id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-49083
|
iommu/omap: Fix regression in probe for NULL pointer dereference
|
In the Linux kernel, the following vulnerability has been resolved:
iommu/omap: Fix regression in probe for NULL pointer dereference
Commit 3f6634d997db ("iommu: Use right way to retrieve iommu_ops") started
triggering a NULL pointer dereference for some omap variants:
__iommu_probe_device from probe_iommu_group+0x2c/0x38
probe_iommu_group from bus_for_each_dev+0x74/0xbc
bus_for_each_dev from bus_iommu_probe+0x34/0x2e8
bus_iommu_probe from bus_set_iommu+0x80/0xc8
bus_set_iommu from omap_iommu_init+0x88/0xcc
omap_iommu_init from do_one_initcall+0x44/0x24
This is caused by omap iommu probe returning 0 instead of ERR_PTR(-ENODEV)
as noted by Jason Gunthorpe <[email protected]>.
Looks like the regression already happened with an earlier commit
6785eb9105e3 ("iommu/omap: Convert to probe/release_device() call-backs")
that changed the function return type and missed converting one place.
|
[] | null | null | null | null | null |
GHSA-3w5h-x4rh-hc28
|
Exposure of sensitive information in Apache Ozone
|
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
|
[] | null | 9.1 | null | null | null |
CVE-2006-1928
|
Cisco IOS XR, when configured for Multi Protocol Label Switching (MPLS) and running on Cisco CRS-1 routers, allows remote attackers to cause a denial of service (Modular Services Cards (MSC) crash or "MPLS packet handling problems") via certain MPLS packets, as identified by Cisco bug IDs (1) CSCsd15970 and (2) CSCsd55531.
|
[
"cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.3:*:crs-1:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.3:*:prp:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-27qh-h38r-jf2v
|
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
|
[] | null | 6.1 | null | null | null |
|
CVE-2001-1472
|
SQL injection vulnerability in prefs.php in phpBB 1.4.0 and 1.4.1 allows remote authenticated users to execute arbitrary SQL commands and gain administrative access via the viewemail parameter.
|
[
"cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2018-12265
|
Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
|
[
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2023-32321
|
CKAN remote code execution and private information access via crafted resource ids
|
CKAN is an open-source data management system for powering data hubs and data portals. Multiple vulnerabilities have been discovered in Ckan which may lead to remote code execution. An arbitrary file write in `resource_create` and `package_update` actions, using the `ResourceUploader` object. Also reachable via `package_create`, `package_revise`, and `package_patch` via calls to `package_update`. Remote code execution via unsafe pickle loading, via Beaker's session store when configured to use the file session store backend. Potential DOS due to lack of a length check on the resource id. Information disclosure: A user with permission to create a resource can access any other resource on the system if they know the id, even if they don't have access to it. Resource overwrite: A user with permission to create a resource can overwrite any resource if they know the id, even if they don't have access to it. A user with permissions to create or edit a dataset can upload a resource with a specially crafted id to write the uploaded file in an arbitrary location. This can be leveraged to Remote Code Execution via Beaker's insecure pickle loading. All the above listed vulnerabilities have been fixed in CKAN 2.9.9 and CKAN 2.10.1. Users are advised to upgrade. There are no known workarounds for these issues.
|
[
"cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*",
"cpe:2.3:a:okfn:ckan:2.10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-94g7-q96f-v54w
|
TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.
|
[] | null | 9.1 | null | null | null |
|
CVE-2020-11130
|
u'Possible buffer overflow in WIFI hal process due to copying data without checking the buffer length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P
|
[
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6115_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6115:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6115p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8350p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8350p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130p:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2007-6690
|
The Gallery Remote module in Menalto Gallery before 2.2.4 does not check permissions for unspecified GR commands, which has unknown impact and attack vectors.
|
[
"cpe:2.3:a:menalto:gallery:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-q7mf-27fr-frgh
|
WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768.
|
[] | null | null | 8.8 | null | null |
|
GHSA-mf89-9mq2-mmp2
|
Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
|
[] | null | null | 8.8 | null | null |
|
RHSA-2009:1560
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) JRE TrueType font parsing crash (6815780) java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752) java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824) java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265) REGRESSION: have problem to run JNLP app and applets with signed Jar files (6870531)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null | null |
CVE-2020-35730
|
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
|
[
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2023-29451
|
Denial of service caused by a bug in the JSON parser
|
Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
|
[
"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:6.4.0:rc4:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
GHSA-m337-hwf6-792v
|
An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions.
|
[] | null | null | 7 | null | null |
|
GHSA-6p82-v9w6-85gx
|
hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
|
[] | null | 5.5 | null | null | null |
|
GHSA-gvhg-3pf3-w95c
|
A remote xss vulnerability was discovered in HPE Integrated Lights-Out 4 (iLO 4); HPE SimpliVity 380 Gen9; HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers; HPE SimpliVity 380 Gen10; HPE SimpliVity 2600; HPE SimpliVity 380 Gen10 G; HPE SimpliVity 325; HPE SimpliVity 380 Gen10 H version(s): Prior to version 2.78.
|
[] | null | null | null | null | null |
|
GHSA-hc53-8x9j-fg2x
|
The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-xr6g-q8cc-8f25
|
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Filterable Controls label icon parameter in all versions up to, and including, 5.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
RHSA-2024:1686
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 for OpenShift image security update
|
libmaxminddb: improper initialization in dump_entry_data_list() in maxminddb.c nss: vulnerable to Minerva side-channel information leak pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 9.8 | null | null | null |
CVE-2025-6003
|
WordPress Single Sign-On (SSO) - Multiple Versions - Incorrect Authorization to Sensitive Information Exposure
|
The WordPress Single Sign-On (SSO) plugin for WordPress is vulnerable to unauthorized access due to a misconfigured capability check on a function in all versions up to, and including, the *.5.3 versions of the plugin. This makes it possible for unauthenticated attackers to extract sensitive data including site content that has been restricted to certain users and/or roles.
|
[] | null | 5.3 | null | null | null |
GHSA-pjgh-f3xj-rv83
|
A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles 3D annotations. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
|
[] | null | 8.8 | null | null | null |
|
CVE-2020-4200
|
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 could allow an authenticated attacker to send specially crafted commands to cause a denial of service. IBM X-Force ID: 174914.
|
[
"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
|
GHSA-vgg3-fwvm-x7q7
|
Memory corruption while reading a value from a buffer controlled by the Guest Virtual Machine.
|
[] | null | 7.8 | null | null | null |
|
GHSA-73rg-f94j-xvhx
|
Plate allows arbitrary DOM attributes in element.attributes and leaf.attributes
|
ImpactOne longstanding feature of Plate is the ability to add custom DOM attributes to any element or leaf using the `attributes` property. These attributes are passed to the node component using the `nodeProps` prop.Note: The `attributes` prop that is typically rendered alongside `nodeProps` is unrelated.It has come to our attention that this feature can be used for malicious purposes, including cross-site scripting (XSS) and information exposure (specifically, users' IP addresses and whether or not they have opened a malicious document).Note that the risk of information exposure via `attributes` is only relevant to applications in which web requests to arbitrary URLs are not ordinarily allowed. Plate editors that allow users to embed images from arbitrary URLs, for example, already carry the risk of leaking users' IP addresses to third parties.All Plate editors using an affected version of `@udecode/plate-core` are vulnerable to these information exposure attacks via the `style` attribute and other attributes that can cause web requests to be sent.In addition, whether or not a Plate editor is vulnerable to cross-site scripting attacks using `attributes` depends on a number of factors. The most likely DOM attributes to be vulnerable are `href` and `src` on links and iframes respectively. Any component that spreads `{...nodeProps}` onto an `<a>` or `<iframe>` element and does not later override `href` or `src` will be vulnerable to XSS.React does not allow passing a string to event handler props like `onClick`, so these are unlikely (but not impossible) to be vulnerable.The attack surface is larger for users running older browsers, which may be vulnerable to XSS in DOM attributes that are less dangerous (although still vulnerable to information exposure) in modern browsers such as `style` or `background`.Potential attack vectors for delivering malicious Slate content to users include:Opening a malicious document stored on the serverPasting a malicious Slate fragment into a documentReceiving malicious Slate operations on a collaborative documentPatchesIn patched versions of Plate, we have disabled `element.attributes` and `leaf.attributes` for most attribute names by default, with some exceptions including `target`, `alt`, `width`, `height`, `colspan` and `rowspan` on the link, image, video, table cell and table header cell plugins.If this is a breaking change for you, you can selectively re-enable `attributes` for certain plugins as follows. Please carefully research and assess the security implications of any attribute you allow, as even seemingly innocuous attributes such as `style` can be used maliciously.Plate >= 37For custom plugins, specify the list of allowed attribute names in the `node.dangerouslyAllowAttributes` plugin configuration option.To modify an existing plugin, use the `extend` method.Plate < 37Note that the patch has been backported to versions `@udecode/[email protected]` and `@udecode/[email protected]` only.For custom plugins, specify the list of allowed attribute names in the `dangerouslyAllowAttributes` plugin configuration option.To modify an existing plugin, pass `dangerouslyAllowAttributes` to the plugin factory.WorkaroundsIf you are unable to upgrade to any of the patched versions, you should use a tool like [`patch-package`](https://www.npmjs.com/package/patch-package) or [`yarn patch`](https://yarnpkg.com/cli/patch) to remove the logic from `@udecode/plate-core` that adds `attributes` to `nodeProps`.This logic can be found in the `getRenderNodeProps` function and looks something like this. The entire `if` statment can safely be removed.After applying the patch, be sure to test its effectiveness by rendering a Slate value containing an `attributes` property on some element.If the patch was successful, the `data-vulnerable="true"` attribute should not be present on any DOM element when the Plate editor is rendered in the browser.
|
[] | 8.7 | 8.3 | null | null | null |
CVE-2023-4535
|
Opensc: out-of-bounds read in myeid driver handling encryption using symmetric keys
|
An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.
|
[
"cpe:2.3:a:opensc_project:opensc:0.23.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensc_project:opensc:0.23.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:opensc_project:opensc:0.23.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8"
] | null | 4.5 | null | null | null |
GHSA-3823-wj6r-jpc9
|
gopher.c in the Gopher client 3.0.5 does not properly create temporary files, which allows local users to gain privileges.
|
[] | null | null | null | null | null |
|
GHSA-fm3m-9484-8h7w
|
Substance3D - Stager versions 3.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
ICSA-23-313-02
|
Hitachi Energy eSOMS
|
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be abused for enumerating the local file system structure. The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against web servers and deployed web applications. Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints, backend server, Internal IP. etc., which could expose additional attack surface containing other vulnerabilities.
|
[] | null | 5.3 | null | null | null |
GHSA-cpq7-q5w3-h8c8
|
** DISPUTED ** A vulnerability has been found in Microsoft O365 and classified as critical. The session cookies introduce a session expiration issue as they might be used by two clients at the same time. The attack can be initiated remotely. Exploit details have been disclosed to the public. The real-world consequences of this vulnerability are still doubted at the moment. It is recommended to change the configuration settings. NOTE: Vendor claims that pre-requisites are very high, the feature works as intended, and that configuration settings might mitigate the issue.
|
[] | null | 8.8 | null | null | null |
|
GHSA-rm46-c34m-6jvf
|
Artica Pandora FMS 7.44 allows remote command execution via the events feature.
|
[] | null | 8.8 | null | null | null |
|
CVE-2011-1131
|
The PlushSearch2 function in Search.php in Simple Machines Forum (SMF) before 1.1.13, and 2.x before 2.0 RC5, uses certain cached data in a situation where a temporary table has been created, even though this cached data is intended only for situations where a temporary table has not been created, which might allow remote attackers to obtain sensitive information via a search.
|
[
"cpe:2.3:a:simplemachines:smf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0:beta4.1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:beta4:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:beta2.1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:beta3.1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:simplemachines:smf:2.0:rc4:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-45086
|
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js.
|
[
"cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-vh2f-q9g6-wv38
|
Themeflection Numbers WordPress plugin before 2.0.1 does not have authorisation and CSRF check in an AJAX action, and does not ensure that the options to be updated belong to the plugin. As a result, it could allow any authenticated users, such as subscriber, to update arbitrary blog options, such as enabling registration and set the default role to administrator
|
[] | null | 6.5 | null | null | null |
|
CVE-2014-0085
|
JBoss Fuse did not enable encrypted passwords by default in its usage of Apache Zookeeper. This permitted sensitive information disclosure via logging to local users. Note: this description has been updated; previous text mistakenly identified the source of the flaw as Zookeeper. Previous text: Apache Zookeeper logs cleartext admin passwords, which allows local users to obtain sensitive information by reading the log.
|
[
"cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
ICSA-21-334-03
|
Delta Electronics CNCSoft
|
The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.CVE-2021-43982 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
ICSA-14-008-01
|
Ecava Sdn Bhd IntegraXor Project Directory Information Disclosure Vulnerability
|
The SCADA server in Ecava IntegraXor before 4.1.4369 allows remote attackers to read arbitrary project backup files via a crafted URL.
|
[] | null | null | null | null | null |
GHSA-qp9j-3hxc-wm7p
|
Catdoc v0.95 was discovered to contain a NULL pointer dereference via the component xls2csv at src/xlsparse.c.
|
[] | null | 7.5 | null | null | null |
|
CVE-2013-3906
|
GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.
|
[
"cpe:2.3:a:microsoft:excel_viewer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*",
"cpe:2.3:a:microsoft:lync:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint_viewer:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint_viewer:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
CVE-2025-37742
|
jfs: Fix uninit-value access of imap allocated in the diMount() function
|
In the Linux kernel, the following vulnerability has been resolved:
jfs: Fix uninit-value access of imap allocated in the diMount() function
syzbot reports that hex_dump_to_buffer is using uninit-value:
=====================================================
BUG: KMSAN: uninit-value in hex_dump_to_buffer+0x888/0x1100 lib/hexdump.c:171
hex_dump_to_buffer+0x888/0x1100 lib/hexdump.c:171
print_hex_dump+0x13d/0x3e0 lib/hexdump.c:276
diFree+0x5ba/0x4350 fs/jfs/jfs_imap.c:876
jfs_evict_inode+0x510/0x550 fs/jfs/inode.c:156
evict+0x723/0xd10 fs/inode.c:796
iput_final fs/inode.c:1946 [inline]
iput+0x97b/0xdb0 fs/inode.c:1972
txUpdateMap+0xf3e/0x1150 fs/jfs/jfs_txnmgr.c:2367
txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]
jfs_lazycommit+0x627/0x11d0 fs/jfs/jfs_txnmgr.c:2733
kthread+0x6b9/0xef0 kernel/kthread.c:464
ret_from_fork+0x6d/0x90 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Uninit was created at:
slab_post_alloc_hook mm/slub.c:4121 [inline]
slab_alloc_node mm/slub.c:4164 [inline]
__kmalloc_cache_noprof+0x8e3/0xdf0 mm/slub.c:4320
kmalloc_noprof include/linux/slab.h:901 [inline]
diMount+0x61/0x7f0 fs/jfs/jfs_imap.c:105
jfs_mount+0xa8e/0x11d0 fs/jfs/jfs_mount.c:176
jfs_fill_super+0xa47/0x17c0 fs/jfs/super.c:523
get_tree_bdev_flags+0x6ec/0x910 fs/super.c:1636
get_tree_bdev+0x37/0x50 fs/super.c:1659
jfs_get_tree+0x34/0x40 fs/jfs/super.c:635
vfs_get_tree+0xb1/0x5a0 fs/super.c:1814
do_new_mount+0x71f/0x15e0 fs/namespace.c:3560
path_mount+0x742/0x1f10 fs/namespace.c:3887
do_mount fs/namespace.c:3900 [inline]
__do_sys_mount fs/namespace.c:4111 [inline]
__se_sys_mount+0x71f/0x800 fs/namespace.c:4088
__x64_sys_mount+0xe4/0x150 fs/namespace.c:4088
x64_sys_call+0x39bf/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:166
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
=====================================================
The reason is that imap is not properly initialized after memory
allocation. It will cause the snprintf() function to write uninitialized
data into linebuf within hex_dump_to_buffer().
Fix this by using kzalloc instead of kmalloc to clear its content at the
beginning in diMount().
|
[] | null | null | null | null | null |
CVE-2024-30325
|
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
|
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22592.
|
[
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-chcj-vq6f-3pfm
|
Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
|
[] | null | null | 6.5 | null | null |
|
CVE-2024-10538
|
Happy Addons for Elementor <= 3.12.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Comparison
|
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the before_label parameter in the Image Comparison widget in all versions up to, and including, 3.12.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null | null |
CVE-2017-3886
|
A vulnerability in the Cisco Unified Communications Manager web interface could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries, aka SQL Injection. The attacker must be authenticated as an administrative user to execute SQL database queries. More Information: CSCvc74291. Known Affected Releases: 1.0(1.10000.10) 11.5(1.10000.6). Known Fixed Releases: 12.0(0.98000.619) 12.0(0.98000.485) 12.0(0.98000.212) 11.5(1.13035.1) 11.0(1.23900.5) 11.0(1.23900.2) 11.0(1.23067.1) 10.5(2.15900.2).
|
[
"cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 | null |
|
CVE-2024-48011
|
Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.
|
[
"cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
|
CVE-2020-16016
|
Inappropriate implementation in base in Google Chrome prior to 86.0.4240.193 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 9.6 | null | 6.8 | null |
|
CVE-2005-0515
|
Smc.exe in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before launching the Log Viewer export functionality, which allows local users to corrupt arbitrary files by saving log files.
|
[
"cpe:2.3:a:webroot_software:my_firewall_plus:5.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
RHSA-2022:1661
|
Red Hat Security Advisory: zlib security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.2 | null | null | null |
CVE-2022-2169
|
Loading Page with Loading Screen < 1.0.83 - Admin+ Stored Cross-Site Scripting
|
The Loading Page with Loading Screen WordPress plugin before 1.0.83 does not escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
[
"cpe:2.3:a:dwbooster:loading_page_with_loading_screen:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 | null |
CVE-2018-3049
|
Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Enterprise Limits and Collateral Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:14.1.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 4.9 | null |
|
RHSA-2013:0250
|
Red Hat Security Advisory: elinks security update
|
elinks: Improper delegation of client credentials during GSS negotiation
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-xq9p-hq98-j4x4
|
Mattermost Mobile Apps versions <=2.16.0 fail to protect against abuse of a globally shared MathJax state which allows an attacker to change the contents of a LateX post, by creating another post with specific macro definitions.
|
[] | null | 2.6 | null | null | null |
|
GHSA-c83m-3729-3q38
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Swings Wallet System for WooCommerce allows Reflected XSS. This issue affects Wallet System for WooCommerce: from n/a through 2.6.5.
|
[] | null | 7.1 | null | null | null |
|
GHSA-77gw-gg73-wpfg
|
A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been declared as critical. Affected by this vulnerability is the function cmd_wireless. The manipulation of the argument host leads to command injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-83xh-8xv9-8g62
|
SQL injection exists in Piwigo before 11.4.0 via the language parameter to admin.php?page=languages.
|
[] | null | null | null | null | null |
|
CVE-2014-9633
|
The bdisk.sys driver in COMODO Backup before 4.4.1.23 allows remote attackers to gain privileges via a crafted device handle, which triggers a NULL pointer dereference.
|
[
"cpe:2.3:a:comodo:backup:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-g784-x97g-r6ww
|
Dell UEFI BIOS https stack leveraged by the Dell BIOSConnect feature and Dell HTTPS Boot feature contains an improper certificate validation vulnerability. A remote unauthenticated attacker may exploit this vulnerability using a person-in-the-middle attack which may lead to a denial of service and payload tampering.
|
[] | null | null | null | null | null |
|
GHSA-j8rc-g3xr-w3p5
|
In Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing.
|
[] | null | 8.8 | null | null | null |
|
GHSA-mrr8-9pmr-vc9w
|
Vulnerability in the Oracle REST Data Services product of Oracle REST Data Services (component: General). Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c; Standalone ORDS: prior to 20.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle REST Data Services. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle REST Data Services accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | null | null | null |
|
CVE-2025-31629
|
WordPress Infusionsoft Web Form JavaScript plugin <= 1.1.1 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jacob Allred Infusionsoft Web Form JavaScript allows Stored XSS. This issue affects Infusionsoft Web Form JavaScript: from n/a through 1.1.1.
|
[] | null | 6.5 | null | null | null |
GHSA-32v2-p3xf-66m9
|
Use after free in Web Workers in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)
|
[] | null | 8.8 | null | null | null |
|
GHSA-c5x9-jhg6-m4jp
|
Panasonic FPWIN Pro 5.x through 7.x before 7.130 accesses an uninitialized pointer, which allows local users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
|
[] | null | null | 5.5 | null | null |
|
CVE-2019-17527
|
dataForDepandantField in models/custormfields.php in the JS JOBS FREE extension before 1.2.7 for Joomla! allows SQL Injection via the index.php?option=com_jsjobs&task=customfields.getfieldtitlebyfieldandfieldfo child parameter.
|
[
"cpe:2.3:a:joomsky:js_jobs:*:*:free:*:*:joomla\\!:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2022-3584
|
SourceCodester Canteen Management System edituser.php sql injection
|
A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file edituser.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211193 was assigned to this vulnerability.
|
[
"cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
CVE-2014-7948
|
The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-9rm8-2h7m-56ch
|
The Dollie Hub – Build Your Own WordPress Cloud Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 6.2.0 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
|
[] | null | 4.3 | null | null | null |
|
GHSA-8rqr-6hqg-pr9g
|
Brocade Fabric OS before Brocade Fabric OS v9.1.1c, v9.2.0 contains a vulnerability in the command line that could allow a local user to dump files under user's home directory using grep.
|
[] | null | 5.5 | null | null | null |
|
GHSA-wx76-jwh7-h7gq
|
Adobe application manager installer version 10.0 have an Insecure Library Loading (DLL hijacking) vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-5185
|
Data Poisoning in EmbedAI
|
The EmbedAI application is susceptible to security issues that enable Data Poisoning attacks. This weakness could result in the application becoming compromised, leading to unauthorized entries or data poisoning attacks, which are delivered by a CSRF vulnerability due to the absence of a secure session management implementation and weak CORS policies weakness. An attacker can direct a user to a malicious webpage that exploits a CSRF vulnerability within the EmbedAI application. By leveraging this CSRF vulnerability, the attacker can deceive the user into inadvertently uploading and integrating incorrect data into the application’s language model.
|
[] | 8.3 | 7.3 | null | null | null |
CVE-2009-1695
|
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving access to frame contents after completion of a page transition.
|
[
"cpe:2.3:a:apple:safari:*:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:0.8:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:0.9:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.3:*:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:windows:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-48484
|
FreeScout Vulnerable to Stored XSS
|
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data in the conversation POST data body. This issue has been patched in version 1.8.178.
|
[] | 4.6 | null | null | null | null |
GHSA-763p-p3fq-9rj5
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) node request management, (2) live management, and (3) user administration components in the console in Puppet Enterprise (PE) before 2.7.1 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors.
|
[] | null | null | null | null | null |
|
RHSA-2024:5453
|
Red Hat Security Advisory: Fence Agents Remediation 0.4.1 - Security update
|
fence-agents-remediation: Fence Agent Command Line Options Leads to Remote Code Execution
|
[
"cpe:/a:redhat:workload_availability_far:0.4::el8"
] | null | 8.8 | null | null | null |
CVE-2021-45337
|
Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by "hollowing" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection.
|
[
"cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 7.2 | null |
|
RHSA-2012:0745
|
Red Hat Security Advisory: python security update
|
python: potential XSS in SimpleHTTPServer's list_directory() python: distutils creates ~/.pypirc insecurely python: hash table collisions CPU usage DoS (oCERT-2011-003)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2013-5874
|
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, and 12.2.2 allows local users to affect confidentiality via unknown vectors related to Logging.
|
[
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.2:*:*:*:*:*:*:*"
] | null | null | null | 1.7 | null |
|
GHSA-vgjq-g92j-gvvr
|
Memory corruption in multimedia due to incorrect type conversion while adding data in Snapdragon Auto
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-49255
|
WordPress Ruza <= 1.0.7 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza allows PHP Local File Inclusion. This issue affects Ruza: from n/a through 1.0.7.
|
[] | null | 8.1 | null | null | null |
GHSA-6hmv-g545-7x8f
|
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
|
[] | null | 7.5 | null | null | null |
|
GHSA-26cm-qrc6-mfgj
|
Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker
|
ImpactLDAP injection vulnerability, only affects instances with LDAP authentication enabled.PatchesPatch for vulnerability released with v1.16.3.WorkaroundsDisable LDAP feature if in useReferences[OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html
)For more informationIf you have any questions or comments about this advisory:Open an issue in [Thunderdome Github Repository](https://github.com/StevenWeathers/thunderdome-planning-poker)Email us at [[email protected]](mailto:[email protected])
|
[] | null | 8.1 | null | null | null |
CVE-2012-5564
|
android-tools 4.1.1 in Android Debug Bridge (ADB) allows local users to overwrite arbitrary files via a symlink attack on /tmp/adb.log.
|
[
"cpe:2.3:a:google:android_debug_bridge:-:*:*:*:*:*:*:*"
] | null | null | null | 3.3 | null |
|
GHSA-f9gm-2x3m-9q26
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Félix Martínez Recipes manager - WPH allows Stored XSS. This issue affects Recipes manager - WPH: from n/a through 1.0.4.
|
[] | null | 5.9 | null | null | null |
|
GHSA-29rj-95hw-fhm9
|
The DeepL Pro API translation plugin WordPress plugin before 1.7.5 discloses sensitive information in its log files (which are publicly accessible), including DeepL API key.
|
[] | null | 7.5 | null | null | null |
|
GHSA-5vjh-22qr-j29m
|
vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant.
|
[] | null | null | null | null | null |
|
CVE-2005-1881
|
upload.php in YaPiG 0.92b, 0.93u and 0.94u does not properly restrict the file extension for uploaded image files, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code.
|
[
"cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*",
"cpe:2.3:a:yapig:yapig:0.93u:*:*:*:*:*:*:*",
"cpe:2.3:a:yapig:yapig:0.94u:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-14733
|
The Odoo Community Association (OCA) dbfilter_from_header module makes Odoo 8.x, 9.x, 10.x, and 11.x vulnerable to ReDoS (regular expression denial of service) under certain circumstances.
|
[
"cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:8.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-qvvf-x5v8-3hvv
|
The vulnerability exists due to insufficient validation of input from certain resources by the IPP software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. This issue affects: Intelligent Power Protector versions prior to 1.69.
|
[] | null | 4.8 | null | null | null |
|
GHSA-rvjg-x555-jh28
|
SWFTools commit 772e55a2 was discovered to contain a floating point exception (FPE) via DCTStream::readMCURow() at /xpdf/Stream.cc.ow()
|
[] | null | 5.5 | null | null | null |
|
GHSA-g2r6-v9mj-qx9w
|
lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c. NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.
|
[] | null | null | null | null | null |
|
GHSA-7m8r-4pgh-wxhw
|
Cross-Site Request Forgery (CSRF) vulnerability in Pektsekye Year Make Model Search for WooCommerce allows Cross Site Request Forgery. This issue affects Year Make Model Search for WooCommerce: from n/a through 1.0.11.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2024:4836
|
Red Hat Security Advisory: RHACS 4.5 enhancement and security update
|
follow-redirects: Possible credential leak cosign: Malicious attachments can cause system-wide denial of service cosign: Malicious artifects can cause machine-wide denial of service
|
[
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 4.2 | null | null | null |
CVE-2012-0517
|
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to eCompensation Manager Desktop.
|
[
"cpe:2.3:a:oracle:peoplesoft_products:9.0:*:*:*:*:*:*:*"
] | null | null | null | 5.5 | null |
|
ICSA-16-301-01
|
Honeywell Experion PKS Improper Input Validation Vulnerability
|
An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.
|
[] | null | null | 3.7 | null | null |
CVE-2009-4032
|
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7e allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) graph.php, (2) include/top_graph_header.php, (3) lib/html_form.php, and (4) lib/timespan_settings.php, as demonstrated by the (a) graph_end or (b) graph_start parameters to graph.php; (c) the date1 parameter in a tree action to graph_view.php; and the (d) page_refresh and (e) default_dual_pane_width parameters to graph_settings.php.
|
[
"cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-f92h-3c3j-gghq
|
In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705066; Issue ID: GN20220705066.
|
[] | null | 6.7 | null | null | null |
|
CVE-2018-16640
|
ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.8-5:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-j96j-pqmj-vx5q
|
Windows Kernel Information Disclosure Vulnerability
|
[] | null | 5.5 | null | null | null |
|
CVE-2009-1291
|
Stack-based buffer overflow in TIBCO SmartSockets before 6.8.2, SmartSockets Product Family (aka RTworks) before 4.0.5, and Enterprise Message Service (EMS) 4.0.0 through 5.1.1, as used in SmartSockets Server and RTworks Server (aka RTserver), SmartSockets client libraries and add-on products, RTworks libraries and components, EMS Server (aka tibemsd), SmartMQ, iProcess Engine, ActiveMatrix products, and CA Enterprise Communicator, allows remote attackers to execute arbitrary code via "inbound data," as demonstrated by requests to the UDP interface of the RTserver component, and data injection into the TCP stream to tibemsd.
|
[
"cpe:2.3:a:tibco:enterprise_message_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:enterprise_message_service:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:enterprise_message_service:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:enterprise_message_service:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:enterprise_message_service:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:enterprise_message_service:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:enterprise_message_service:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:rtworks:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:rtworks:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:smartsockets:6.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:smartsockets:6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:smartsockets_rtserver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:smartsockets_rtserver:6.8.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2023-6849
|
kalcaddle kodbox app.php cover server-side request forgery
|
A vulnerability was found in kalcaddle kodbox up to 1.48. It has been rated as critical. Affected by this issue is the function cover of the file plugins/fileThumb/app.php. The manipulation of the argument path leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The patch is identified as 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. VDB-248210 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:kodcloud:kodbox:*:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 |
https://github.com/kalcaddle/kodbox/commit/63a4d5708d210f119c24afd941d01a943e25334c
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.