id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-xpp4-g6wp-qmp7 | A vulnerability classified as problematic has been found in IceWarp 12.0.2.1/12.0.3.1. This affects an unknown part of the file /install/ of the component Utility Download Handler. The manipulation of the argument lang with the input 1%27"()%26%25<zzz><ScRiPt>alert(document.domain)</ScRiPt> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249759. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | 4.3 | null | null |
|
GHSA-jvqm-qh85-5q6r | The MQXR service in WMQ Telemetry in IBM WebSphere MQ 7.1 before 7.1.0.7, 7.5 through 7.5.0.5, and 8.0 before 8.0.0.4 uses world-readable permissions for a cleartext file containing the SSL keystore password, which allows local users to obtain sensitive information by reading this file. | []
| null | null | 4 | null |
|
CVE-2024-48896 | Moodle: users' names returned in messaging error message | A vulnerability was found in Moodle. It is possible for users with the "send message" capability to view other users' names that they may not otherwise have access to via an error message in Messaging. Note: The name returned follows the full name format configured on the site. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-vv88-3pw7-jw7q | A cross-site scripting (XSS) filter bypass vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct XSS attacks against a user of an affected device. More Information: CSCvc21620. Known Affected Releases: 10.5(2.14076.1). Known Fixed Releases: 12.0(0.98000.641) 12.0(0.98000.500) 12.0(0.98000.219). | []
| null | null | 6.1 | null |
|
GHSA-47p7-xfcc-4pv9 | php-imap vulnerable to RCE through a directory traversal vulnerability | SummaryAn unsanitized attachment filename allows any unauthenticated user to leverage a directory traversal vulnerability which results in a remote code execution vulnerability.DetailsAn attacker can send an email with a malicious attachment to the inbox, which gets crawled with webklex/php-imap or webklex/laravel-imap. Prerequisite for the vulnerability is that the script stores the attachments without providing a `$filename`, or providing an unsanitized `$filename`, in `src/Attachment::save(string $path, string $filename = null)` (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L251-L255).
In this case, where no `$filename` gets passed into the `Attachment::save()` method, the package would use a series of unsanitized and insecure input values from the mail as fallback (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L252).
Even if a developer passes a `$filename` into the `Attachment::save()` method, e.g. by passing the name or filename of the mail attachment itself (from email headers), the input values never get sanitized by the package.
There is also no restriction about the file extension (e.g. ".php") or the contents of a file. This allows an attacker to upload malicious code of any type and content at any location where the underlying user has write permissions.
The attacker can also overwrite existing files and inject malicious code into files that, e.g. get executed by the system via cron, requests,...
The official documentation only shows examples of `Attachment::save()` without providing the `$filename` (https://www.php-imap.com/api/attachment), which makes this vulnerability even more widespread.PoCsend an email with a malicious attachment to an inbox, which gets crawled by the packagecrawl email with malicious attachmentstore the attachment with `Attachment::save('/path/to/storage')` without providing a `$filename` valueImpactThis is a remote code execution vulnerability that is made possible through a directory traversal vulnerability.
Every application that stores attachments with `Attachment::save()` without providing a `$filename` or passing unsanitized user input is affected by this attack. | []
| null | 9 | null | null |
CVE-2022-28992 | A Cross-Site Request Forgery (CSRF) in Online Banquet Booking System v1.0 allows attackers to change admin credentials via a crafted POST request. | [
"cpe:2.3:a:phpgurukul:online_banquet_booking_system:1.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2021-41350 | Microsoft Exchange Server Spoofing Vulnerability | Microsoft Exchange Server Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_21:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_10:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
GHSA-cg87-qmcj-jgfp | Uncontrolled search path in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | 7.3 | null | null |
|
GHSA-whgj-xqgq-mp34 | IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24900. | []
| null | null | 7.8 | null |
|
CVE-2022-46118 | Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/?page=product_per_brand&bid=. | [
"cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
CVE-2024-11993 | Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.4.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field | []
| 4.6 | null | null | null |
|
GHSA-xrh9-pr8p-fpqj | This vulnerability allows remote attackers to create arbitrary files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within add.php. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10125. | []
| null | 6.5 | null | null |
|
CVE-2006-6703 | Multiple cross-site scripting (XSS) vulnerabilities in Oracle Portal 9i and 10g allow remote attackers to inject arbitrary JavaScript via the tc parameter in webapp/jsp/container_tabs.jsp, and other unspecified vectors. | [
"cpe:2.3:a:oracle:oracle10g:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2021-38407 | Delta Electronics DIALink | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code. | [
"cpe:2.3:a:deltaww:dialink:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
CVE-2018-5990 | SQL Injection exists in the AllVideos Reloaded 1.2.x component for Joomla! via the divid parameter. | [
"cpe:2.3:a:allvideos_reloaded_project:allvideos_reloaded:*:*:*:*:*:joomla\\!:*:*"
]
| null | null | 9.8 | 7.5 |
|
RHSA-2021:0486 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update | openssl: EDIPARTYNAME NULL pointer de-reference | [
"cpe:/a:redhat:jboss_core_services:1::el7"
]
| null | 5.9 | null | null |
GHSA-xhvm-w5fj-p25w | There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1296 in JasPer 2.0.12 that will lead to a remote denial of service attack. | []
| null | 7.5 | null | null |
|
RHSA-2018:3521 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Multi-Release attribute read from outside of the main manifest attributes (Utility, 8199171) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 8.1 | null |
GHSA-49mq-f6v3-c6q2 | BigTree CMS through 4.2.18 has CSRF related to the core\admin\modules\users\profile\update.php script (modify user information), the index.php/admin/developer/packages/delete/ URI (remove packages), the index.php/admin/developer/upgrade/ignore/?versions= URI, and the index.php/admin/developer/upgrade/set-ftp-directory/ URI. | []
| null | null | 8.8 | null |
|
GHSA-38cv-ch3v-j5cw | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.Users are recommended to upgrade to version 18.12.13, which fixes the issue. | []
| null | 9.1 | null | null |
|
GHSA-83qf-hj98-xp2q | Multiple PHP remote file inclusion vulnerabilities in HYIP Manager Pro allow remote attackers to execute arbitrary PHP code via a URL in the plugin_file parameter to (1) Smarty.class.php and (2) Smarty_Compiler.class.php in inc/libs/; (3) core.display_debug_console.php, (4) core.load_plugins.php, (5) core.load_resource_plugin.php, (6) core.process_cached_inserts.php, (7) core.process_compiled_include.php, and (8) core.read_cache_file.php in inc/libs/core/; and other unspecified files. NOTE: (1) and (2) might be incorrectly reported vectors in Smarty. | []
| null | null | null | null |
|
RHSA-2022:0007 | Red Hat Security Advisory: idm:DL1 security update | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 7.2 | null | null |
CVE-2017-1000463 | Leafpub version 1.2.0-beta6 is vulnerable to stored cross-site scripting vulnerability, within the edit blog post page, which can result in disruption of service and execution of javascript code. | [
"cpe:2.3:a:leafpub:leafpub:1.2.0:beta6:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
RHSA-2008:1023 | Red Hat Security Advisory: pidgin security and bug fix update | pidgin: remote DoS via MSN message with crafted file name pidgin: unrestricted download of arbitrary files triggered via UPnP pidgin: NSS plugin doesn't verify SSL certificates | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
]
| null | null | null | null |
GHSA-r5wg-fxw7-6v36 | The HD Quiz WordPress plugin before 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 4.8 | null | null |
|
CVE-2020-6112 | An exploitable code execution vulnerability exists in the JPEG2000 Stripe Decoding functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242 when decoding sub-samples. While initializing tiles with sub-sample data, the application can miscalculate a pointer for the stripes in the tile which allow for the decoder to write out of-bounds and cause memory corruption. This can result in code execution. A specially crafted image can be embedded inside a PDF and loaded by a victim in order to trigger this vulnerability. | [
"cpe:2.3:a:gonitro:nitro_pro:13.13.2.242:*:*:*:*:*:*:*",
"cpe:2.3:a:gonitro:nitro_pro:13.16.2.300:*:*:*:*:*:*:*"
]
| null | null | 8.8 | null |
|
GHSA-4cx5-2fr7-x88f | Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/course/index.php'. | []
| null | 7.1 | null | null |
|
CVE-2019-4582 | IBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 167288. | [
"cpe:2.3:a:ibm:maximo_asset_management:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
|
GHSA-mppj-ccp4-4673 | McAfee Network Data Loss Prevention (NDLP) before 9.3 stores the SSH key in cleartext, which allows local users to obtain sensitive information via unspecified vectors. | []
| null | null | null | null |
|
GHSA-75jr-ff4h-qp4g | SQL injection vulnerability in login.asp in ASPjar Guestbook allows remote attackers to execute arbitrary SQL commands via the password field. | []
| null | null | null | null |
|
GHSA-23v9-8jvm-jh7q | The Visual Link Preview WordPress plugin before 2.2.3 does not enforce authorisation on several AJAX actions and has the CSRF nonce displayed for all authenticated users, allowing any authenticated user (such as subscriber) to call them and 1) Get and search through title and content of Draft post, 2) Get title of a password-protected post as well as 3) Upload an image from an URL | []
| null | 5.4 | null | null |
|
GHSA-w6mf-3p4q-9p72 | Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015, and IP2016 allows remote authenticated users to affect integrity via vectors related to SWSE Server, a different vulnerability than CVE-2016-5463. | []
| null | null | 4.1 | null |
|
GHSA-7rc9-5vxf-3h3m | In MPD before 0.23.8, as used on Automotive Grade Linux and other platforms, the PipeWire output plugin mishandles a Drain call in certain situations involving truncated files. Eventually there is an assertion failure in libmpdclient because libqtappfw passes in a NULL pointer. | []
| null | 7.5 | null | null |
|
GHSA-v7jc-crf6-wh7w | In parseMPEGCCData of NuPlayer2CCDecoder.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-111874331 | []
| null | null | 8.8 | null |
|
CVE-2008-2851 | Multiple buffer overflows in OFF System before 0.19.14 allow remote attackers to have an unknown impact via unspecified vectors related to "parsing of http headers." | [
"cpe:2.3:a:offsystem:offsystem:0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.i:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.j:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.k:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.l:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.m:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.n:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.o:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.p:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.10.15.q:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.05:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.06:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.07:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.08:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.09:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.13.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.13.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.13.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.13.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.13.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.05:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.06:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.07:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.14.08:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.05:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.06:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.07:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.08:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.09:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.05:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.06:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.07:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.08:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.09:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.10:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.11:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.12:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.16.13:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.05:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.06:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.07:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.08:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.09:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.11:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.12:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.17.13:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.05:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.06:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.07:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.08:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.09:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.11:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.12:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.13:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.14:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.15:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.16:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.17:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.18:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.18.19:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.00:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.01:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.02:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.03:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.04:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.05:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.06:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.07:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.08:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.09:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.11:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.12:*:*:*:*:*:*:*",
"cpe:2.3:a:offsystem:offsystem:0.19.13:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-93hf-hv49-rhh9 | The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them. | []
| null | 4.3 | null | null |
|
CVE-2018-14610 | An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 7.1 |
|
CVE-2018-18244 | Cross-site scripting in syslog.html in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript code via an HTTP Referer Header. | [
"cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-3gqx-89wv-8h66 | Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an authenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Reflected XSS. | []
| null | 5.4 | null | null |
|
CVE-2016-10182 | An issue was discovered on the D-Link DWR-932B router. qmiweb allows command injection with ` characters. | [
"cpe:2.3:o:dlink:dwr-932b_firmware:02.02eu:revb:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-932b:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2025-38299 | ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY() | In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY()
ETDM2_IN_BE and ETDM1_OUT_BE are defined as COMP_EMPTY(),
in the case the codec dai_name will be null.
Avoid a crash if the device tree is not assigning a codec
to these links.
[ 1.179936] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[ 1.181065] Mem abort info:
[ 1.181420] ESR = 0x0000000096000004
[ 1.181892] EC = 0x25: DABT (current EL), IL = 32 bits
[ 1.182576] SET = 0, FnV = 0
[ 1.182964] EA = 0, S1PTW = 0
[ 1.183367] FSC = 0x04: level 0 translation fault
[ 1.183983] Data abort info:
[ 1.184406] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[ 1.185097] CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 1.185766] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 1.186439] [0000000000000000] user address but active_mm is swapper
[ 1.187239] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[ 1.188029] Modules linked in:
[ 1.188420] CPU: 7 UID: 0 PID: 70 Comm: kworker/u32:1 Not tainted 6.14.0-rc4-next-20250226+ #85
[ 1.189515] Hardware name: Radxa NIO 12L (DT)
[ 1.190065] Workqueue: events_unbound deferred_probe_work_func
[ 1.190808] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1.191683] pc : __pi_strcmp+0x24/0x140
[ 1.192170] lr : mt8195_mt6359_soc_card_probe+0x224/0x7b0
[ 1.192854] sp : ffff800083473970
[ 1.193271] x29: ffff800083473a10 x28: 0000000000001008 x27: 0000000000000002
[ 1.194168] x26: ffff800082408960 x25: ffff800082417db0 x24: ffff800082417d88
[ 1.195065] x23: 000000000000001e x22: ffff800082dbf480 x21: ffff800082dc07b8
[ 1.195961] x20: 0000000000000000 x19: 0000000000000013 x18: 00000000ffffffff
[ 1.196858] x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000006
[ 1.197755] x14: ffff800082407af0 x13: 6e6f69737265766e x12: 692d6b636f6c6374
[ 1.198651] x11: 0000000000000002 x10: ffff80008240b920 x9 : 0000000000000018
[ 1.199547] x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000
[ 1.200443] x5 : 0000000000000000 x4 : 8080808080000000 x3 : 303933383978616d
[ 1.201339] x2 : 0000000000000000 x1 : ffff80008240b920 x0 : 0000000000000000
[ 1.202236] Call trace:
[ 1.202545] __pi_strcmp+0x24/0x140 (P)
[ 1.203029] mtk_soundcard_common_probe+0x3bc/0x5b8
[ 1.203644] platform_probe+0x70/0xe8
[ 1.204106] really_probe+0xc8/0x3a0
[ 1.204556] __driver_probe_device+0x84/0x160
[ 1.205104] driver_probe_device+0x44/0x130
[ 1.205630] __device_attach_driver+0xc4/0x170
[ 1.206189] bus_for_each_drv+0x8c/0xf8
[ 1.206672] __device_attach+0xa8/0x1c8
[ 1.207155] device_initial_probe+0x1c/0x30
[ 1.207681] bus_probe_device+0xb0/0xc0
[ 1.208165] deferred_probe_work_func+0xa4/0x100
[ 1.208747] process_one_work+0x158/0x3e0
[ 1.209254] worker_thread+0x2c4/0x3e8
[ 1.209727] kthread+0x134/0x1f0
[ 1.210136] ret_from_fork+0x10/0x20
[ 1.210589] Code: 54000401 b50002c6 d503201f f86a6803 (f8408402)
[ 1.211355] ---[ end trace 0000000000000000 ]--- | []
| null | null | null | null |
GHSA-px2r-hc96-6x9w | The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 27.5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
CVE-2013-2261 | Cryptocat before 2.0.22 Chrome Extension 'img/keygen.gif' has Information Disclosure | [
"cpe:2.3:a:cryptocat_project:cryptocat:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-6qm8-8j44-j9h2 | An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs. | []
| null | null | 7.5 | null |
|
GHSA-m265-9cv9-6vq9 | Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | []
| null | null | null | null |
|
GHSA-6798-7724-88wh | An issue was discovered in Skybox Platform before 7.5.401. Reflected cross-site scripting vulnerabilities exist in /skyboxview/webservice/services/VersionRepositoryWebService via a soapenv:Body element, or in the status parameter to login.html. | []
| null | null | 5.4 | null |
|
RHSA-2020:4182 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Count overflow in FUSE request leading to use-after-free issues. | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 7.8 | null |
CVE-2020-0948 | A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0949, CVE-2020-0950. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 9.3 |
|
GHSA-6mmp-3mq7-r6c3 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | []
| null | 5.5 | null | null |
|
GHSA-chhh-4xrf-42pg | libcurl's URL API function
[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode
conversions, to and from IDN. Asking to convert a name that is exactly 256
bytes, libcurl ends up reading outside of a stack based buffer when built to
use the *macidn* IDN backend. The conversion function then fills up the
provided buffer exactly - but does not null terminate the string.This flaw can lead to stack contents accidently getting returned as part of
the converted string. | []
| null | 3.1 | null | null |
|
GHSA-67m4-qxp3-j6hh | TrueLayer.Client SSRF when fetching payment or payment provider | ImpactThe vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure.PatchesVersions of TrueLayer.Client `v1.6.0` and later are not affected.WorkaroundsThe issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the TrueLayer.Client library. | []
| null | null | 8.6 | null |
GHSA-mw37-2wq7-83rg | BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables. | []
| null | null | null | null |
|
CVE-2019-12525 | An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1. | [
"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2018-5552 | DocuTrac DTISQLInstaller.exe Hard-Coded Salt | Versions of DocuTrac QuicDoc and Office Therapy that ship with DTISQLInstaller.exe version 1.6.4.0 and prior contains a hard-coded cryptographic salt, "S@l+&pepper". | [
"cpe:2.3:a:docutracinc:dtisqlinstaller:*:*:*:*:*:*:*:*"
]
| null | null | 2.9 | null |
GHSA-2rfw-m9cr-h7jf | Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via unknown vectors in (1) NmConsole/Tools.asp and (2) NmConsole/DeviceSelection.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
CVE-2014-6272 | Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libevent_project:libevent:2.1.4:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-25283 | An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. BT manager allows attackers to bypass intended access restrictions on a certain mode. The LG ID is LVE-SMP-200021 (September 2020). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-4jf6-93vm-4232 | IBM SecureWay Firewall before 4.2.2 performs extra processing before determining that a packet is invalid and dropping it, which allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed TCP packets without any flags set. | []
| null | null | null | null |
|
GHSA-mmg6-pq22-8rvg | ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c. | []
| null | null | null | null |
|
CVE-2023-47245 | WordPress ANAC XML Viewer Plugin <= 1.7 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi ANAC XML Viewer plugin <= 1.7 versions. | [
"cpe:2.3:a:marcomilesi:anac_xml_viewer:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null |
RHSA-2012:1263 | Red Hat Security Advisory: postgresql and postgresql84 security update | module): XXE by applying XSL stylesheet to the document postgresql: File disclosure through XXE in xmlparse by DTD validation | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
GHSA-xm3j-wpq5-h526 | Google Monorail before 2018-05-04 has a Cross-Site Search (XS-Search) vulnerability because CSV downloads are affected by CSRF, and calculations of download times (for requests with an unsupported axis) can be used to obtain sensitive information about the content of bug reports. | []
| null | null | 5.3 | null |
|
CVE-2025-48232 | WordPress Xpro Addons For Beaver Builder – Lite <= 1.5.5 - Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xpro Xpro Addons For Beaver Builder – Lite allows Stored XSS. This issue affects Xpro Addons For Beaver Builder – Lite: from n/a through 1.5.5. | []
| null | 6.5 | null | null |
CVE-2019-3736 | Dell EMC Integrated Data Protection Appliance versions prior to 2.3 contain a password storage vulnerability in the ACM component. A remote authenticated malicious user with root privileges may potentially use a support tool to decrypt encrypted passwords stored locally on the system to use it to access other components using the privileges of the compromised user. | [
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_idpa_dp4400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_idpa_dp5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_idpa_dp8300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:emc_idpa_dp8800:-:*:*:*:*:*:*:*"
]
| null | null | 8.2 | null |
|
CVE-2021-4333 | The WP Statistics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 13.1.1. This is due to missing or incorrect nonce validation on the view() function. This makes it possible for unauthenticated attackers to activate and deactivate arbitrary plugins, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
|
CVE-2018-14567 | libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251. | [
"cpe:2.3:a:xmlsoft:libxml2:2.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
GHSA-hw3m-8gm5-mc75 | Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | []
| null | null | null | null |
|
GHSA-vq84-wx4w-6r76 | Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query. | []
| null | 9.8 | null | null |
|
CVE-2006-4209 | PHP remote file inclusion vulnerability in install3.php in WEBInsta Mailing List Manager 1.3e allows remote attackers to execute arbitrary PHP code via a URL in the cabsolute_path parameter. | [
"cpe:2.3:a:webinsta:mailing_list_manager:1.3e:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-36702 | libiec61850 v1.5 was discovered to contain a heap overflow via the BerEncoder_encodeLength function at /asn1/ber_encoder.c. | [
"cpe:2.3:a:mz-automation:libiec61850:1.5.0:*:*:*:*:*:*:*"
]
| null | 7.4 | null | null |
|
CVE-2020-11041 | Improper Validation of Array Index in FreeRDP | In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0. | [
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 2.2 | null | null |
GHSA-75jh-c69w-j2r8 | Cross-site request forgery (CSRF) vulnerability in the OSF module 7.x-3.x before 7.x-3.1 for Drupal, when the OSF Import module is enabled, allows remote attackers to hijack the authentication of administrators for requests that create new OSF datasets via unspecified vectors. | []
| null | null | null | null |
|
CVE-2022-32801 | This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5. An app may be able to gain root privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2023-0146 | Naver Map <= 1.1.0 - Contributor+ Stored XSS | The Naver Map WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [
"cpe:2.3:a:naver_map_project:naver_map:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
CVE-2001-0764 | Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument. | [
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.10:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2018-13042 | The 1Password application 6.8 for Android is affected by a Denial Of Service vulnerability. By starting the activity com.agilebits.onepassword.filling.openyolo.OpenYoloDeleteActivity or com.agilebits.onepassword.filling.openyolo.OpenYoloRetrieveActivity from an external application (since they are exported), it is possible to crash the 1Password instance. | [
"cpe:2.3:a:1password:1password:6.8:*:*:*:*:android:*:*"
]
| null | null | 5.9 | 4.3 |
|
GHSA-25jj-2ph2-cmvq | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | []
| null | 7.4 | null | null |
|
CVE-2005-3027 | Sybari Antigen 8.0 SR2 does not properly filter SMTP messages, which allows remote attackers to bypass custom filter rules and send file attachments of arbitrary file types via a message with a subject of "Antigen forwarded attachment". | [
"cpe:2.3:a:sybari:antigen:8.0:sr2:exchange:*:*:*:*:*",
"cpe:2.3:a:sybari:antigen:8.0:sr2:smtp_gateways:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-7gxq-5qqc-v3fc | TYPO3 Open redirect vulnerability in the Access tracking mechanism | Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | []
| null | 5.3 | null | null |
CVE-2001-0520 | Aladdin eSafe Gateway versions 3.0 and earlier allows a remote attacker to circumvent filtering of SCRIPT tags by embedding the scripts within certain HTML tags including (1) onload in the BODY tag, (2) href in the A tag, (3) the BUTTON tag, (4) the INPUT tag, or (5) any other tag in which scripts can be defined. | [
"cpe:2.3:a:aladdin_knowledge_systems:esafe_gateway:3.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-79mx-4vf7-wqf7 | HCL Domino is susceptible to an information disclosure vulnerability. In some scenarios, local calls made on the server to search the Domino directory will ignore xACL read restrictions. An authenticated attacker could leverage this vulnerability to access attributes from a user's person record. | []
| null | 5.5 | null | null |
|
GHSA-5mr2-62qq-29fg | There is an improper access control vulnerability in Huawei Share. The software does not properly restrict access to certain file from certain application. An attacker tricks the user into installing a malicious application then establishing a connect to the attacker through Huawei Share, successful exploit could cause information disclosure. | []
| null | null | null | null |
|
CVE-2010-3754 | The FXCLI_OraBR_Exec_Command function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 uses values of packet fields to determine the content and length of data copied to memory, which allows remote attackers to execute arbitrary code via a crafted packet. NOTE: this might overlap CVE-2010-3059. | [
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-8xrm-4q7g-x2h2 | Multiple directory traversal vulnerabilities in ha 0.999p+dfsg-5. | []
| null | null | 7.5 | null |
|
RHSA-2020:3873 | Red Hat Security Advisory: libsrtp security and bug fix update | libsrtp: buffer overflow in application of crypto profiles libsrtp: improper handling of CSRC count and extension header length in RTP header | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
GHSA-48vr-cw3x-rrhf | DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the FwBlockServiceSmm driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.23, 5.3: 05.36.23, 5.4: 05.44.23, 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022048 | []
| null | 6.4 | null | null |
|
CVE-2018-18506 | When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
]
| null | 5.9 | null | 4.3 |
|
CVE-2021-41310 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1. | [
"cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2017-12724 | A Use of Hard-coded Credentials issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The FTP server on the pump contains hardcoded credentials, which are not fully initialized. The FTP server is only accessible if the pump is configured to allow FTP connections. | [
"cpe:2.3:o:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:1.6:*:*:*:*:*:*:*",
"cpe:2.3:h:smiths-medical:medfusion_4000_wireless_syringe_infusion_pump:-:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 6.8 |
|
CVE-2025-46547 | In Sherpa Orchestrator 141851, the web application lacks protection against CSRF attacks, with resultant effects of an attacker conducting XSS attacks, adding a new user or role, or exploiting a SQL injection issue. | []
| null | 5.4 | null | null |
|
GHSA-8p32-q5c5-q65x | VP-ASP Shopping Cart 6.50 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database containing the password via a direct request for database/shopping650.mdb. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
GHSA-j324-jgjr-rvx5 | Out-of-bound read in the wireless driver in the Linux kernel due to lack of check of buffer length. in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDX20, SDX55, SXR1130 | []
| null | null | null | null |
|
CVE-2024-2444 | Inline Related Posts < 3.5.0 - Admin+ Stored XSS | The Inline Related Posts WordPress plugin before 3.5.0 does not sanitise and escape some of its settings, which could allow high privilege users such as Admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | [
"cpe:2.3:a:data443:inline_related_posts:*:*:*:*:*:wordpress:*:*"
]
| null | 4.8 | null | null |
CVE-2023-5218 | Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-h99m-6755-rgwc | Rancher Remote Code Execution via Cluster/Node Drivers | ImpactA vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the `chroot` jail and gain root access to the Rancher container itself. In production environments, further privilege escalation is possible based on living off the land within the Rancher container itself. For the test and development environments, based on a –privileged Docker container, it is possible to escape the Docker container and gain execution access on the host system.This happens because:During startup, Rancher appends the `/opt/drivers/management-state/bin` directory to the `PATH` environment variable.In Rancher, the binaries `/usr/bin/rancher-machine`, `/usr/bin/helm_v3`, and `/usr/bin/kustomize` are assigned a UID of 1001 and a GID of 127 instead of being owned by the root user.Rancher employs a jail mechanism to isolate the execution of node drivers from the main process. However, the drivers are executed with excessive permissions.During the registration of new node drivers, its binary is executed with the same user as the parent process, which could enable an attacker to gain elevated privileges by registering a malicious driver.Lack of validation on the driver file type, which allows symbolic links to be used.Please consult the associated [MITRE ATT&CK - Technique - Privilege Escalation](https://attack.mitre.org/tactics/TA0004/) and [MITRE ATT&CK - Technique - Execution](https://attack.mitre.org/tactics/TA0002/) for further information about this category of attack.**Since they run at a privileged level, it is recommended to use trusted drivers only.**PatchesThe fix involves some key areas with the following changes:Fixing the `PATH` environment variable:Remove the step that appends `/opt/drivers/management-state/bin` to the `PATH` environment variable.Binaries permissions:Correct the permission of the binaries `/usr/bin/rancher-machine`, `/usr/bin/helm_v3`, and `/usr/bin/kustomize` so that they are owned by the root user.Improving Rancher jail security mechanism:A new group `jail-accessors` has been created, and the rancher user has been added to this group.The `jail-accessors` group is granted read and execute permissions for the directories `/var/lib/rancher`, `/var/lib/cattle`, and `/usr/local/bin`.The jail mechanism has been enhanced to execute commands using the non-root `rancher` user and the `jail-accessors` group. Additionally, a new setting, `UnprivilegedJailUser`, has been introduced to manage this behavior, allowing users to opt-out if they need to run drivers in a more privileged context.Limit the devices copied to the jail directory to a minimal set.Fixing node driver registration:The `NewPlugin(driver)` function in the `rancher/machine` module has been updated to allow setting the UID and GID for starting the plugin server. If the environment variables `MACHINE_PLUGIN_UID` and `MACHINE_PLUGIN_GID` are set, their values will be used to configure the user credentials for launching the plugin server.Rancher now sets these environment variables with a non-root UID and GID before invoking the `NewPlugin(driver)` function and then unsets them after retrieving the creation flags.Improvements on driver package:The `driver` package has been revised to verify that the downloaded driver binary is a regular file.The `driver` package has been revised to verify that the target file in the downloaded tar file is a regular file.The `driver` package now executes the downloaded driver binary within a jail, with a default timeout of 5 seconds.Other improvements:The helm package has been updated to ensure appropriate permissions are set on the generated kubeconfig file.The `nodeConfig` package has been updated to ensure proper permissions are applied when extracting the node configuration.Patched versions include releases `2.7.16`, `2.8.9` and `2.9.3`.WorkaroundsIf you can't upgrade to a fixed version, please make sure that:Drivers are only executed from trusted sources.The use of Admins/Restricted Admins is limited to trusted users.ReferencesIf you have any questions or comments about this advisory:Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/). | []
| null | 9.1 | null | null |
GHSA-xp38-pxxv-x3pr | Cross-site scripting (XSS) vulnerability in htdocs/php.php in OpenConcept Back-End CMS 0.4.7 allows remote attackers to inject arbitrary web script or HTML via the page[] parameter. | []
| null | null | null | null |
|
CVE-2019-19006 | Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below have Incorrect Access Control. | [
"cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-89x4-gm7p-7fr8 | Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a compressed GIF file, related to gifcodec.cpp and gifimage.cpp. | []
| null | null | null | null |
|
CVE-2016-10990 | The wp-cerber plugin before 2.7 for WordPress has XSS via the X-Forwarded-For HTTP header. | [
"cpe:2.3:a:wpcerber:cerber_security_antispam_\\&_malware_scan:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2014-8456 | Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-8445, CVE-2014-8446, CVE-2014-8447, CVE-2014-8458, CVE-2014-8459, CVE-2014-8461, and CVE-2014-9158. | [
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.04:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.06:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.07:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.08:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.09:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.