id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-39139 | XStream is vulnerable to an Arbitrary Code Execution attack | XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. | [
"cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 8.5 | null | null |
CVE-2017-16151 | Based on details posted by the ElectronJS team; A remote code execution vulnerability has been discovered in Google Chromium that affects all recent versions of Electron. Any Electron app that accesses remote content is vulnerable to this exploit, regardless of whether the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled. | [
"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-c32c-76vg-vg23 | Untrusted search path vulnerability in Huawei Mobile Partner for Windows 23.009.05.03.1014 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wintab32.dll in the Mobile Partner directory. | [] | null | null | null | null |
|
GHSA-jxrr-9496-c4x7 | An issue was discovered in Veritas NetBackup 8.0 and earlier and NetBackup Appliance 3.0 and earlier. Denial of service affecting NetBackup server can occur. | [] | null | null | 6.5 | null |
|
GHSA-638c-cq5x-v2qp | Untrusted search path vulnerability in Adobe Dreamweaver CS5 11.0 build 4916, build 4909, and probably other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) mfc90loc.dll or (2) dwmapi.dll that is located in the same folder as a CSS, PHP, ASP, or other file that automatically launches Dreamweaver. | [] | null | null | null | null |
|
GHSA-97xh-65pc-g79h | phpBB 2.0.21 does not properly handle pathnames ending in %00, which allows remote authenticated administrative users to upload arbitrary files, as demonstrated by a query to admin/admin_board.php with an avatar_path parameter ending in .php%00. | [] | null | null | null | null |
|
GHSA-2r77-fvv3-mm9j | Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via \zb_users\theme\shell\template. | [] | null | 9.8 | null | null |
|
CVE-2011-1029 | Cross-site scripting (XSS) vulnerability in IBM Rational Team Concert (RTC) 2.0.0.x allows remote authenticated users to inject arbitrary web script or HTML via the name of a shared report. | [
"cpe:2.3:a:ibm:rational_team_concert:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:2.0.0.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2023-29409 | Large RSA keys can cause high CPU usage in crypto/tls | Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable. | [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:golang:go:1.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:golang:go:1.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:golang:go:1.21.0:rc3:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-h822-qcq8-pf95 | ** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for WordPress has SSRF in the updraft_ajax_handler function in /wp-content/plugins/updraftplus/admin.php via an httpget subaction. NOTE: the vendor reports that this does not cross a privilege boundary. | [] | null | null | 8.1 | null |
|
CVE-2025-27433 | Broken Access Control vulnerabilities in SAP S/4HANA (Manage Bank Statements) | The Manage Bank Statements in SAP S/4HANA allows authenticated attacker to bypass certain functionality restrictions of the application and upload files to a reversed bank statement. This vulnerability has a low impact on the application's integrity, with no effect on confidentiality and availability of the application. | [] | null | 4.3 | null | null |
GHSA-8rc5-hx3v-2jg7 | Sanitizer bypass in svg-sanitizer | It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer. | [] | null | 6.1 | null | null |
CVE-2006-5902 | viksoe GMail Drive shell extension allows remote attackers to perform virtual filesystem actions via e-mail messages with certain subject lines, as demonstrated by (1) a GMAILFS: [13;a;1] message with a new filename and a file attachment, which injects a new file into the filesystem; (2) a GMAILFS: [13;a;1] message with an existing filename and a file attachment, which overwrites existing file content; and (3) a GMAILFS: [14;a;1] message, which creates a folder. | [
"cpe:2.3:a:viksoe:gmail_drive:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-0180 | Cross-site request forgery (CSRF) vulnerability in Quiz And Survey Master versions prior to 7.3.7 allows a remote attacker to hijack the authentication of administrators and conduct arbitrary operations via a specially crafted web page. | [
"cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-9m4g-f42q-vrrh | Plone Sandbox Bypass | The sandbox whitelisting function (`allowmodule.py`) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing. | [] | 6.5 | 9.9 | null | null |
GHSA-5wf8-mf9h-53x2 | An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941. | [] | null | null | null | null |
|
CVE-2020-10544 | An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation. | [
"cpe:2.3:a:primetek:primefaces:7.0.11:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2020-15035 | NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Monitoring-Map.php hde parameter. | [
"cpe:2.3:a:nedi:nedi:1.9c:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
RHSA-2024:0142 | Red Hat Security Advisory: ipa security update | ipa: Invalid CSRF protection | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 6.5 | null | null |
CVE-2010-0408 | The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code. | [
"cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-j7g5-v8cf-3phm | iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface. | [] | null | null | null | null |
|
GHSA-c3fq-5967-8fmf | Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | [] | null | null | null | null |
|
GHSA-j9fv-vvq8-cm36 | Cross-site scripting (XSS) vulnerability in the Temporary Uploads editing functionality (wp-admin/includes/upload.php) in WordPress 2.2.1, allows remote attackers to inject arbitrary web script or HTML via the style parameter to wp-admin/upload.php. | [] | null | null | null | null |
|
RHSA-2021:3454 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.2 security and bug fix update | nodejs-kind-of: ctorName in index.js allows external user input to overwrite certain internal attributes | [
"cpe:/a:redhat:acm:2.3::el7",
"cpe:/a:redhat:acm:2.3::el8"
] | null | 5.9 | null | null |
RHSA-2021:2185 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: DoS by corrupting mountpoint reference counter kernel: Integer overflow in Intel(R) Graphics Drivers kernel: SCSI target (LIO) write to any block on ILO backstore | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.1 | null | null |
GHSA-3p9x-xxx6-2w4p | Broken Access Control in 3rd party TYPO3 extension "femanager" | A missing access check in the `InvitationController` allows an unauthenticated user to delete all frontend users. | [] | null | 8.6 | null | null |
CVE-2022-47933 | Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc. | [
"cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2005-1848 | The dhcpcd DHCP client before 1.3.22 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors that cause an out-of-bounds memory read. | [
"cpe:2.3:a:phystech:dhcpcd:1.3.17_pl2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-wh25-5c83-qcx8 | The KN Fix Your Title WordPress plugin through 1.0.1 was vulnerable to Authenticated Stored XSS in the separator field. | [] | null | null | null | null |
|
CVE-2024-30120 | HCL DRYiCE Optibot Reset Station is impacted by an Unused Parameter in the web application | HCL DRYiCE Optibot Reset Station is impacted by an Unused Parameter in the web application. | [
"cpe:2.3:a:hcl_software:dryice_optibot_reset_station:*:*:*:*:*:*:*:*"
] | null | 2.9 | null | null |
GHSA-r73v-h6f2-chp7 | Cross-site scripting (XSS) vulnerability in index.php in Kayako eSupport 2.3 allows remote attackers to inject arbitrary web script or HTML via the (1) _i or (2) _c parameter. | [] | null | null | null | null |
|
CVE-2024-41438 | A heap buffer overflow in the function cp_stored() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. | [
"cpe:2.3:a:dbohdan:hicolor:0.5.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
GHSA-w3rg-mp26-54rp | Cross-site request forgery (CSRF) vulnerability in SKYARC MTCMS before 5.252, and the MultiFileUploader 0.44 and earlier, DuplicateEntry 1.2 and earlier, MailPack 1.741 and earlier, and AutoTagging 0.08 and earlier plugins for Movable Type, allows remote attackers to hijack the authentication of arbitrary users for requests that modify data. | [] | null | null | null | null |
|
GHSA-g8jm-82h5-p38h | A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Site title field of the Configuration Panel. | [] | null | 6.1 | null | null |
|
GHSA-rqr4-mc25-2cvq | An attacker may be able to cause a denial-of-service condition by sending many packets repeatedly. | [] | null | 7.5 | null | null |
|
CVE-2021-44534 | Insufficient user input filtering leads to arbitrary file read by non-authenticated attacker, which results in sensitive information disclosure.
| [
"cpe:2.3:a:expressionengine:expressionengine:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:expressionengine:expressionengine:6.0.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2017-5884 | gtk-vnc before 0.7.0 does not properly check boundaries of subrectangle-containing tiles, which allows remote servers to execute arbitrary code via the src x, y coordinates in a crafted (1) rre, (2) hextile, or (3) copyrect tile. | [
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gtk-vnc:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2024-38259 | Microsoft Management Console Remote Code Execution Vulnerability | Microsoft Management Console Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2700:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.3197:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.3197:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.4169:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.4169:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:10.0.22631.4169:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:10.0.22631.4169:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1128:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.1742:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.1742:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2017-1301 | IBM Spectrum Protect 7.1 and 8.1 could allow a local attacker to launch a symlink attack. IBM Spectrum Protect Backup-archive Client creates temporary files insecurely. A local attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges. IBM X-Force ID: 125163. | [
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.500:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.600:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1..5.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.300:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.000:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:8.1.0.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 3.6 |
|
CVE-2023-1045 | MuYuCMS filesdel.html path traversal | A vulnerability was found in MuYuCMS 2.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin.php/accessory/filesdel.html. The manipulation of the argument filedelur leads to relative path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221804. | [
"cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*"
] | null | 3.8 | 3.8 | 4.7 |
CVE-2021-4015 | Cross-Site Request Forgery (CSRF) in firefly-iii/firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | [
"cpe:2.3:a:firefly-iii:firefly_iii:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
GHSA-qq75-75c9-p3pm | Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1 allow remote attackers to execute arbitrary code via (1) a link with a long HREF attribute, and (2) a DIV tag with a long id attribute. | [] | null | null | null | null |
|
CVE-2018-20875 | cPanel before 74.0.8 allows self XSS in the WHM Security Questions interface (SEC-433). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-c968-pq7h-7fxv | Division by 0 in `Conv3DBackprop*` | ImpactThe `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0:This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/conv_grad_ops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero:Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error.PatchesWe have patched the issue in GitHub commit [311403edbc9816df80274bd1ea8b3c0c0f22c3fa](https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | [] | 2 | 2.5 | null | null |
GHSA-37w5-p3r5-mfjp | Mambo Site Server 4.0.11 installs with a default username and password of admin, which allows remote attackers to gain privileges. | [] | null | null | null | null |
|
CVE-2023-37911 | org.xwiki.platform:xwiki-platform-oldcore may leak data through deleted and re-created documents | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 9.4-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, when a document has been deleted and re-created, it is possible for users with view right on the re-created document but not on the deleted document to view the contents of the deleted document. Such a situation might arise when rights were added to the deleted document. This can be exploited through the diff feature and, partially, through the REST API by using versions such as `deleted:1` (where the number counts the deletions in the wiki and is thus guessable). Given sufficient rights, the attacker can also re-create the deleted document, thus extending the scope to any deleted document as long as the attacker has edit right in the location of the deleted document. This vulnerability has been patched in XWiki 14.10.8 and 15.3 RC1 by properly checking rights when deleted revisions of a document are accessed. The only workaround is to regularly clean deleted documents to minimize the potential exposure. Extra care should be taken when deleting sensitive documents that are protected individually (and not, e.g., by being placed in a protected space) or deleting a protected space as a whole. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:9.4:rc1:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2022-24370 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader Foxit reader 11.0.1.0719 macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14819. | [
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
|
GHSA-74rv-gmrj-c9j4 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
CVE-2015-5086 | Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-4435, CVE-2015-4438, CVE-2015-4441, CVE-2015-4445, CVE-2015-4447, CVE-2015-4451, CVE-2015-4452, and CVE-2015-5085. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2017-1000149 | Mahara 1.10 before 1.10.9 and 15.04 before 15.04.6 and 15.10 before 15.10.2 are vulnerable to XSS due to window.opener (target="_blank" and window.open()) | [
"cpe:2.3:a:mahara:mahara:15.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.5:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-mjfr-374m-86mh | A heap-use-after-free in the av_freep function in libavutil/mem.c of FFmpeg 4.2 allows attackers to execute arbitrary code. | [] | null | null | null | null |
|
CVE-2021-22875 | Revive Adserver before 5.1.1 is vulnerable to a reflected XSS vulnerability in stats.php via the `setPerPage` parameter. | [
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2010-3752 | programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302. | [
"cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2022-41993 | Cross-site scripting vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R4 and earlier allows a remote unauthenticated attacker to inject an arbitrary script. | [
"cpe:2.3:a:jacic:electronic_bidding_core_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jacic:electronic_bidding_core_system:6:-:*:*:*:*:*:*",
"cpe:2.3:a:jacic:electronic_bidding_core_system:6:r4:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2020-23257 | Buffer Overflow vulnerability found in Espruino 2v05.41 allows an attacker to cause a denial of service via the function jsvGarbageCollectMarkUsed in file src/jsvar.c. | [
"cpe:2.3:o:espruino:espruino:2.05.41:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-rcgc-xmgh-f32h | Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to execute arbitrary code via a crafted command, a different vulnerability than CVE-2015-8519, CVE-2015-8520, and CVE-2015-8522. | [] | null | null | 9.8 | null |
|
PYSEC-2022-43059 | null | AIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application | [] | null | 5.5 | null | null |
CVE-2000-0681 | Buffer overflow in BEA WebLogic server proxy plugin allows remote attackers to execute arbitrary commands via a long URL with a .JSP extension. | [
"cpe:2.3:a:bea:weblogic_server:*:sp2:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-48xx-8rq2-ffh3 | Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device. | [] | null | 5.5 | null | null |
|
CVE-2008-1607 | SQL injection vulnerability in haberoku.php in Serbay Arslanhan Bomba Haber 2.0 allows remote attackers to execute arbitrary SQL commands via the haber parameter. | [
"cpe:2.3:a:serby_arslanhan:bomba_haber:2.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-43530 | A Universal XSS vulnerability was present in Firefox for Android resulting from improper sanitization when processing a URL scanned from a QR code. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-938h-r443-c3jh | The OS deployment feature in Baramundi Management Suite 7.5 through 8.9 stores credentials in cleartext on deployed machines, which allows remote attackers to obtain sensitive information by reading a file. NOTE: this ID was also incorrectly mapped to a separate issue in Oracle Outside In, but the correct ID for that issue is CVE-2013-5763. | [] | null | null | null | null |
|
RHSA-2017:3018 | Red Hat Security Advisory: httpd24 security, bug fix, and enhancement update | httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.9 | null |
CVE-2021-4357 | The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability checks, and a missing security nonce, on the UlistingUserRole::save_role_api function in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to arbitrarily delete site posts and pages. | [
"cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*"
] | null | 9.1 | null | null |
|
CVE-2024-24245 | An issue in Canimaan Software LTD ClamXAV v3.1.2 through v3.6.1 and fixed in v.3.6.2 allows a local attacker to escalate privileges via the ClamXAV helper tool component. | [
"cpe:2.3:a:canimaan:clamxav:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2012-0999 | SQL injection vulnerability in modules/news/rss.php in LEPTON before 1.1.4 allows remote attackers to execute arbitrary SQL commands via the group_id parameter. | [
"cpe:2.3:a:lepton-cms:lepton:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lepton-cms:lepton:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lepton-cms:lepton:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lepton-cms:lepton:1.1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-2401 | Qubotchat < 1.1.6 – Admin+ Stored XSS | The QuBot WordPress plugin before 1.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [
"cpe:2.3:a:qudata:qubot:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2020-21844 | GNU LibreDWG 0.10 is affected by: memcpy-param-overlap. The impact is: execute arbitrary code (remote). The component is: read_2004_section_header ../../src/decode.c:2580. | [
"cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2022-23301 | HEVC Video Extensions Remote Code Execution Vulnerability | HEVC Video Extensions Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-52v9-p5f4-vfvm | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. | [] | null | null | null | null |
|
GHSA-q6fr-vjrc-hw6v | The Maintenance Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the subscribe_download function hooked via AJAX action in all versions up to, and including, 1.0.8. This makes it possible for authenticated attackers, with subscriber access or higher, to download a csv containing subscriber emails. | [] | null | 5.3 | null | null |
|
GHSA-8449-7gc2-pwrp | HashiCorp Consul Template could reveal Vault secret contents in error messages | In HashiCorp Consul Template through version 0.29.1, invalid templates could inadvertently reveal the contents of Vault secret in errors returned by the `*template.Template.Execute 5` method, when given a template using Vault secret contents incorrectly. This method has been updated to redact Vault secrets when creating an error string, making it safe to log the error.. This issue was fixed in version 0.29.2. | [] | null | 7.5 | null | null |
GHSA-9xvf-cjvf-ff5q | WP Crontrol vulnerable to possible RCE when combined with a pre-condition | ImpactWP Crontrol includes a feature that allows administrative users to create events in the WP-Cron system that store and execute PHP code [subject to the restrictive security permissions documented here](https://wp-crontrol.com/docs/php-cron-events/). While there is _no known vulnerability in this feature on its own_, there exists potential for this feature to be vulnerable to RCE if it were specifically targeted via vulnerability chaining that exploited a separate SQLi (or similar) vulnerability.This is exploitable on a site if one of the below preconditions are met:The site is vulnerable to a writeable SQLi vulnerability in any plugin, theme, or WordPress coreThe site's database is compromised at the hosting levelThe site is vulnerable to a method of updating arbitrary options in the `wp_options` tableThe site is vulnerable to a method of triggering an arbitrary action, filter, or function with control of the parametersPatchesAs a hardening measure, WP Crontrol version 1.16.2 ships with a new feature that prevents tampering of the code stored in a PHP cron event.All PHP cron events are now secured via an integrity check that makes use of an HMAC to store a hash of the code alongside it when the event is saved. When the event runs, the hash is verified to ensure the code has not been tampered with. WP Crontrol will not execute the PHP code if the hash cannot be verified or if a stored hash is not present. If an attacker with database-level access were to modify the code in an event in an attempt to execute arbitrary code, the code would no longer execute.Any PHP cron events that exist in the database prior to updating to version 1.16.2 will cease to execute until an administrative user re-saves them from the Cron Events screen in the admin area. A notice will be shown in the admin area informing administrative users if this is the case.WorkaroundsGiven that one or more of the preconditions listed above are met, there are no known workarounds for this issue other than to update WP Crontrol to version 1.16.2 or later.Note that neither the `DISALLOW_FILE_MODS` constant nor the `DISALLOW_FILE_EDIT` constant prevent this from being exploitable because these constants do not prevent PHP cron events from being _executed_. It's an intended feature of WP Crontrol that PHP cron events in the database will continue to run according to their schedule even if editing PHP cron events is disabled due to one of these constants being defined.FAQIs my site at risk?Your site is only at risk if at least one of the preconditions listed above are met and an attacker is actively attacking your site in order to exploit this. There is no known vulnerability in this feature on its own.Why is this classified as high severity?The CVSS score is used to classify the severity of a vulnerability in isolation, which in this case is high due to the possibility of RCE. The actual risk is likely to be low and is dependent entirely on one of the preconditions being met.How is this any different to an SQLi vulnerability that would allow an attacker to create an Administrator user and then access the theme or plugin editor?The difference is in the handling of the `DISALLOW_FILE_MODS` and `DISALLOW_FILE_EDIT` constants. With either one of these constants defined in your wp-config.php file then the plugin and theme editors are disabled. In WP Crontrol the ability to _edit_ PHP cron events in WP Crontrol is also disabled in this case, however PHP cron events in the database will continue to run according to their schedule.ThanksThis issue was identified by John Blackbourn, the author of the WP Crontrol plugin.Thanks go to:Calvin Alkan for researching and reporting many vulnerabilities in WordPress plugins and for [publishing the details on the snicco blog](https://snicco.io/vulnerability-disclosure). Calvin's work prompted me to investigate whether the PHP cron event functionality in WP Crontrol could be exploited when attacked via with vulnerability chaining, and he collaborated on this security advisory.Joe Hoyle for collaborating on this advisory. | [] | null | 8.1 | null | null |
ICSA-22-151-01 | Fuji Electric Alpha7 PC Loader | The affected product is vulnerable to a stack-based buffer overflow while processing a specifically crafted project file, which may allow an attacker to execute arbitrary code.CVE-2022-1888 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
CVE-2019-10065 | An issue was discovered in Open Ticket Request System (OTRS) 7.0 through 7.0.6. An attacker who is logged into OTRS as a customer user can use the search result screens to disclose information from internal FAQ articles, a different vulnerability than CVE-2019-9753. | [
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
RHSA-2022:0870 | Red Hat Security Advisory: OpenShift Container Platform 4.7.45 packages and security update | cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.8 | null | null |
GHSA-3q2j-hfh6-wm75 | Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1. | [] | null | 7.2 | null | null |
|
CVE-2024-49068 | Microsoft SharePoint Elevation of Privilege Vulnerability | Microsoft SharePoint Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
CVE-2018-9185 | An information disclosure vulnerability in Fortinet FortiOS 6.0.0 and below versions reveals user's web portal login credentials in a Javascript file sent to client-side when pages bookmarked in web portal use the Single Sign-On feature. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | 4.3 |
|
GHSA-28c5-j9q4-w877 | Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line. | [] | null | 6.1 | null | null |
|
CVE-2023-38676 | Segfault in paddle.dot | Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
"cpe:2.3:a:paddlepaddle:paddlepaddle:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
GHSA-mw86-9j6v-q4x7 | An issue was discovered in Webmin 2.021. A Cross-Site Scripting (XSS) vulnerability was discovered in the HTTP Tunnel functionality when handling third-party domain URLs. By providing a crafted URL from a third-party domain, an attacker can inject malicious code. leading to the execution of arbitrary JavaScript code within the context of the victim's browser. | [] | null | 6.1 | null | null |
|
CVE-2021-47508 | btrfs: free exchange changeset on failures | In the Linux kernel, the following vulnerability has been resolved:
btrfs: free exchange changeset on failures
Fstests runs on my VMs have show several kmemleak reports like the following.
unreferenced object 0xffff88811ae59080 (size 64):
comm "xfs_io", pid 12124, jiffies 4294987392 (age 6.368s)
hex dump (first 32 bytes):
00 c0 1c 00 00 00 00 00 ff cf 1c 00 00 00 00 00 ................
90 97 e5 1a 81 88 ff ff 90 97 e5 1a 81 88 ff ff ................
backtrace:
[<00000000ac0176d2>] ulist_add_merge+0x60/0x150 [btrfs]
[<0000000076e9f312>] set_state_bits+0x86/0xc0 [btrfs]
[<0000000014fe73d6>] set_extent_bit+0x270/0x690 [btrfs]
[<000000004f675208>] set_record_extent_bits+0x19/0x20 [btrfs]
[<00000000b96137b1>] qgroup_reserve_data+0x274/0x310 [btrfs]
[<0000000057e9dcbb>] btrfs_check_data_free_space+0x5c/0xa0 [btrfs]
[<0000000019c4511d>] btrfs_delalloc_reserve_space+0x1b/0xa0 [btrfs]
[<000000006d37e007>] btrfs_dio_iomap_begin+0x415/0x970 [btrfs]
[<00000000fb8a74b8>] iomap_iter+0x161/0x1e0
[<0000000071dff6ff>] __iomap_dio_rw+0x1df/0x700
[<000000002567ba53>] iomap_dio_rw+0x5/0x20
[<0000000072e555f8>] btrfs_file_write_iter+0x290/0x530 [btrfs]
[<000000005eb3d845>] new_sync_write+0x106/0x180
[<000000003fb505bf>] vfs_write+0x24d/0x2f0
[<000000009bb57d37>] __x64_sys_pwrite64+0x69/0xa0
[<000000003eba3fdf>] do_syscall_64+0x43/0x90
In case brtfs_qgroup_reserve_data() or btrfs_delalloc_reserve_metadata()
fail the allocated extent_changeset will not be freed.
So in btrfs_check_data_free_space() and btrfs_delalloc_reserve_space()
free the allocated extent_changeset to get rid of the allocated memory.
The issue currently only happens in the direct IO write path, but only
after 65b3c08606e5 ("btrfs: fix ENOSPC failure when attempting direct IO
write into NOCOW range"), and also at defrag_one_locked_target(). Every
other place is always calling extent_changeset_free() even if its call
to btrfs_delalloc_reserve_space() or btrfs_check_data_free_space() has
failed. | [] | null | null | null | null |
CVE-2007-5890 | Directory traversal vulnerability in index.php in easyGB 2.1.1 allows remote attackers to include arbitrary files via the DatabaseType parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:easygb:easygb:2.1.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-6vqj-7ffg-x4hr | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to delete files for which it does not have permission. | [] | null | 7.1 | null | null |
|
CVE-2016-1748 | IOHIDFamily in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows attackers to obtain sensitive kernel memory-layout information via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 4.3 |
|
CVE-2023-34977 | Video Station | A cross-site scripting (XSS) vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.
We have already fixed the vulnerability in the following version:
Video Station 5.7.0 ( 2023/07/27 ) and later
| [
"cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
GHSA-pxq6-w56g-vh78 | The Christmas Greetings plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the code parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
GHSA-24hh-hrh3-7p5w | The Internet Authentication Service (IAS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly verify the credentials in an MS-CHAP v2 Protected Extensible Authentication Protocol (PEAP) authentication request, which allows remote attackers to access network resources via a malformed request, aka "MS-CHAP Authentication Bypass Vulnerability." | [] | null | null | null | null |
|
RHSA-2022:5818 | Red Hat Security Advisory: openssl security update | openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection openssl: AES OCB fails to encrypt some bytes | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
GHSA-95hr-886r-52mf | Elsight – Elsight Halo Remote Code Execution (RCE) Elsight Halo web panel allows us to perform connection validation. through the POST request : /api/v1/nics/wifi/wlan0/ping we can abuse DESTINATION parameter and leverage it to remote code execution. | [] | null | 9.8 | null | null |
|
CVE-2012-0023 | Double free vulnerability in the get_chunk_header function in modules/demux/ty.c in VideoLAN VLC media player 0.9.0 through 1.1.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TiVo (TY) file. | [
"cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.12:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-r3hv-544j-x7f9 | cPanel before 71.9980.37 allows Remote-Stored XSS in WHM Save Theme Interface (SEC-400). | [] | null | null | 6.1 | null |
|
CVE-2017-0716 | A remote code execution vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37203196. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-jhhf-m7pj-wvv6 | The Client/Server Runtime Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2, when a Chinese, Japanese, or Korean locale is enabled, does not properly allocate memory for transactions, which allows local users to gain privileges via a crafted application, aka "CSRSS Local Elevation of Privilege Vulnerability." | [] | null | null | null | null |
|
CVE-2023-24488 | Cross site scripting | Cross site scripting vulnerability in Citrix ADC and Citrix Gateway in allows and attacker to perform cross site scripting | [
"cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:fips:*:*:*",
"cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:ndcpp:*:*:*",
"cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:-:*:*:*",
"cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-qw42-c99x-mhgj | Splashtop Streamer through 3.4.8.3 creates a Temporary File in a Directory with Insecure Permissions. | [] | null | null | null | null |
|
GHSA-rrcm-jcf5-7g58 | A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null |
|
CVE-2022-45543 | Cross site scripting (XSS) vulnerability in DiscuzX 3.4 allows attackers to execute arbitrary code via the datetline, title, tpp, or username parameters via the audit search. | [
"cpe:2.3:a:discuz:discuzx:3.4:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-v3gf-q256-843h | An elevation of privilege vulnerability exists in the way Azure Functions validate access keys.An unauthenticated attacker who successfully exploited this vulnerability could invoke an HTTP Function without proper authorization.This security update addresses the vulnerability by correctly validating access keys used to access HTTP Functions., aka 'Azure Functions Elevation of Privilege Vulnerability'. | [] | null | 5.3 | null | null |
Subsets and Splits