxy/oauth2-proxy/v7`
[]
null
5.4
null
null
CVE-2015-6596
mediaserver in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bugs 20731946 and 20719651, a different vulnerability than CVE-2015-7717.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-36jv-w59f-85w3
The WP Maps WordPress plugin before 4.7.2 does not sanitise and escape some of its Map settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
3.5
null
null
GHSA-ffx4-qrmq-w356
Missing Authorization vulnerability in Saturday Drive Ninja Forms.This issue affects Ninja Forms: from n/a through 3.6.25.
[]
null
7.6
null
null
GHSA-wggh-6fmq-953v
Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command.
[]
null
null
5.9
null
GHSA-25rw-v6g3-5hgc
Multiple race conditions in the CPU Performance Counters (cpc) subsystem in the kernel in Sun Solaris 10 allow local users to cause a denial of service (panic) via unspecified vectors related to kcpc_unbind and kcpc_restore.
[]
null
null
null
null
CVE-2021-29047
The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.
[ "cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.3.5:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-4h9w-7r8x-ppq7
FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections.
[]
null
null
null
null
GHSA-4xvx-54qc-h5fx
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Pearl - Corporate Business allows PHP Local File Inclusion.This issue affects Pearl - Corporate Business: from n/a before 3.4.8.
[]
null
8.1
null
null
CVE-2024-0740
Eclipse Target Management <= 4.5.500 Command Injection
Eclipse Target Management: Terminal and Remote System Explorer (RSE) version <= 4.5.400 has a remote code execution vulnerability that does not require authentication. The fixed version is included in Eclipse IDE 2024-03
[ "cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-fp6q-p4pg-p977
Opera before 11.10 does not properly handle hidden animated GIF images, which allows remote attackers to cause a denial of service (CPU consumption) via an image file that triggers continual repaints.
[]
null
null
null
null
GHSA-22j9-95fq-2m3h
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or cause the web server to make HTTP requests to arbitrary domains. IBM X-Force ID: 147369.
[]
null
8.8
null
null
CVE-2013-0590
Cross-site scripting (XSS) vulnerability in iNotes 8.5.x in IBM Lotus Domino 8.5 before 8.5.3 FP5 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, aka SPR PTHN95XNR3, a different vulnerability than CVE-2013-0591.
[ "cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.0:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-rgpr-w35w-547v
In Bravo Tejari Procurement Portal, uploaded files are not properly validated by the application either on the client or the server side. An attacker can take advantage of this vulnerability and upload malicious executable files to compromise the application, as demonstrated by an esop/evm/OPPreliminaryForms.do?formId=857 request.
[]
null
null
8.8
null
GHSA-276r-jxx7-v78h
Use after free in Browser UI in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who had convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific user interactions.
[]
null
8.8
null
null
CVE-2023-36710
Windows Media Foundation Core Remote Code Execution Vulnerability
Windows Media Foundation Core Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2017-15307
Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on specific device information.
[ "cpe:2.3:o:huawei:honor_8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_8:-:*:*:*:*:*:*:*" ]
null
null
2.3
1.9
CVE-2023-3622
Access Control Bypass Vulnerability in the SolarWinds Platform
Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read arbitrary resource
[ "cpe:2.3:a:solarwinds:solarwinds_platform:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2023-28731
Unauthenticated RCE affecting the AcyMailing plugin for Joomla
AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.
[ "cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:joomla\\!:*:*" ]
null
9.8
null
null
CVE-2007-0149
EMembersPro 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for users.mdb.
[ "cpe:2.3:a:ememberspro:ememberspro:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2011-0909
Cross-site scripting (XSS) vulnerability in Vanilla Forums before 2.0.17.6 allows remote attackers to inject arbitrary web script or HTML via the p parameter to an unspecified component, a different vulnerability than CVE-2011-0526.
[ "cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:vanillaforums:vanilla:2.0.17.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-8668-w4w3-r36q
SQL injection vulnerability in index.php in Hi Web Wiesbaden Live Shopping Multi Portal System allows remote attackers to execute arbitrary SQL commands via the artikel parameter.
[]
null
null
null
null
CVE-2024-48860
QHora
An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.3.103 and later
[ "cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*" ]
9.5
null
null
null
GHSA-vmrr-46g9-357m
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.
[]
null
7.5
null
null
GHSA-rj4r-5q3x-jcjp
Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.
[]
null
6.5
null
null
GHSA-mphw-9ggw-rxxh
Cross-site scripting (XSS) vulnerability in the Adobe Flex SDK 3.x and 4.x before 4.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to the loading of modules from different domains.
[]
null
null
null
null
GHSA-qff9-cfrr-c89x
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
8.8
null
GHSA-cqw2-wf8p-j3j7
A denial of service vulnerability in the Android media framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36592202.
[]
null
null
5.5
null
GHSA-9v2q-q88j-mr44
Cross-Site Request Forgery (CSRF) vulnerability in WP Sunshine Sunshine Photo Cart plugin <= 2.9.13 versions.
[]
null
8.8
null
null
GHSA-xcrr-x93h-rv4v
Arbitrary file deletion vulnerability in Jenkins Scriptler Plugin
Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.
[]
null
8.1
null
null
RHSA-2011:1798
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update
Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
CVE-2024-37001
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
[ "cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-4343-6j55-fcq3
In shouldBlockFromTree of ExternalStorageProvider.java, there is a possible permissions bypass. This could lead to local escalation of privilege, allowing an app to read private app directories in external storage, which should be restricted in Android 11, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157320644
[]
null
7.8
null
null
GHSA-wj5f-6f57-f3p5
piwigo has XSS in password.php
[]
null
null
null
null
GHSA-6g65-3cf7-chxv
A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user's home or the installation of third party global themes.
[]
null
3.1
null
null
GHSA-j8j2-69r7-q88p
The WS Form LITE and Pro WordPress plugins before 1.8.176 do not sanitise and escape submitted form data, allowing unauthenticated attacker to submit XSS payloads which will get executed when a privileged user will view the related submission
[]
null
6.1
null
null
CVE-2021-21144
Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2008-1550
Multiple cross-site scripting (XSS) vulnerabilities in index.php in CubeCart 4.2.1 allow remote attackers to inject arbitrary web script or HTML via (1) the _a parameter in a searchStr action and the (2) Submit parameter.
[ "cpe:2.3:a:cubecart:cubecart:4.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-gg9r-7879-9jhr
Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
[]
null
null
null
null
GHSA-qh2h-wv23-f83f
An authenticated Path Traversal vulnerability exists in Instant AOS-8 and AOS-10. Successful exploitation of this vulnerability allows an attacker to copy arbitrary files to a user readable location from the command line interface of the underlying operating system, which could lead to a remote unauthorized access to files.
[]
null
6.8
null
null
GHSA-xhfg-9rjc-3pv6
Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
[]
null
null
6.5
null
CVE-2021-20374
IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 195522.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.1:*:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-j9rc-2hv9-v5v8
In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUID binary. An attacker can abuse this vulnerability to know if a directory exists or not anywhere in the fs. The binary will use `opendir()` as root directly without checking the path, letting the attacker provide an arbitrary path.
[]
null
3.3
null
null
CVE-2020-10277
RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
[ "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*" ]
null
null
6.4
null