id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-5hv5-8328-hrj4 | Weak Authentication vulnerability in AresIT WP Compress allows Authentication Abuse. This issue affects WP Compress: from n/a through 6.30.30. | []
| null | 5.3 | null | null |
|
CVE-2024-34489 | OFPHello in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via length=0. | [
"cpe:2.3:a:faucet-sdn:ryu:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-wq64-45vp-fhqq | A vulnerability classified as critical has been found in SourceCodester AC Repair and Services System 1.0. Affected is an unknown function of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-228798 is the identifier assigned to this vulnerability. | []
| null | null | 6.3 | null |
|
GHSA-m9vp-5pvm-gxw4 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AB-WP Simple Counter allows Stored XSS.This issue affects Simple Counter: from n/a through 1.0.2. | []
| null | 5.9 | null | null |
|
GHSA-26g5-jjxh-94pm | Exposure of sensitive information in proc file system prior to SMR Jul-2024 Release 1 allows local attackers to read kernel memory address. | []
| null | 5.5 | null | null |
|
GHSA-cq9c-55r7-455x | Improper Authentication in Apache Karaf | In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised. | []
| null | null | 8.1 | null |
CVE-2018-0413 | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. Cisco Bug IDs: CSCvi85159. | [
"cpe:2.3:a:cisco:identity_services_engine_software:2.0\\(0.901\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.1\\(0.188\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.2\\(0.231\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:2.4\\(0.183\\):*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-x9xm-pqf5-5g9w | MFScripts YetiShare v3.5.2 through v4.5.4 might allow an attacker to reset a password by using a leaked hash (the hash never expires until used). | []
| null | null | null | null |
|
CVE-2014-7638 | The Fabuestereo 88.1 FM (aka com.nobexinc.wls_27892411.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:nobexrc:fabuestereo_88.1_fm:3.2.3:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
GHSA-98vv-mx5c-xg6c | Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character. | []
| null | null | null | null |
|
CVE-2021-1212 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
CVE-2022-37053 | TRENDnet TEW733GR v1.03B01 is vulnerable to Command injection via /htdocs/upnpinc/gena.php. | [
"cpe:2.3:o:trendnet:tew733gr_firmware:1.03b01:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew733gr:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2007-3164 | Microsoft Internet Explorer 7, when prompting for HTTP Basic Authentication for an IDN web site, uses ACE labels for the domain name in the status bar, but uses internationalized labels for this name in the authentication dialog, which might allow remote attackers to perform phishing attacks if the user misinterprets confusable characters in the internationalized labels, as demonstrated by displaying xn--theshmogroup-bgk.com only in the status bar. | [
"cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
CVE-2023-50875 | WordPress Sensei LMS Plugin <= 4.17.0 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic Sensei LMS – Online Courses, Quizzes, & Learning allows Stored XSS.This issue affects Sensei LMS – Online Courses, Quizzes, & Learning: from n/a through 4.17.0.
| [
"cpe:2.3:a:automattic:sensei_lms:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
CVE-2010-4683 | Memory leak in Cisco IOS before 15.0(1)XA5 might allow remote attackers to cause a denial of service (memory consumption) by sending a crafted SIP REGISTER message over UDP, aka Bug ID CSCtg41733. | [
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-w7pr-c6mr-6w7j | This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of empty passwords. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9471. | []
| null | null | null | null |
|
GHSA-xmvv-w44w-j8wx | Mattermost Desktop App allows the bypass of Transparency, Consent, and Control (TCC) via code injection | Mattermost Desktop App versions <=5.10.0 explicitly declared unnecessary macOS entitlements which allows an attacker with remote access to bypass Transparency, Consent, and Control (TCC) via code injection. | []
| null | 3.3 | null | null |
CVE-2016-6624 | An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.3:*:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.3 |
|
GHSA-rv7f-8vhf-g8q8 | Opening a maliciously crafted project file may cause an out-of-bounds write, which may allow an attacker to execute arbitrary code. User interaction is require on the WebAccess HMI Designer (versions 2.1.9.95 and prior). | []
| null | null | null | null |
|
ICSA-22-333-03 | Hitachi Energy MicroSCADA Pro/X SYS600 Products (Update A) | An input validation vulnerability exists in the Monitor Pro interface of MicroSCADA Pro and MicroSCADA X SYS600. An authenticated user could launch an administrator level remote code execution regardless of the authenticated user's role. | []
| null | 8.8 | null | null |
GHSA-73cq-86ph-jg4q | The Web Console in HP Application Information Optimizer (formerly HP Database Archiving) 6.2, 6.3, 6.4, 7.0, and 7.1 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, aka ZDI-CAN-2004. | []
| null | null | null | null |
|
CVE-2018-21068 | An issue was discovered on Samsung mobile devices with O(8.0) software. Execution of an application in a locked Secure Folder can occur without a password via a split screen. The Samsung ID is SVE-2018-11669 (July 2018). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
]
| null | 6.2 | null | 2.1 |
|
GHSA-7ggp-cp85-r5cg | When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11. | []
| null | 8.8 | null | null |
|
CVE-2023-5677 | Brandon
Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi
did not have a sufficient input validation allowing for a possible remote code
execution. This flaw can only be exploited after authenticating with an
operator- or administrator-privileged service account. The impact of exploiting
this vulnerability is lower with operator-privileges compared to
administrator-privileges service accounts. Please refer to the Axis security advisory
for more information and solution. | [
"cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:q7414_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:q7414:-:*:*:*:*:*:*:*",
"cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
|
GHSA-4662-j96g-mv46 | Arbitrary Code Injection in reduce-css-calc | Affected versions of `reduce-css-calc` pass input directly to `eval`. If user input is passed into the calc function, this may result in cross-site scripting on the browser, or remote code execution on the server.Proof of ConceptRecommendationUpdate to version 1.2.5 or later. | []
| null | null | null | null |
CVE-2014-4143 | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6341. | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-w6w2-c994-p5h3 | tcmu-runner version 1.0.5 to 1.2.0 is vulnerable to a dbus triggered NULL pointer dereference in the tcmu-runner daemon's on_unregister_handler() function resulting in denial of service | []
| null | null | 7.5 | null |
|
GHSA-rrfp-92gh-7p24 | Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'pass' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database. | []
| null | 9.8 | null | null |
|
CVE-2018-15924 | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
CVE-2014-7378 | The Jobranco (aka com.jobranco) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:jobranco_project:jobranco:1.1:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
CVE-2017-13875 | An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (out-of-bounds read) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-7w7m-92p9-f73p | Cross-site scripting (XSS) vulnerability in the GoodReader app 3.16 and earlier for iOS on the iPad, and 3.15.1 and earlier for iOS on the iPhone and iPod touch, allows remote attackers to inject arbitrary web script or HTML via vectors involving use of this app in conjunction with a web browser. | []
| null | null | null | null |
|
CVE-2021-42098 | An incomplete permission check on entries in Devolutions Remote Desktop Manager before 2021.2.16 allows attackers to bypass permissions via batch custom PowerShell. | [
"cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.5 |
|
RHSA-2023:5455 | Red Hat Security Advisory: glibc security update | glibc: Stack read overflow in getaddrinfo in no-aaaa mode glibc: potential use-after-free in getaddrinfo() glibc: potential use-after-free in gaih_inet() glibc: buffer overflow in ld.so leading to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7.8 | null | null |
CVE-2021-31423 | This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-12528. | [
"cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*"
]
| null | null | 6 | null |
|
GHSA-v9p6-xj6q-xr4h | Huawei smartphones Taurus-AL00B with versions earlier than 10.0.0.205(C00E201R7P2) have an improper authentication vulnerability. The software insufficiently validate the user's identity when a user wants to do certain operation. An attacker can trick user into installing a malicious application to exploit this vulnerability. Successful exploit may cause some information disclosure. | []
| null | null | null | null |
|
GHSA-7pgw-44rh-62wc | The Jobs for WordPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.7.11 via the 'job_postings_get_file' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | []
| null | 6.5 | null | null |
|
GHSA-h3w6-hg9p-c6c4 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GoodLayers Goodlayers Hostel allows Reflected XSS. This issue affects Goodlayers Hostel: from n/a through 3.1.2. | []
| null | 7.1 | null | null |
|
CVE-2015-4328 | Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS commands via crafted HTTP requests, as demonstrated by read or write operations on the Unified Communications lookup page, aka Bug ID CSCuv12552. | [
"cpe:2.3:a:cisco:telepresence_video_communication_server_software:x8.5.2:*:*:*:expressway:*:*:*"
]
| null | null | null | 4 |
|
CVE-2018-14403 | MP4NameFirstMatches in mp4util.cpp in MP4v2 2.0.0 mishandles substrings of atom names, leading to use of an inappropriate data type for associated atoms. The resulting type confusion can cause out-of-bounds memory access. | [
"cpe:2.3:a:techsmith:mp4v2:2.0.0:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-6cr6-79pg-f7h2 | Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges. | []
| null | null | 7.8 | null |
|
CVE-2000-0346 | AppleShare IP 6.1 and later allows a remote attacker to read potentially sensitive information via an invalid range request to the web server. | [
"cpe:2.3:a:apple:appleshare:6.1:*:*:ja:*:*:*:*",
"cpe:2.3:a:apple:appleshare:6.2:*:*:ja:*:*:*:*",
"cpe:2.3:a:apple:appleshare:6.3:*:*:ja:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2019-10875 | A URL spoofing vulnerability was found in all international versions of Xiaomi Mi browser 10.5.6-g (aka the MIUI native browser) and Mint Browser 1.5.3 due to the way they handle the "q" query parameter. The portion of an https URL before the ?q= substring is not shown to the user. | [
"cpe:2.3:a:mi:mi_browser:10.5.6-g:*:*:*:*:*:*:*",
"cpe:2.3:a:mi:mint_browser:1.5.3:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-q62w-24vx-vhfg | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Joovii Sendle Shipping Plugin plugin <= 5.13 versions. | []
| null | 7.1 | null | null |
|
GHSA-whcq-9xqv-qhr4 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fugu Maintenance Switch plugin <= 1.5.2 versions. | []
| null | 7.1 | null | null |
|
CVE-2021-26916 | In nopCommerce 4.30, a Reflected XSS issue in the Discount Coupon component allows remote attackers to inject arbitrary web script or HTML through the Filters/CheckDiscountCouponAttribute.cs discountcode parameter. | [
"cpe:2.3:a:nopcommerce:nopcommerce:4.30:-:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2021-47064 | mt76: fix potential DMA mapping leak | In the Linux kernel, the following vulnerability has been resolved:
mt76: fix potential DMA mapping leak
With buf uninitialized in mt76_dma_tx_queue_skb_raw, its field skip_unmap
could potentially inherit a non-zero value from stack garbage.
If this happens, it will cause DMA mappings for MCU command frames to not be
unmapped after completion | []
| null | 5.3 | null | null |
GHSA-h6fq-qr75-3xfq | WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1. | []
| null | null | null | null |
|
GHSA-wpr4-mq6j-hmm7 | The Nova 92.1 FM (aka com.wNova921FM) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
CVE-2002-2359 | Cross-site scripting (XSS) vulnerability in the FTP view feature in Mozilla 1.0 allows remote attackers to inject arbitrary web script or HTML via the title tag of an ftp URL. | [
"cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-prxh-8g89-x88j | IBM Security Access Manager 9.0.1 through 9.0.6 is affected by a security vulnerability that could allow authenticated users to impersonate other users. IBM X-Force ID: 158331. | []
| null | 8.8 | null | null |
|
GHSA-pf3p-x6qj-6j7q | mio invalidly assumes the memory layout of std::net::SocketAddr | The mio crate has assumed std::net::SocketAddrV4 and std::net::SocketAddrV6 have the same memory layout as the system C representation sockaddr. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens. | []
| null | 5.5 | null | null |
PYSEC-2021-68 | null | An issue was discovered in NFStream 5.2.0. Because some allocated modules are not correctly freed, if the nfstream object is directly destroyed without being used after it is created, it will cause a memory leak that may result in a local denial of service (DoS). | []
| null | null | null | null |
CVE-2008-2921 | SQL injection vulnerability in index.php in EZTechhelp EZCMS 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter. | [
"cpe:2.3:a:eztechhelp_company:ezcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:eztechhelp_company:ezcms:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:eztechhelp_company:ezcms:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-12350 | Improper access control in the Intel(R) XTU before version 6.5.1.360 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
CVE-2025-53109 | Model Context Protocol Servers Vulnerable to Path Validation Bypass via Prefix Matching and Symlink Handling | Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). Versions of Filesystem prior to 0.6.4 or 2025.7.01 could allow access to unintended files via symlinks within allowed directories. Users are advised to upgrade to 0.6.4 or 2025.7.01 resolve. | []
| 7.3 | null | null | null |
CVE-2014-6804 | The Deschutes Public MobileLibrary (aka com.bredir.boopsie.deschutes) application 4.5.110 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:boopsie:deschutes_public_mobilelibrary:4.5.110:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
CVE-2020-36409 | A stored cross scripting (XSS) vulnerability in CMS Made Simple 2.2.14 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Add Category" parameter under the "Categories" module. | [
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.14:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
RHSA-2015:1581 | Red Hat Security Advisory: firefox security update | Mozilla: Same origin violation and local file stealing via PDF reader (MFSA 2015-78) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2022:0595 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes | nodejs-json-schema: Prototype pollution vulnerability nanoid: Information disclosure via valueOf() function golang.org/x/crypto: empty plaintext packet causes panic follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor | [
"cpe:/a:redhat:acm:2.3::el7",
"cpe:/a:redhat:acm:2.3::el8"
]
| null | 6.5 | null | null |
GHSA-frpc-jxpr-q373 | Multiple SQL injection vulnerabilities in Ganesha Digital Library (GDL) 4.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) download.php or (2) main.php. | []
| null | null | null | null |
|
RHSA-2022:1080 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 8.3 | null | null |
GHSA-6jw7-jpqj-2pjv | Unspecified vulnerability in the Di Long Weibo (com.icekirin.weibos) application 1.9.9 for Android has unknown impact and attack vectors. | []
| null | null | null | null |
|
ICSA-22-006-01 | Omron CX-One | The affected product is vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.CVE-2022-21137 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | []
| null | null | 7.8 | null |
RHSA-2018:1225 | Red Hat Security Advisory: librelp security update | librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 8.1 | null |
CVE-2022-40723 | Configuration-based MFA Bypass in PingID RADIUS PCV. | The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations. | [
"cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pingidentity:pingid_integration_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pingidentity:radius_pcv:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pingidentity:radius_pcv:2.10.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2018-3597 | In the ADSP RPC driver in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, an arbitrary kernel write can occur. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
CVE-2018-4840 | A vulnerability has been identified in DIGSI 4 (All versions < V4.92), EN100 Ethernet module DNP3 variant (All versions < V1.05.00), EN100 Ethernet module IEC 104 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.30), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The device engineering mechanism allows an unauthenticated remote user to upload a modified device configuration overwriting access authorization passwords. | [
"cpe:2.3:o:siemens:siprotec_compact_7sj80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siprotec_compact_7sj80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siprotec_compact_7sk80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siprotec_compact_7sk80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siprotec_4_7sj66_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siprotec_4_7sj66:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:digsi_4:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:en100_ethernet_module_iec_104_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:en100_ethernet_module_iec_104:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:en100_ethernet_module_dnp3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:en100_ethernet_module_dnp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:en100_ethernet_module_modbus_tcp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:en100_ethernet_module_modbus_tcp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:en100_ethernet_module_profinet_io_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:en100_ethernet_module_profinet_io:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:en100_ethernet_module_iec_61850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:en100_ethernet_module_iec_61850:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
RHSA-2023:5360 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | nodejs-semver: Regular expression denial of service nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
GHSA-g3fv-xj43-xg82 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18454. | []
| null | null | 8.8 | null |
|
CVE-2006-1505 | base_maintenance.php in Basic Analysis and Security Engine (BASE) before 1.2.4 (melissa), when running in standalone mode, allows remote attackers to bypass authentication, possibly by setting the standalone parameter to "yes". | [
"cpe:2.3:a:basic_analysis_and_security_engine:base:1.1.2_zora:*:*:*:*:*:*:*",
"cpe:2.3:a:basic_analysis_and_security_engine:base:1.1.3_lynn:*:*:*:*:*:*:*",
"cpe:2.3:a:basic_analysis_and_security_engine:base:1.1.4_cheryl:*:*:*:*:*:*:*",
"cpe:2.3:a:basic_analysis_and_security_engine:base:1.1_elizabeth:*:*:*:*:*:*:*",
"cpe:2.3:a:basic_analysis_and_security_engine:base:1.2.1_kris:*:*:*:*:*:*:*",
"cpe:2.3:a:basic_analysis_and_security_engine:base:1.2.2_cindy:*:*:*:*:*:*:*",
"cpe:2.3:a:basic_analysis_and_security_engine:base:1.2_betty:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-p3mf-f4gw-v4gr | The mintToken function of a smart contract implementation for Essence, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | []
| null | null | 7.5 | null |
|
CVE-2017-15133 | A denial of service flaw was found in miekg-dns before 1.0.4. A remote attacker could use carefully timed TCP packets to block the DNS server from accepting new connections. | [
"cpe:2.3:a:miekg-dns_prject:miekg-dns:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-78xr-7hpc-9778 | Improper Privilege Management vulnerability in Pandora FMS on all allows Privilege Escalation. This vulnerability causes that a bad privilege assignment could cause a DOS attack that affects the availability of the Pandora FMS server. This issue affects Pandora FMS: from 700 through 773. | []
| null | 8.2 | null | null |
|
CVE-2015-1906 | Cross-site scripting (XSS) vulnerability in the REST API in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, 8.5.0 through 8.5.0.1, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.0 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:standard:*:*:*"
]
| null | null | null | 3.5 |
|
GHSA-rqxp-6926-hphr | MoinMoin vulnerable to privilege escalation | The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non-empty superusers list, does not properly manage users, which allows remote attackers to gain privileges. | []
| 8.7 | 7.5 | null | null |
CVE-2023-43849 | Incorrect access control in firmware upgrade function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to submit a firmware image via HTTP POST requests. This may result in DoS or remote code execution. | [
"cpe:2.3:a:aten:pe6208:2.3.228:*:*:*:*:*:*:*",
"cpe:2.3:a:aten:pe6208:2.4.232:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
GHSA-q7c6-x96r-hrg8 | Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948. | []
| null | null | null | null |
|
CVE-2009-0063 | Cross-site scripting (XSS) vulnerability in the Control Center in Symantec Brightmail Gateway Appliance before 8.0.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:h:symantec:brightmail_gateway_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:brightmail_gateway_appliance:7.5:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:brightmail_gateway_appliance:7.6:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:brightmail_gateway_appliance:7.7:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2013-6410 | nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file. | [
"cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:2.9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wouter_verhelst:nbd:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-jv5x-hvg3-3pjm | An issue was discovered in the File Upload plugin before 4.13.0 for WordPress. A directory traversal can lead to remote code execution by uploading a crafted txt file into the lib directory, because of a wfu_include_lib call. | []
| null | 9.8 | null | null |
|
GHSA-frch-4gjp-rjjv | Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions. | []
| null | null | null | null |
|
CVE-2020-24647 | A remote accessmgrservlet classname input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2020-8222 | A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting. | [
"cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*"
]
| null | 6.8 | null | 4 |
|
GHSA-jmp6-49pc-grvp | NCH Reflect CRM 3.01 allows local users to discover cleartext user account information by reading the configuration files. | []
| null | 3.3 | null | null |
|
GHSA-phfq-h2c2-v87m | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.87. This is due to missing or incorrect nonce validation on the wpr_update_form_action_meta function. This makes it possible for unauthenticated attackers to post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 4.3 | null | null |
|
GHSA-mp2p-wmm5-65r7 | JetBrains IdeaVim before version 0.58 might have caused an information leak in limited circumstances. | []
| null | null | null | null |
|
GHSA-qfcq-5rf4-6g68 | The WP Post Popup WordPress plugin through 3.7.3 does not sanitise and escape some of its inputs, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | []
| null | 4.8 | null | null |
|
CVE-2005-1489 | Unknown vulnerability in Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to obtain the full path of the server via certain requests to (1) calendar_addevent.html, (2) calendar_event.html, or (3) calendar_task.html. | [
"cpe:2.3:a:icewarp:web_mail:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:merak:mail_server:8.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-33653 | Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /Applications/Content%20Manager/Execute.aspx?cmd=convert&mode=HTML. | [
"cpe:2.3:a:sitecore:experience_platform:9.3:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2022-28192 | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges. | [
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:virtual_gpu:14.0:*:*:*:*:*:*:*"
]
| null | 4.1 | null | null |
|
RHSA-2016:0166 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
CVE-2022-39152 | A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17740) | [
"cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2022-49769 | gfs2: Check sb_bsize_shift after reading superblock | In the Linux kernel, the following vulnerability has been resolved:
gfs2: Check sb_bsize_shift after reading superblock
Fuzzers like to scribble over sb_bsize_shift but in reality it's very
unlikely that this field would be corrupted on its own. Nevertheless it
should be checked to avoid the possibility of messy mount errors due to
bad calculations. It's always a fixed value based on the block size so
we can just check that it's the expected value.
Tested with:
mkfs.gfs2 -O -p lock_nolock /dev/vdb
for i in 0 -1 64 65 32 33; do
gfs2_edit -p sb field sb_bsize_shift $i /dev/vdb
mount /dev/vdb /mnt/test && umount /mnt/test
done
Before this patch we get a withdraw after
[ 76.413681] gfs2: fsid=loop0.0: fatal: invalid metadata block
[ 76.413681] bh = 19 (type: exp=5, found=4)
[ 76.413681] function = gfs2_meta_buffer, file = fs/gfs2/meta_io.c, line = 492
and with UBSAN configured we also get complaints like
[ 76.373395] UBSAN: shift-out-of-bounds in fs/gfs2/ops_fstype.c:295:19
[ 76.373815] shift exponent 4294967287 is too large for 64-bit type 'long unsigned int'
After the patch, these complaints don't appear, mount fails immediately
and we get an explanation in dmesg. | []
| null | null | null | null |
CVE-2024-21162 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*"
]
| null | 4.9 | null | null |
|
GHSA-8rvm-f29f-fjx6 | A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor. | []
| null | 6.5 | null | null |
|
CVE-2011-2869 | WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2010-3031 | Buffer overflow in Wyse ThinOS HF 4.4.079i, and possibly other versions before ThinOS 6.5, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the LPD service. | [
"cpe:2.3:o:wyse:thinos_hf:4.4.079i:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2018-14731 | An issue was discovered in HMRServer.js in Parcel parcel-bundler. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1 connection (with a random TCP port number) from any origin. The random port number can be found by connecting to http://127.0.0.1 and reading the "new WebSocket" line in the source code. | [
"cpe:2.3:a:parceljs:parcel:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-75qq-35g6-q528 | The MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin's settings in all versions up to, and including, 1.9.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | []
| null | 4.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.