id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-v2wv-63p9-455m
|
Multiple PHP remote file inclusion vulnerabilities in phpMyAgenda 3.0 Final and earlier allow remote attackers to execute arbitrary PHP code via a URL in the rootagenda parameter to (1) agendaplace.php3, (2) agendaplace2.php3, (3) infoevent.php3, and (4) agenda2.php3, different vectors than CVE-2006-2009.
|
[] | null | null | null | null | null |
|
CVE-2008-1391
|
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
|
[
"cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0_p5_release:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-qwq9-fh29-mw39
|
OX App Suite through 7.10.4 allows XSS via use of the conversion API for a distributedFile.
|
[] | null | null | null | null | null |
|
GHSA-fvp3-8575-r23w
|
Unspecified vulnerability in the mOffice - Outlook sync (com.innov8tion.isharesync) application 3.1 for Android has unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-xmj3-ch4w-5cq7
|
Tenda AC18 router v15.03.05.19 and v15.03.05.05 was discovered to contain a stack overflow via the list parameter at /goform/SetIpMacBind.
|
[] | null | 9.8 | null | null | null |
|
GHSA-g454-m7r7-f68q
|
Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the left shift operation.
|
[] | null | 7 | null | null | null |
|
GHSA-5wpj-c6f7-24x8
|
Undefined behavior when users supply invalid resource handles
|
ImpactMultiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid:In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior.PatchesWe have patched the issue in GitHub commit [a5b89cd68c02329d793356bda85d079e9e69b4e7](https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7) and GitHub commit [dbdd98c37bc25249e8f288bd30d01e118a7b4498](https://github.com/tensorflow/tensorflow/commit/dbdd98c37bc25249e8f288bd30d01e118a7b4498).The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Hong Jin from Singapore Management University.
|
[] | null | 5.5 | null | null | null |
GHSA-xpc7-m273-pggq
|
Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalation because an established guest session is automatically converted into an established administrator session when the guest user enters the administrator username, with an arbitrary incorrect password, in an mc/ login attempt within a different browser tab.
|
[] | null | null | 8.8 | null | null |
|
CVE-2020-15599
|
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
|
[
"cpe:2.3:a:victor_cms_project:victor_cms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2007-2044
|
PHP remote file inclusion vulnerability in mod_weather.php in the Antonis Ventouris Weather module for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the absolute_path parameter.
|
[
"cpe:2.3:a:antonis_ventouris:weather_module:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-7677-xwx4-r4m4
|
Active IQ Unified Manager for VMware vSphere, Linux, and Microsoft Windows versions prior to 9.10P1 are susceptible to a vulnerability which could allow an attacker to discover cluster, node and Active IQ Unified Manager specific information via AutoSupport telemetry data that is sent even when AutoSupport has been disabled.
|
[] | null | 5.3 | null | null | null |
|
GHSA-w57q-v7qr-v5m7
|
Path traversal vulnerability exists in a-blog cms versions prior to Ver. 3.1.43 and versions prior to Ver. 3.0.47. This is an issue with insufficient path validation in the backup feature, and exploitation requires the administrator privilege. If this vulnerability is exploited, a remote authenticated attacker with the administrator privilege may obtain or delete any file on the server.
|
[] | 5.1 | 3.8 | null | null | null |
|
CVE-2025-54627
|
Out-of-bounds write vulnerability in the skia module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
|
[] | null | 8.8 | null | null | null |
|
GHSA-m595-gqw8-5g7w
|
Cross-site scripting (XSS) vulnerability in /ajax.php/form/help-topic in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the "message" parameter.
|
[] | null | null | 6.1 | null | null |
|
GHSA-59q6-5qj6-cxp2
|
The id3tag_sort function in id3tag.c for YAMT 0.5 allows remote attackers to execute arbitrary commands via an MP3 file with double quotes in the Artist tag.
|
[] | null | null | null | null | null |
|
GHSA-mvq3-grx4-4vgx
|
The Penguin Run (aka com.skyboard.google.penguinRun) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-25r2-9vcc-j43c
|
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow vulnerability exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the share_name parameter.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2025:2067
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.3.SP1)
|
io.quarkus:quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
|
[
"cpe:/a:redhat:camel_quarkus:3.15"
] | null | 7.5 | null | null | null |
GHSA-fgpg-fxmj-5h69
|
Cross-site scripting (XSS) vulnerability in index.php in Jelsoft vBulletin allows remote attackers to spoof parts of a website via the loc parameter.
|
[] | null | null | null | null | null |
|
CVE-2018-20017
|
SEMCMS 3.5 has XSS via the first text box to the SEMCMS_Main.php URI.
|
[
"cpe:2.3:a:sem-cms:semcms:3.5:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2019-1265
|
A security feature bypass vulnerability exists when Microsoft Yammer App for Android fails to apply the correct Intune MAM Policy.This could allow an attacker to perform functions that are restricted by Intune Policy.The security update addresses the vulnerability by correcting the way the policy is applied to Yammer App., aka 'Microsoft Yammer Security Feature Bypass Vulnerability'.
|
[
"cpe:2.3:a:microsoft:yammer:*:*:*:*:*:android:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-g48c-grh6-c63v
|
SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to upload a malicious file and also to access, modify or make unavailable existing files but the impact is limited to the files themselves and is restricted by other policies such as access control lists and other upload file size restrictions, leading to Unrestricted File Upload.
|
[] | null | null | null | null | null |
|
CVE-2023-32668
|
LuaTeX before 1.17.0 allows a document (compiled with the default settings) to make arbitrary network requests. This occurs because full access to the socket library is permitted by default, as stated in the documentation. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
|
[
"cpe:2.3:a:luatex_project:luatex:*:*:*:*:*:*:*:*",
"cpe:2.3:a:miktex:miktex:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-jvf3-mfxv-jcqr
|
Apache Pulsar Broker, Proxy, and WebSocket Proxy vulnerable to Improper Certificate Validation
|
TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle attacks, which could leak credentials, configuration data, message data, and any other data sent by these clients. The vulnerability is for both the pulsar+ssl protocol and HTTPS. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. This issue affects Apache Pulsar Broker, Proxy, and WebSocket Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.
|
[] | null | 5.9 | null | null | null |
GHSA-xv73-w5x5-mf3h
|
Stack-based buffer overflow in the PestPatrol ActiveX control (ppctl.dll) 5.6.7.9 in CA eTrust PestPatrol allows remote attackers to execute arbitrary code via a long argument to the Initialize method.
|
[] | null | null | null | null | null |
|
CVE-2009-1126
|
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate the user-mode input associated with the editing of an unspecified desktop parameter, which allows local users to gain privileges via a crafted application, aka "Windows Desktop Parameter Edit Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:x32:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:x64:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2021-34832
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the delay property. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13928.
|
[
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:pdf_editor:11.0.0.49893:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-qx3m-v6p5-458w
|
Stack-based buffer overflow in SureThing CD/DVD Labeler 5.1.616 trial version allows user-assisted remote attackers to execute arbitrary code via a crafted (1) m3u or (2) pls playlist file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2001-0998
|
IBM HACMP 4.4 allows remote attackers to cause a denial of service via a completed TCP connection to HACMP ports (e.g., using a port scan) that does not send additional data, which causes a failure in snmpd.
|
[
"cpe:2.3:a:ibm:hacmp:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-58mm-w7mf-4q6h
|
Directory traversal vulnerability in download.php in the DB Backup plugin 4.5 and earlier for Wordpress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
[] | null | null | null | null | null |
|
GHSA-v46c-9q4v-m68p
|
The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action.
|
[] | null | null | 4.8 | null | null |
|
CVE-2005-1686
|
Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
|
[
"cpe:2.3:a:gnome:gedit:2.10.2:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
CVE-2017-8406
|
An issue was discovered on D-Link DCS-1130 devices. The device provides a crossdomain.xml file with no restrictions on who can access the webserver. This allows an hosted flash file on any domain to make calls to the device's webserver and pull any information that is stored on the device. In this case, user's credentials are stored in clear text on the device and can be pulled easily. It also seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site flashing attack on the user's browser and execute any action on the device provided by the web management interface which steals the credentials from tools_admin.cgi file's response and displays it inside a Textfield.
|
[
"cpe:2.3:o:dlink:dcs-1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-1130:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2005-3166
|
Unspecified vulnerability in "edit submission handling" for MediaWiki 1.4.x before 1.4.10 and 1.3.x before 1.3.16 allows remote attackers to cause a denial of service (corruption of the previous submission) via a crafted URL.
|
[
"cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta6:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2018-10363
|
An issue was discovered in the WpDevArt "Booking calendar, Appointment Booking System" plugin 2.2.2 for WordPress. Multiple parameters allow remote attackers to manipulate the values to change data such as prices.
|
[
"cpe:2.3:a:wpdevart:booking_calendar:2.2.2:*:*:*:*:wordpress:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-3fhc-jpq3-mhwr
|
Unspecified vulnerability in the Render method in the ExportHTML.ocx ActiveX control in ExportHTML.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.
|
[] | null | null | null | null | null |
|
CVE-2011-1499
|
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
|
[
"cpe:2.3:a:banu:tinyproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre5:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:pre6:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.0:rc9:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre5:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:pre6:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.5.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:a:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:pre4:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:banu:tinyproxy:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-7v76-5mmq-g5jr
|
The Internet Connection Firewall (ICF) in Microsoft Windows XP SP2 is configured by default to trust sessmgr.exe, which allows local users to use sessmgr.exe to create a local listening port that bypasses the ICF access controls.
|
[] | null | null | null | null | null |
|
CVE-2000-0795
|
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
|
[
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2017-7208
|
The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file.
|
[
"cpe:2.3:a:libav:libav:9.21:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.8 | null |
|
CVE-2014-8325
|
The Calendar Base (cal) extension before 1.5.9 and 1.6.x before 1.6.1 for TYPO3 allows remote attackers to cause a denial of service (resource consumption) via vectors related to the PHP PCRE library.
|
[
"cpe:2.3:a:calender_base_project:calender_base:*:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.0:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.1:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.2:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.3:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.4:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.5:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.6:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.5.7:*:*:*:*:typo3:*:*",
"cpe:2.3:a:calender_base_project:calender_base:1.6.0:*:*:*:*:typo3:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-44r2-3246-r77p
|
Dell Encryption and Dell Security Management Server, versions prior to 11.11.0, contain an Improper Link Resolution Before File Access ('Link Following') Vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation.
|
[] | null | 7.3 | null | null | null |
|
GHSA-wf42-jg79-hchc
|
In the Linux kernel, the following vulnerability has been resolved:drm/tegra: Fix reference leak in tegra_dsi_ganged_probeThe reference taken by 'of_find_device_by_node()' must be released when
not needed anymore. Add put_device() call to fix this.
|
[] | null | 5.5 | null | null | null |
|
CVE-2006-5755
|
Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-cf4g-fcf8-3cr9
|
`pnet_packet` buffer overrun in `set_payload` setters
|
As indicated by this [issue](https://github.com/libpnet/libpnet/issues/449#issuecomment-663355987), a buffer overrun is possible in the `set_payload` setter of the various mutable "Packet" struct setters. The offending `set_payload` functions were defined within the struct `impl` blocks in earlier versions of the package, and later by the `packet` macro.Fixed in the `packet` macro by [this](https://github.com/libpnet/libpnet/pull/455) PR.
|
[] | null | null | 6 | null | null |
CVE-2025-3943
|
Use of GET Request Method With sensitive Query Strings
|
Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
|
[] | null | 4.1 | null | null | null |
CVE-2018-16513
|
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
|
[
"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-389x-839f-4rhx
|
Denial of Service attack on windows app using Netty
|
SummaryAn unsafe reading of environment file could potentially cause a denial of service in Netty.
When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash.DetailsA similar issue was previously reported in https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv
This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit.PoCThe PoC is the same as for https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv with the detail that the file should only contain null-bytes; 0x00.
When the null-bytes are encountered by the `InputStreamReader`, it will issue replacement characters in its charset decoding, which will fill up the line-buffer in the `BufferedReader.readLine()`, because the replacement character is not a line-break character.ImpactImpact is the same as https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv
|
[] | null | 5.5 | null | null | null |
GHSA-rx4v-33p7-72qj
|
A vulnerability was found in MRCMS 3.1.2 and classified as problematic. This issue affects some unknown processing of the file /admin/chip/add.do of the component Add Fragment Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 4.8 | 2.4 | null | null | null |
|
CVE-2022-3515
|
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
|
[
"cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gpg4win:gpg4win:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:vs-desktop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:gnupg:gnupg:*:*:*:*:-:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2020-10192
|
An issue was discovered in Munkireport before 5.3.0.3923. An unauthenticated actor can send a custom XSS payload through the /report/broken_client endpoint. The payload will be executed by any authenticated users browsing the application. This concerns app/views/listings/default.php.
|
[
"cpe:2.3:a:munkireport_project:munkireport:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-3xwr-f848-5v5p
|
A vulnerability classified as critical was found in SourceCodester Online Hotel Reservation System 1.0. Affected by this vulnerability is the function upload of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-xhgm-q8m9-9c6v
|
(1) wp-dbmanager.php and (2) database-manage.php in the WP-DBManager (aka Database Manager) plugin before 2.7.2 for WordPress place credentials on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.
|
[] | null | null | 7.8 | null | null |
|
GHSA-fj35-5pqq-m427
|
The Gulf Credit Union (aka Fi_Mobile.Gulf) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
PYSEC-2023-153
| null |
Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.
|
[] | null | 6.1 | null | null | null |
GHSA-gppc-qq77-689m
|
A vulnerability classified as critical has been found in SourceCodester Prison Management System 1.0. This affects an unknown part of the file /Employee/delete_leave.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259695.
|
[] | null | 6.3 | null | null | null |
|
CVE-2021-22548
|
Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall
|
An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
|
[
"cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2025-22117
|
ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()
|
In the Linux kernel, the following vulnerability has been resolved:
ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()
Fix using the untrusted value of proto->raw.pkt_len in function
ice_vc_fdir_parse_raw() by verifying if it does not exceed the
VIRTCHNL_MAX_SIZE_RAW_PACKET value.
|
[] | null | null | null | null | null |
RHSA-2012:0715
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Content Security Policy inline-script bypass (MFSA 2012-36) Mozilla: Information disclosure though Windows file shares and shortcut files (MFSA 2012-37) Mozilla: Use-after-free while replacing/inserting a node in a document (MFSA 2012-38) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2004-0037
|
FirstClass Desktop Client 7.1 allows remote attackers to execute arbitrary commands via hyperlinks in FirstClass RTF messages.
|
[
"cpe:2.3:a:opentext:opentext_firstclass_desktop_client:7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-vq6r-22q3-83cv
|
The Team – Team Members Showcase Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 4.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings.
|
[] | null | 4.3 | null | null | null |
|
GHSA-6qx2-mpv3-45g8
|
The BEA WebLogic Server proxy plug-in before June 2006 for the Apache HTTP Server does not properly handle protocol errors, which allows remote attackers to cause a denial of service (server outage).
|
[] | null | null | null | null | null |
|
GHSA-2682-qq7m-44gj
|
Missing Authorization vulnerability in WP SCHEMA PRO Schema Pro.This issue affects Schema Pro: from n/a through 2.7.8.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-38353
|
Dropdown and scrollable Text <= 2.0 Reflected Cross-Site Scripting
|
The Dropdown and scrollable Text WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the content parameter found in the ~/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.
|
[
"cpe:2.3:a:webodid:dropdown_and_scrollable_text:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-q5q3-h939-p643
|
Improper access control vulnerability in pfSense CE and pfSense Plus (pfSense CE software versions prior to 2.6.0 and pfSense Plus software versions prior to 22.01) allows a remote attacker with the privilege to change NTP GPS settings to rewrite existing files on the file system, which may result in arbitrary command execution.
|
[] | null | 8.8 | null | null | null |
|
RHSA-2025:8530
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream"
] | null | 8.8 | null | null | null |
CVE-2010-4595
|
The Connection Manager in IBM Lotus Mobile Connect before 6.1.4 disables the http.device.stanza blacklisting functionality for HTTP Access Services (HTTP-AS), which allows remote attackers to bypass intended access restrictions via an HTTP request that contains a disallowed User-Agent header.
|
[
"cpe:2.3:a:ibm:lotus_mobile_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_mobile_connect:6.1.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-vqjv-jhp4-724w
|
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
|
[] | null | null | null | null | null |
|
CVE-2017-6481
|
Multiple Cross-Site Scripting (XSS) issues were discovered in phpipam 1.2. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to several pages (instructions in app/admin/instructions/preview.php; subnetId in app/admin/powerDNS/refresh-ptr-records.php). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
|
[
"cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-h95c-frw5-64m7
|
An SQL Injection vulnerability existed in DLP Extension 11.11.1.3. The vulnerability allowed an attacker to perform arbitrary SQL queries potentially leading to command execution.
|
[] | null | 4.9 | null | null | null |
|
RHSA-2024:4972
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.7 security update
|
argo-cd: Argo CD web terminal session doesn't expire argocd: Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in Argo CD
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 7.5 | null | null | null |
GHSA-mxv4-g2w3-q67w
|
Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a security bypass vulnerability. Successful exploitation could lead to security feature bypass.
|
[] | null | null | null | null | null |
|
CVE-2022-2503
|
Linux Kernel LoadPin bypass via dm-verity table reload
|
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 6.9 | null | null | null |
CVE-2024-10087
|
XSS in iKSORIS
|
Internet Starter, one of SoftCOM iKSORIS system modules, is vulnerable to Reflected XSS (Cross-site Scripting) attacks. An attacker might craft a link containing a malicious script, which then gets directly embedded in references to other resources, what causes the script to run in user's context multiple times.
This vulnerability has been patched in version 79.0
|
[] | 5.3 | null | null | null | null |
CVE-2024-32281
|
Tenda AC7V1.0 v15.03.06.44 firmware contains a command injection vulnerablility in formexeCommand function via the cmdinput parameter.
|
[
"cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-p7fw-qcf4-849w
|
The Linear plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'linear_block_buy_commissions' shortcode in all versions up to, and including, 2.7.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-wg6m-m95x-w5j3
|
GSC build 2067 and earlier relies on the client to enforce administrator privileges, which allows remote attackers to execute arbitrary administrator commands via a crafted packet.
|
[] | null | null | null | null | null |
|
CVE-2008-2347
|
MyPicGallery 1.0 allows remote attackers to bypass application authentication and gain administrative access by setting the userID parameter to "admin" in a direct request to admin/addUser.php.
|
[
"cpe:2.3:a:mypicgallery:mypicgallery:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-11628
|
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.1.6:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-9rmh-v8rw-6322
|
Cross-Site Request Forgery (CSRF) vulnerability in Recapture Cart Recovery and Email Marketing Recapture for WooCommerce allows Cross Site Request Forgery. This issue affects Recapture for WooCommerce: from n/a through 1.0.43.
|
[] | null | 6.5 | null | null | null |
|
CVE-2006-2284
|
Multiple PHP remote file inclusion vulnerabilities in Claroline 1.7.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) clarolineRepositorySys parameter in ldap.inc.php and the (2) claro_CasLibPath parameter in casProcess.inc.php.
|
[
"cpe:2.3:a:claroline:claroline:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:claroline:claroline:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:dokeos:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:dokeos:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:dokeos:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:dokeos:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:dokeos:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:dokeos:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:dokeos:1.6_rc2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-34219
|
TOTOLINK CP450 V4.1.0cu.747_B20191224 was discovered to contain a vulnerability in the SetTelnetCfg function, which allows attackers to log in through telnet.
|
[
"cpe:2.3:o:totolink:cp450_firmware:4.1.0cu.747_b20191224:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
|
GHSA-375g-39jq-vq7m
|
Potential buffer overflow in CBOR2 decoder
|
SummaryEver since https://github.com/agronholm/cbor2/pull/204 (or specifically https://github.com/agronholm/cbor2/commit/387755eacf0be35591a478d3c67fe10618a6d542) was merged, I can create a reproducible crash when running the snippet under PoC on a current Debian bullseye aarm64 on a Raspberry Pi 3 (I was **not** able to reproduce this on my x86_64 Laptop with Python 3.11; I suspect because there is enough memory to allocate still)DetailsPoCIf one calls it without the indirection via the pool executor, a SystemError is shown that hides the buffer overflow.ImpactAn attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object.
|
[] | null | 7.5 | null | null | null |
CVE-2000-0257
|
Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long URL.
|
[
"cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-26953
|
It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2014-1832
|
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
|
[
"cpe:2.3:a:phusion:passenger:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-cxcw-75qj-r943
|
In the Linux kernel, the following vulnerability has been resolved:jfs: add check read-only before txBeginAnon() callAdded a read-only check before calling `txBeginAnon` in `extAlloc`
and `extRecord`. This prevents modification attempts on a read-only
mounted filesystem, avoiding potential errors or crashes.Call trace:
txBeginAnon+0xac/0x154
extAlloc+0xe8/0xdec fs/jfs/jfs_extent.c:78
jfs_get_block+0x340/0xb98 fs/jfs/inode.c:248
__block_write_begin_int+0x580/0x166c fs/buffer.c:2128
__block_write_begin fs/buffer.c:2177 [inline]
block_write_begin+0x98/0x11c fs/buffer.c:2236
jfs_write_begin+0x44/0x88 fs/jfs/inode.c:299
|
[] | null | null | null | null | null |
|
GHSA-qpfh-2wpm-c362
|
Spring Cloud Config Server may not use Vault token sent by clients using a X-CONFIG-TOKEN header when making requests to Vault.
Your application may be affected by this if the following are true:You have Spring Vault on the classpath of your Spring Cloud Config Server andYou are using the X-CONFIG-TOKEN header to send a Vault token to the Spring Cloud Config Server for the Config Server to use when making requests to Vault andYou are using the default Spring Vault SessionManager implementation LifecycleAwareSessionManager or a SessionManager implementation that persists the Vault token such as SimpleSessionManager.In this case the SessionManager persists the first token it retrieves and will continue to use that token even if client requests to the Spring Cloud Config Server include a X-CONFIG-TOKEN header with a different value.
Affected Spring Products and Versions
Spring Cloud Config:2.2.1.RELEASE - 4.2.1Mitigation
Users of affected versions should upgrade to the corresponding fixed version.Affected version(s)Fix versionAvailability4.2.x4.2.2OSS4.1.x4.1.6OSS4.0.x4.0.10Commercial3.1.x3.1.10Commercial3.0.x4.1.6OSS2.2.x4.1.6OSS
NOTE: Spring Cloud Config 3.0.x and 2.2.x are no longer under open source or commercial support. Users of these versions are encouraged to upgrade to a supported version.No other mitigation steps are necessary.
|
[] | null | 5.3 | null | null | null |
|
CVE-2025-22736
|
WordPress User Management plugin <= 1.2 - Privilege Escalation vulnerability
|
Incorrect Privilege Assignment vulnerability in WPExperts User Management allows Privilege Escalation.This issue affects User Management: from n/a through 1.2.
|
[] | null | 8.8 | null | null | null |
GHSA-whx8-2789-8w4w
|
cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.
|
[] | null | 2.9 | null | null | null |
|
GHSA-8rm9-ph3p-x36x
|
The smacker_decode_header_tree function in libavcodec/smacker.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted Smacker data.
|
[] | null | null | null | null | null |
|
CVE-2011-0638
|
Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer.
|
[
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-5p45-3ch6-hr6j
|
A vulnerability was found in Campcodes Complete Online DJ Booking System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/booking-search.php. The manipulation of the argument searchdata leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257470 is the identifier assigned to this vulnerability.
|
[] | null | 3.5 | null | null | null |
|
GHSA-fc7q-x42h-7ff2
|
In the Linux kernel, the following vulnerability has been resolved:drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()If we have no VBT, or the VBT didn't declare the encoder
in question, we won't have the 'devdata' for the encoder.
Instead of oopsing just bail early.We won't be able to tell whether the port is DP++ or not,
but so be it.(cherry picked from commit 26410896206342c8a80d2b027923e9ee7d33b733)
|
[] | null | null | null | null | null |
|
GHSA-h5pc-cx6w-rpgv
|
The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-22271
|
Spring Cloud Function Web DOS Vulnerability
|
In Spring Cloud Function framework, versions 4.1.x prior to 4.1.2, 4.0.x prior to 4.0.8 an application is vulnerable to a DOS attack when attempting to compose functions with non-existing functions.
Specifically, an application is vulnerable when all of the following are true:
User is using Spring Cloud Function Web module
Affected Spring Products and Versions Spring Cloud Function Framework 4.1.0 to 4.1.2 4.0.0 to 4.0.8
References https://spring.io/security/cve-2022-22979 https://checkmarx.com/blog/spring-function-cloud-dos-cve-2022-22979-and-unintended-function-invocation/ History 2020-01-16: Initial vulnerability report published.
|
[
"cpe:2.3:a:vmware:spring_cloud_function:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_cloud_function:4.1.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
CVE-2025-4195
|
itsourcecode Gym Management System ajax.php sql injection
|
A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /ajax.php?action=save_member. The manipulation of the argument umember_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-2vq9-q9w6-2hh6
|
The remember me feature in portal/scr_authentif.php in POSH (aka Posh portal or Portaneo) 3.0, 3.2.1, 3.3.0, and earlier stores the username and MD5 digest of the password in cleartext in a cookie, which allows attackers to obtain sensitive information by reading this cookie.
|
[] | null | null | null | null | null |
|
GHSA-cq5q-99pr-fc9j
|
Microsoft Message Queuing Remote Code Execution Vulnerability
|
[] | null | 7.3 | null | null | null |
|
GHSA-94xh-5q62-p3f9
|
** DISPUTED ** PHP remote file inclusion vulnerability in common.php in PHP Photo Album allows remote attackers to execute arbitrary PHP code via a URL in the db_file parameter. NOTE: CVE disputes this vulnerability, because versions 0.3.2.6 and 0.4.1beta do not contain this file. However, it is possible that the original researcher was referring to a different product.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.