id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2022-49083
iommu/omap: Fix regression in probe for NULL pointer dereference
In the Linux kernel, the following vulnerability has been resolved: iommu/omap: Fix regression in probe for NULL pointer dereference Commit 3f6634d997db ("iommu: Use right way to retrieve iommu_ops") started triggering a NULL pointer dereference for some omap variants: __iommu_probe_device from probe_iommu_group+0x2c/0x38 probe_iommu_group from bus_for_each_dev+0x74/0xbc bus_for_each_dev from bus_iommu_probe+0x34/0x2e8 bus_iommu_probe from bus_set_iommu+0x80/0xc8 bus_set_iommu from omap_iommu_init+0x88/0xcc omap_iommu_init from do_one_initcall+0x44/0x24 This is caused by omap iommu probe returning 0 instead of ERR_PTR(-ENODEV) as noted by Jason Gunthorpe <[email protected]>. Looks like the regression already happened with an earlier commit 6785eb9105e3 ("iommu/omap: Convert to probe/release_device() call-backs") that changed the function return type and missed converting one place.
[]
null
null
null
null
null
GHSA-3w5h-x4rh-hc28
Exposure of sensitive information in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
[]
null
9.1
null
null
null
CVE-2006-1928
Cisco IOS XR, when configured for Multi Protocol Label Switching (MPLS) and running on Cisco CRS-1 routers, allows remote attackers to cause a denial of service (Modular Services Cards (MSC) crash or "MPLS packet handling problems") via certain MPLS packets, as identified by Cisco bug IDs (1) CSCsd15970 and (2) CSCsd55531.
[ "cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.3:*:crs-1:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.3:*:prp:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-27qh-h38r-jf2v
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
[]
null
6.1
null
null
null
CVE-2001-1472
SQL injection vulnerability in prefs.php in phpBB 1.4.0 and 1.4.1 allows remote authenticated users to execute arbitrary SQL commands and gain administrative access via the viewemail parameter.
[ "cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2018-12265
Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
[ "cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
8.8
6.8
null
CVE-2023-32321
CKAN remote code execution and private information access via crafted resource ids
CKAN is an open-source data management system for powering data hubs and data portals. Multiple vulnerabilities have been discovered in Ckan which may lead to remote code execution. An arbitrary file write in `resource_create` and `package_update` actions, using the `ResourceUploader` object. Also reachable via `package_create`, `package_revise`, and `package_patch` via calls to `package_update`. Remote code execution via unsafe pickle loading, via Beaker's session store when configured to use the file session store backend. Potential DOS due to lack of a length check on the resource id. Information disclosure: A user with permission to create a resource can access any other resource on the system if they know the id, even if they don't have access to it. Resource overwrite: A user with permission to create a resource can overwrite any resource if they know the id, even if they don't have access to it. A user with permissions to create or edit a dataset can upload a resource with a specially crafted id to write the uploaded file in an arbitrary location. This can be leveraged to Remote Code Execution via Beaker's insecure pickle loading. All the above listed vulnerabilities have been fixed in CKAN 2.9.9 and CKAN 2.10.1. Users are advised to upgrade. There are no known workarounds for these issues.
[ "cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*", "cpe:2.3:a:okfn:ckan:2.10.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-94g7-q96f-v54w
TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.
[]
null
9.1
null
null
null
CVE-2020-11130
u'Possible buffer overflow in WIFI hal process due to copying data without checking the buffer length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P
[ "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8180xp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8180xp:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6115:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6115p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6115p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7225:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8350:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8350p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8350p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130p:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2007-6690
The Gallery Remote module in Menalto Gallery before 2.2.4 does not check permissions for unspecified GR commands, which has unknown impact and attack vectors.
[ "cpe:2.3:a:menalto:gallery:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-q7mf-27fr-frgh
WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4766, CVE-2016-4767, and CVE-2016-4768.
[]
null
null
8.8
null
null
GHSA-mf89-9mq2-mmp2
Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
[]
null
null
8.8
null
null
RHSA-2009:1560
Red Hat Security Advisory: java-1.6.0-sun security update
deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) JRE TrueType font parsing crash (6815780) java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752) java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824) java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265) REGRESSION: have problem to run JNLP app and applets with signed Jar files (6870531)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
null
CVE-2020-35730
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
[ "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2023-29451
Denial of service caused by a bug in the JSON parser
Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
[ "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:zabbix:zabbix:6.4.0:rc4:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-m337-hwf6-792v
An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions.
[]
null
null
7
null
null
GHSA-6p82-v9w6-85gx
hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
[]
null
5.5
null
null
null
GHSA-gvhg-3pf3-w95c
A remote xss vulnerability was discovered in HPE Integrated Lights-Out 4 (iLO 4); HPE SimpliVity 380 Gen9; HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers; HPE SimpliVity 380 Gen10; HPE SimpliVity 2600; HPE SimpliVity 380 Gen10 G; HPE SimpliVity 325; HPE SimpliVity 380 Gen10 H version(s): Prior to version 2.78.
[]
null
null
null
null
null
GHSA-hc53-8x9j-fg2x
The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."
[]
null
null
null
null
null
GHSA-xr6g-q8cc-8f25
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Filterable Controls label icon parameter in all versions up to, and including, 5.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
RHSA-2024:1686
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 for OpenShift image security update
libmaxminddb: improper initialization in dump_entry_data_list() in maxminddb.c nss: vulnerable to Minerva side-channel information leak pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
9.8
null
null
null
CVE-2025-6003
WordPress Single Sign-On (SSO) - Multiple Versions - Incorrect Authorization to Sensitive Information Exposure
The WordPress Single Sign-On (SSO) plugin for WordPress is vulnerable to unauthorized access due to a misconfigured capability check on a function in all versions up to, and including, the *.5.3 versions of the plugin. This makes it possible for unauthenticated attackers to extract sensitive data including site content that has been restricted to certain users and/or roles.
[]
null
5.3
null
null
null
GHSA-pjgh-f3xj-rv83
A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles 3D annotations. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
[]
null
8.8
null
null
null
CVE-2020-4200
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 could allow an authenticated attacker to send specially crafted commands to cause a denial of service. IBM X-Force ID: 174914.
[ "cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:11.5:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
GHSA-vgg3-fwvm-x7q7
Memory corruption while reading a value from a buffer controlled by the Guest Virtual Machine.
[]
null
7.8
null
null
null
GHSA-73rg-f94j-xvhx
Plate allows arbitrary DOM attributes in element.attributes and leaf.attributes
ImpactOne longstanding feature of Plate is the ability to add custom DOM attributes to any element or leaf using the `attributes` property. These attributes are passed to the node component using the `nodeProps` prop.Note: The `attributes` prop that is typically rendered alongside `nodeProps` is unrelated.It has come to our attention that this feature can be used for malicious purposes, including cross-site scripting (XSS) and information exposure (specifically, users' IP addresses and whether or not they have opened a malicious document).Note that the risk of information exposure via `attributes` is only relevant to applications in which web requests to arbitrary URLs are not ordinarily allowed. Plate editors that allow users to embed images from arbitrary URLs, for example, already carry the risk of leaking users' IP addresses to third parties.All Plate editors using an affected version of `@udecode/plate-core` are vulnerable to these information exposure attacks via the `style` attribute and other attributes that can cause web requests to be sent.In addition, whether or not a Plate editor is vulnerable to cross-site scripting attacks using `attributes` depends on a number of factors. The most likely DOM attributes to be vulnerable are `href` and `src` on links and iframes respectively. Any component that spreads `{...nodeProps}` onto an `<a>` or `<iframe>` element and does not later override `href` or `src` will be vulnerable to XSS.React does not allow passing a string to event handler props like `onClick`, so these are unlikely (but not impossible) to be vulnerable.The attack surface is larger for users running older browsers, which may be vulnerable to XSS in DOM attributes that are less dangerous (although still vulnerable to information exposure) in modern browsers such as `style` or `background`.Potential attack vectors for delivering malicious Slate content to users include:Opening a malicious document stored on the serverPasting a malicious Slate fragment into a documentReceiving malicious Slate operations on a collaborative documentPatchesIn patched versions of Plate, we have disabled `element.attributes` and `leaf.attributes` for most attribute names by default, with some exceptions including `target`, `alt`, `width`, `height`, `colspan` and `rowspan` on the link, image, video, table cell and table header cell plugins.If this is a breaking change for you, you can selectively re-enable `attributes` for certain plugins as follows. Please carefully research and assess the security implications of any attribute you allow, as even seemingly innocuous attributes such as `style` can be used maliciously.Plate >= 37For custom plugins, specify the list of allowed attribute names in the `node.dangerouslyAllowAttributes` plugin configuration option.To modify an existing plugin, use the `extend` method.Plate < 37Note that the patch has been backported to versions `@udecode/[email protected]` and `@udecode/[email protected]` only.For custom plugins, specify the list of allowed attribute names in the `dangerouslyAllowAttributes` plugin configuration option.To modify an existing plugin, pass `dangerouslyAllowAttributes` to the plugin factory.WorkaroundsIf you are unable to upgrade to any of the patched versions, you should use a tool like [`patch-package`](https://www.npmjs.com/package/patch-package) or [`yarn patch`](https://yarnpkg.com/cli/patch) to remove the logic from `@udecode/plate-core` that adds `attributes` to `nodeProps`.This logic can be found in the `getRenderNodeProps` function and looks something like this. The entire `if` statment can safely be removed.After applying the patch, be sure to test its effectiveness by rendering a Slate value containing an `attributes` property on some element.If the patch was successful, the `data-vulnerable="true"` attribute should not be present on any DOM element when the Plate editor is rendered in the browser.
[]
8.7
8.3
null
null
null
CVE-2023-4535
Opensc: out-of-bounds read in myeid driver handling encryption using symmetric keys
An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.
[ "cpe:2.3:a:opensc_project:opensc:0.23.0:-:*:*:*:*:*:*", "cpe:2.3:a:opensc_project:opensc:0.23.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:opensc_project:opensc:0.23.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8" ]
null
4.5
null
null
null
GHSA-3823-wj6r-jpc9
gopher.c in the Gopher client 3.0.5 does not properly create temporary files, which allows local users to gain privileges.
[]
null
null
null
null
null
GHSA-fm3m-9484-8h7w
Substance3D - Stager versions 3.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
ICSA-23-313-02
Hitachi Energy eSOMS
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be abused for enumerating the local file system structure. The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against web servers and deployed web applications. Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints, backend server, Internal IP. etc., which could expose additional attack surface containing other vulnerabilities.
[]
null
5.3
null
null
null
GHSA-cpq7-q5w3-h8c8
** DISPUTED ** A vulnerability has been found in Microsoft O365 and classified as critical. The session cookies introduce a session expiration issue as they might be used by two clients at the same time. The attack can be initiated remotely. Exploit details have been disclosed to the public. The real-world consequences of this vulnerability are still doubted at the moment. It is recommended to change the configuration settings. NOTE: Vendor claims that pre-requisites are very high, the feature works as intended, and that configuration settings might mitigate the issue.
[]
null
8.8
null
null
null
GHSA-rm46-c34m-6jvf
Artica Pandora FMS 7.44 allows remote command execution via the events feature.
[]
null
8.8
null
null
null
CVE-2011-1131
The PlushSearch2 function in Search.php in Simple Machines Forum (SMF) before 1.1.13, and 2.x before 2.0 RC5, uses certain cached data in a situation where a temporary table has been created, even though this cached data is intended only for situations where a temporary table has not been created, which might allow remote attackers to obtain sensitive information via a search.
[ "cpe:2.3:a:simplemachines:smf:*:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0:beta4.1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:beta4:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:beta2.1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:beta3.1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:simplemachines:smf:2.0:rc4:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2021-45086
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js.
[ "cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-vh2f-q9g6-wv38
Themeflection Numbers WordPress plugin before 2.0.1 does not have authorisation and CSRF check in an AJAX action, and does not ensure that the options to be updated belong to the plugin. As a result, it could allow any authenticated users, such as subscriber, to update arbitrary blog options, such as enabling registration and set the default role to administrator
[]
null
6.5
null
null
null
CVE-2014-0085
JBoss Fuse did not enable encrypted passwords by default in its usage of Apache Zookeeper. This permitted sensitive information disclosure via logging to local users. Note: this description has been updated; previous text mistakenly identified the source of the flaw as Zookeeper. Previous text: Apache Zookeeper logs cleartext admin passwords, which allows local users to obtain sensitive information by reading the log.
[ "cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
ICSA-21-334-03
Delta Electronics CNCSoft
The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.CVE-2021-43982 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
null
ICSA-14-008-01
Ecava Sdn Bhd IntegraXor Project Directory Information Disclosure Vulnerability
The SCADA server in Ecava IntegraXor before 4.1.4369 allows remote attackers to read arbitrary project backup files via a crafted URL.
[]
null
null
null
null
null
GHSA-qp9j-3hxc-wm7p
Catdoc v0.95 was discovered to contain a NULL pointer dereference via the component xls2csv at src/xlsparse.c.
[]
null
7.5
null
null
null
CVE-2013-3906
GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.
[ "cpe:2.3:a:microsoft:excel_viewer:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*", "cpe:2.3:a:microsoft:lync:2013:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint_viewer:2010:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint_viewer:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
CVE-2025-37742
jfs: Fix uninit-value access of imap allocated in the diMount() function
In the Linux kernel, the following vulnerability has been resolved: jfs: Fix uninit-value access of imap allocated in the diMount() function syzbot reports that hex_dump_to_buffer is using uninit-value: ===================================================== BUG: KMSAN: uninit-value in hex_dump_to_buffer+0x888/0x1100 lib/hexdump.c:171 hex_dump_to_buffer+0x888/0x1100 lib/hexdump.c:171 print_hex_dump+0x13d/0x3e0 lib/hexdump.c:276 diFree+0x5ba/0x4350 fs/jfs/jfs_imap.c:876 jfs_evict_inode+0x510/0x550 fs/jfs/inode.c:156 evict+0x723/0xd10 fs/inode.c:796 iput_final fs/inode.c:1946 [inline] iput+0x97b/0xdb0 fs/inode.c:1972 txUpdateMap+0xf3e/0x1150 fs/jfs/jfs_txnmgr.c:2367 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline] jfs_lazycommit+0x627/0x11d0 fs/jfs/jfs_txnmgr.c:2733 kthread+0x6b9/0xef0 kernel/kthread.c:464 ret_from_fork+0x6d/0x90 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Uninit was created at: slab_post_alloc_hook mm/slub.c:4121 [inline] slab_alloc_node mm/slub.c:4164 [inline] __kmalloc_cache_noprof+0x8e3/0xdf0 mm/slub.c:4320 kmalloc_noprof include/linux/slab.h:901 [inline] diMount+0x61/0x7f0 fs/jfs/jfs_imap.c:105 jfs_mount+0xa8e/0x11d0 fs/jfs/jfs_mount.c:176 jfs_fill_super+0xa47/0x17c0 fs/jfs/super.c:523 get_tree_bdev_flags+0x6ec/0x910 fs/super.c:1636 get_tree_bdev+0x37/0x50 fs/super.c:1659 jfs_get_tree+0x34/0x40 fs/jfs/super.c:635 vfs_get_tree+0xb1/0x5a0 fs/super.c:1814 do_new_mount+0x71f/0x15e0 fs/namespace.c:3560 path_mount+0x742/0x1f10 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x71f/0x800 fs/namespace.c:4088 __x64_sys_mount+0xe4/0x150 fs/namespace.c:4088 x64_sys_call+0x39bf/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f ===================================================== The reason is that imap is not properly initialized after memory allocation. It will cause the snprintf() function to write uninitialized data into linebuf within hex_dump_to_buffer(). Fix this by using kzalloc instead of kmalloc to clear its content at the beginning in diMount().
[]
null
null
null
null
null
CVE-2024-30325
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22592.
[ "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-chcj-vq6f-3pfm
Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
[]
null
null
6.5
null
null
CVE-2024-10538
Happy Addons for Elementor <= 3.12.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Comparison
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the before_label parameter in the Image Comparison widget in all versions up to, and including, 3.12.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
null
CVE-2017-3886
A vulnerability in the Cisco Unified Communications Manager web interface could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries, aka SQL Injection. The attacker must be authenticated as an administrative user to execute SQL database queries. More Information: CSCvc74291. Known Affected Releases: 1.0(1.10000.10) 11.5(1.10000.6). Known Fixed Releases: 12.0(0.98000.619) 12.0(0.98000.485) 12.0(0.98000.212) 11.5(1.13035.1) 11.0(1.23900.5) 11.0(1.23900.2) 11.0(1.23067.1) 10.5(2.15900.2).
[ "cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*" ]
null
null
4.9
4
null
CVE-2024-48011
Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.
[ "cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
null
CVE-2020-16016
Inappropriate implementation in base in Google Chrome prior to 86.0.4240.193 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
9.6
null
6.8
null
CVE-2005-0515
Smc.exe in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before launching the Log Viewer export functionality, which allows local users to corrupt arbitrary files by saving log files.
[ "cpe:2.3:a:webroot_software:my_firewall_plus:5.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
RHSA-2022:1661
Red Hat Security Advisory: zlib security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.2
null
null
null
CVE-2022-2169
Loading Page with Loading Screen < 1.0.83 - Admin+ Stored Cross-Site Scripting
The Loading Page with Loading Screen WordPress plugin before 1.0.83 does not escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[ "cpe:2.3:a:dwbooster:loading_page_with_loading_screen:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
null
CVE-2018-3049
Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Enterprise Limits and Collateral Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:14.1.0:*:*:*:*:*:*:*" ]
null
null
5.4
4.9
null
RHSA-2013:0250
Red Hat Security Advisory: elinks security update
elinks: Improper delegation of client credentials during GSS negotiation
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
GHSA-xq9p-hq98-j4x4
Mattermost Mobile Apps versions <=2.16.0 fail to protect against abuse of a globally shared MathJax state which allows an attacker to change the contents of a LateX post, by creating another post with specific macro definitions.
[]
null
2.6
null
null
null
GHSA-c83m-3729-3q38
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Swings Wallet System for WooCommerce allows Reflected XSS. This issue affects Wallet System for WooCommerce: from n/a through 2.6.5.
[]
null
7.1
null
null
null
GHSA-77gw-gg73-wpfg
A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been declared as critical. Affected by this vulnerability is the function cmd_wireless. The manipulation of the argument host leads to command injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
null
null
null
GHSA-83xh-8xv9-8g62
SQL injection exists in Piwigo before 11.4.0 via the language parameter to admin.php?page=languages.
[]
null
null
null
null
null
CVE-2014-9633
The bdisk.sys driver in COMODO Backup before 4.4.1.23 allows remote attackers to gain privileges via a crafted device handle, which triggers a NULL pointer dereference.
[ "cpe:2.3:a:comodo:backup:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-g784-x97g-r6ww
Dell UEFI BIOS https stack leveraged by the Dell BIOSConnect feature and Dell HTTPS Boot feature contains an improper certificate validation vulnerability. A remote unauthenticated attacker may exploit this vulnerability using a person-in-the-middle attack which may lead to a denial of service and payload tampering.
[]
null
null
null
null
null
GHSA-j8rc-g3xr-w3p5
In Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing.
[]
null
8.8
null
null
null
GHSA-mrr8-9pmr-vc9w
Vulnerability in the Oracle REST Data Services product of Oracle REST Data Services (component: General). Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c; Standalone ORDS: prior to 20.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle REST Data Services. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle REST Data Services accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
null
null
null
CVE-2025-31629
WordPress Infusionsoft Web Form JavaScript plugin <= 1.1.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jacob Allred Infusionsoft Web Form JavaScript allows Stored XSS. This issue affects Infusionsoft Web Form JavaScript: from n/a through 1.1.1.
[]
null
6.5
null
null
null
GHSA-32v2-p3xf-66m9
Use after free in Web Workers in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)
[]
null
8.8
null
null
null
GHSA-c5x9-jhg6-m4jp
Panasonic FPWIN Pro 5.x through 7.x before 7.130 accesses an uninitialized pointer, which allows local users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
null
null
5.5
null
null
CVE-2019-17527
dataForDepandantField in models/custormfields.php in the JS JOBS FREE extension before 1.2.7 for Joomla! allows SQL Injection via the index.php?option=com_jsjobs&task=customfields.getfieldtitlebyfieldandfieldfo child parameter.
[ "cpe:2.3:a:joomsky:js_jobs:*:*:free:*:*:joomla\\!:*:*" ]
null
9.8
null
7.5
null
CVE-2022-3584
SourceCodester Canteen Management System edituser.php sql injection
A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file edituser.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211193 was assigned to this vulnerability.
[ "cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2014-7948
The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-9rm8-2h7m-56ch
The Dollie Hub – Build Your Own WordPress Cloud Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 6.2.0 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
[]
null
4.3
null
null
null
GHSA-8rqr-6hqg-pr9g
Brocade Fabric OS before Brocade Fabric OS v9.1.1c, v9.2.0 contains a vulnerability in the command line that could allow a local user to dump files under user's home directory using grep.
[]
null
5.5
null
null
null
GHSA-wx76-jwh7-h7gq
Adobe application manager installer version 10.0 have an Insecure Library Loading (DLL hijacking) vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.
[]
null
7.8
null
null
null
CVE-2024-5185
Data Poisoning in EmbedAI
The EmbedAI application is susceptible to security issues that enable Data Poisoning attacks. This weakness could result in the application becoming compromised, leading to unauthorized entries or data poisoning attacks, which are delivered by a CSRF vulnerability due to the absence of a secure session management implementation and weak CORS policies weakness. An attacker can direct a user to a malicious webpage that exploits a CSRF vulnerability within the EmbedAI application. By leveraging this CSRF vulnerability, the attacker can deceive the user into inadvertently uploading and integrating incorrect data into the application’s language model.
[]
8.3
7.3
null
null
null
CVE-2009-1695
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving access to frame contents after completion of a page transition.
[ "cpe:2.3:a:apple:safari:*:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:0.8:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:0.9:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2:*:windows:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-48484
FreeScout Vulnerable to Stored XSS
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data in the conversation POST data body. This issue has been patched in version 1.8.178.
[]
4.6
null
null
null
null
GHSA-763p-p3fq-9rj5
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) node request management, (2) live management, and (3) user administration components in the console in Puppet Enterprise (PE) before 2.7.1 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
null
null
null
null
null
RHSA-2024:5453
Red Hat Security Advisory: Fence Agents Remediation 0.4.1 - Security update
fence-agents-remediation: Fence Agent Command Line Options Leads to Remote Code Execution
[ "cpe:/a:redhat:workload_availability_far:0.4::el8" ]
null
8.8
null
null
null
CVE-2021-45337
Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by "hollowing" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection.
[ "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*" ]
null
8.8
null
7.2
null
RHSA-2012:0745
Red Hat Security Advisory: python security update
python: potential XSS in SimpleHTTPServer's list_directory() python: distutils creates ~/.pypirc insecurely python: hash table collisions CPU usage DoS (oCERT-2011-003)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
CVE-2013-5874
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, and 12.2.2 allows local users to affect confidentiality via unknown vectors related to Logging.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:e-business_suite:12.2.2:*:*:*:*:*:*:*" ]
null
null
null
1.7
null
GHSA-vgjq-g92j-gvvr
Memory corruption in multimedia due to incorrect type conversion while adding data in Snapdragon Auto
[]
null
7.8
null
null
null
CVE-2025-49255
WordPress Ruza <= 1.0.7 - Local File Inclusion Vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Ruza allows PHP Local File Inclusion. This issue affects Ruza: from n/a through 1.0.7.
[]
null
8.1
null
null
null
GHSA-6hmv-g545-7x8f
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
[]
null
7.5
null
null
null
GHSA-26cm-qrc6-mfgj
Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker
ImpactLDAP injection vulnerability, only affects instances with LDAP authentication enabled.PatchesPatch for vulnerability released with v1.16.3.WorkaroundsDisable LDAP feature if in useReferences[OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html )For more informationIf you have any questions or comments about this advisory:Open an issue in [Thunderdome Github Repository](https://github.com/StevenWeathers/thunderdome-planning-poker)Email us at [[email protected]](mailto:[email protected])
[]
null
8.1
null
null
null
CVE-2012-5564
android-tools 4.1.1 in Android Debug Bridge (ADB) allows local users to overwrite arbitrary files via a symlink attack on /tmp/adb.log.
[ "cpe:2.3:a:google:android_debug_bridge:-:*:*:*:*:*:*:*" ]
null
null
null
3.3
null
GHSA-f9gm-2x3m-9q26
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Félix Martínez Recipes manager - WPH allows Stored XSS. This issue affects Recipes manager - WPH: from n/a through 1.0.4.
[]
null
5.9
null
null
null
GHSA-29rj-95hw-fhm9
The DeepL Pro API translation plugin WordPress plugin before 1.7.5 discloses sensitive information in its log files (which are publicly accessible), including DeepL API key.
[]
null
7.5
null
null
null
GHSA-5vjh-22qr-j29m
vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant.
[]
null
null
null
null
null
CVE-2005-1881
upload.php in YaPiG 0.92b, 0.93u and 0.94u does not properly restrict the file extension for uploaded image files, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code.
[ "cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*", "cpe:2.3:a:yapig:yapig:0.93u:*:*:*:*:*:*:*", "cpe:2.3:a:yapig:yapig:0.94u:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2018-14733
The Odoo Community Association (OCA) dbfilter_from_header module makes Odoo 8.x, 9.x, 10.x, and 11.x vulnerable to ReDoS (regular expression denial of service) under certain circumstances.
[ "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "cpe:2.3:a:odoo:odoo:8.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*" ]
null
null
7.5
5
null
GHSA-qvvf-x5v8-3hvv
The vulnerability exists due to insufficient validation of input from certain resources by the IPP software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. This issue affects: Intelligent Power Protector versions prior to 1.69.
[]
null
4.8
null
null
null
GHSA-rvjg-x555-jh28
SWFTools commit 772e55a2 was discovered to contain a floating point exception (FPE) via DCTStream::readMCURow() at /xpdf/Stream.cc.ow()
[]
null
5.5
null
null
null
GHSA-g2r6-v9mj-qx9w
lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c. NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.
[]
null
null
null
null
null
GHSA-7m8r-4pgh-wxhw
Cross-Site Request Forgery (CSRF) vulnerability in Pektsekye Year Make Model Search for WooCommerce allows Cross Site Request Forgery. This issue affects Year Make Model Search for WooCommerce: from n/a through 1.0.11.
[]
null
4.3
null
null
null
RHSA-2024:4836
Red Hat Security Advisory: RHACS 4.5 enhancement and security update
follow-redirects: Possible credential leak cosign: Malicious attachments can cause system-wide denial of service cosign: Malicious artifects can cause machine-wide denial of service
[ "cpe:/a:redhat:advanced_cluster_security:4.5::el8" ]
null
4.2
null
null
null
CVE-2012-0517
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to eCompensation Manager Desktop.
[ "cpe:2.3:a:oracle:peoplesoft_products:9.0:*:*:*:*:*:*:*" ]
null
null
null
5.5
null
ICSA-16-301-01
Honeywell Experion PKS Improper Input Validation Vulnerability
An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.
[]
null
null
3.7
null
null
CVE-2009-4032
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7e allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) graph.php, (2) include/top_graph_header.php, (3) lib/html_form.php, and (4) lib/timespan_settings.php, as demonstrated by the (a) graph_end or (b) graph_start parameters to graph.php; (c) the date1 parameter in a tree action to graph_view.php; and the (d) page_refresh and (e) default_dual_pane_width parameters to graph_settings.php.
[ "cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-f92h-3c3j-gghq
In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705066; Issue ID: GN20220705066.
[]
null
6.7
null
null
null
CVE-2018-16640
ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.8-5:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
6.5
4.3
null
GHSA-j96j-pqmj-vx5q
Windows Kernel Information Disclosure Vulnerability
[]
null
5.5
null
null
null
CVE-2009-1291
Stack-based buffer overflow in TIBCO SmartSockets before 6.8.2, SmartSockets Product Family (aka RTworks) before 4.0.5, and Enterprise Message Service (EMS) 4.0.0 through 5.1.1, as used in SmartSockets Server and RTworks Server (aka RTserver), SmartSockets client libraries and add-on products, RTworks libraries and components, EMS Server (aka tibemsd), SmartMQ, iProcess Engine, ActiveMatrix products, and CA Enterprise Communicator, allows remote attackers to execute arbitrary code via "inbound data," as demonstrated by requests to the UDP interface of the RTserver component, and data injection into the TCP stream to tibemsd.
[ "cpe:2.3:a:tibco:enterprise_message_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:enterprise_message_service:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:enterprise_message_service:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:enterprise_message_service:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:enterprise_message_service:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:enterprise_message_service:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:enterprise_message_service:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:rtworks:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:rtworks:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:smartsockets:6.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:smartsockets:6.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:smartsockets_rtserver:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:smartsockets_rtserver:6.8.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2023-6849
kalcaddle kodbox app.php cover server-side request forgery
A vulnerability was found in kalcaddle kodbox up to 1.48. It has been rated as critical. Affected by this issue is the function cover of the file plugins/fileThumb/app.php. The manipulation of the argument path leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The patch is identified as 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. VDB-248210 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:kodcloud:kodbox:*:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
https://github.com/kalcaddle/kodbox/commit/63a4d5708d210f119c24afd941d01a943e25334c