id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-15845 | Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions. | [
"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 |
|
GHSA-92qm-mq2f-95w2 | The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.6.3 via folder deletion due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author access or higher, to delete folders created by other users and make their file uploads visible. | [] | null | 5.4 | null | null |
|
GHSA-wrx6-h6h4-wrrj | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xenioushk BWL Advanced FAQ Manager.This issue affects BWL Advanced FAQ Manager: from n/a through 2.0.3. | [] | null | 7.6 | null | null |
|
CVE-2020-29075 | PDF Injection BlackHat Talk | Acrobat Reader DC versions 2020.013.20066 (and earlier), 2020.001.30010 (and earlier) and 2017.011.30180 (and earlier) are affected by an information exposure vulnerability, that could enable an attacker to get a DNS interaction and track if the user has opened or closed a PDF file when loaded from the filesystem without a prompt. User interaction is required to exploit this vulnerability. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
GHSA-fh6w-cgmm-fxrj | An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. Remote code execution can occur through ClientUploader by an authenticated admin user. An authenticated admin user can upload files through the ClientUploader utility, and traverse to any other directory for remote code execution. | [] | null | 7.2 | null | null |
|
CVE-2022-44566 | A denial of service vulnerability present in ActiveRecord's PostgreSQL adapter <7.0.4.1 and <6.1.7.1. When a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it will treat the target column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan resulting in potential Denial of Service. | [
"cpe:2.3:a:activerecord_project:activerecord:*:*:*:*:*:ruby:*:*"
] | null | 7.5 | null | null |
|
CVE-2024-36122 | Discourse doesn't limit reviewable user serializer payload | Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches, moderators using the review queue to review users may see a users email address even when the Allow moderators to view email addresses setting is disabled. This issue is patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta4 on the `beta` and `tests-passed` branches. As possible workarounds, either prevent moderators from accessing the review queue or disable the approve suspect users site setting and the must approve users site setting to prevent users from being added to the review queue. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.3.0:beta3:*:*:beta:*:*:*"
] | null | 2.4 | null | null |
GHSA-m7ww-5j34-3p74 | NetApp Data ONTAP 8.1 and 8.2, when operating in 7-Mode, allows man-in-the-middle attackers to obtain sensitive information, gain privileges, or cause a denial of service via vectors related to the SMB protocol. | [] | null | null | 7.5 | null |
|
GHSA-vg85-f4q8-835g | A Remote Code Execution (RCE) vulnerability exists in Pixelimity 1.0 via admin/admin-ajax.php?action=install_theme. | [] | null | 7.2 | null | null |
|
RHSA-2019:1852 | Red Hat Security Advisory: OpenShift Container Platform 3.9 atomic-openshift security update | kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp` | [
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5.3 | null |
CVE-2020-4324 | IBM Security Secret Server proir to 10.9 could allow a remote attacker to bypass security restrictions, caused by improper input validation. IBM X-Force ID: 177515. | [
"cpe:2.3:a:ibm:security_secret_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 3.5 | null |
|
CVE-2018-2844 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.36 and Prior to 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4.6 |
|
GHSA-865w-mq7p-j8f4 | ** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Sphere all firmware versions allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue. | [] | null | 5.4 | null | null |
|
CVE-2016-1819 | Use-after-free vulnerability in the IOAccelContext2::clientMemoryForType method in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1817 and CVE-2016-1818. | [
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-m244-vv23-hg2f | Multiple unspecified vulnerabilities in the PDF distiller in the Attachment Service component in Research In Motion (RIM) BlackBerry Enterprise Server (BES) software 4.1.3 through 4.1.7 and 5.0.0, and BlackBerry Professional Software 4.1.4, allow user-assisted remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .pdf file attachment, a different vulnerability than CVE-2008-3246, CVE-2009-0176, CVE-2009-0219, CVE-2009-2643, and CVE-2009-2646. | [] | null | null | null | null |
|
CVE-2022-36977 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Certificate Management Server service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15449. | [
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
|
GHSA-95c2-w7x8-c93w | In the Linux kernel, the following vulnerability has been resolved:dmaengine: idxd: Fix oops during rmmod on single-CPU platformsDuring the removal of the idxd driver, registered offline callback is
invoked as part of the clean up process. However, on systems with only
one CPU online, no valid target is available to migrate the
perf context, resulting in a kernel oops:Fix the issue by preventing the migration of the perf context to an
invalid target. | [] | null | 5.5 | null | null |
|
CVE-2025-32695 | WordPress Checkout Mestres WP <= 8.7.5 - Privilege Escalation Vulnerability | Incorrect Privilege Assignment vulnerability in Mestres do WP Checkout Mestres WP allows Privilege Escalation. This issue affects Checkout Mestres WP: from n/a through 8.7.5. | [] | null | 9.8 | null | null |
CVE-2015-6480 | The MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2 does not require authentication, which allows remote attackers to obtain administrative access via a command, as demonstrated by the addUserAndGroup action. | [
"cpe:2.3:a:moxa:oncell_central_manager:*:*:*:*:*:*:*:*"
] | null | null | 8.3 | 7.5 |
|
GHSA-2crv-pj7h-4r9x | In FreeBSD 12.1-STABLE before r357213, 12.1-RELEASE before 12.1-RELEASE-p2, 12.0-RELEASE before 12.0-RELEASE-p13, 11.3-STABLE before r357214, and 11.3-RELEASE before 11.3-RELEASE-p6, URL handling in libfetch with URLs containing username and/or password components is vulnerable to a heap buffer overflow allowing program misbehavior or malicious code execution. | [] | null | null | null | null |
|
CVE-2024-41825 | In JetBrains TeamCity before 2024.07 stored XSS was possible on the Code Inspection tab | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
CVE-2018-2393 | Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable. | [
"cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.20ext:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.45:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.49:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:internet_graphics_server:7.53:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2016-4446 | The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by triggering an execstack SELinux denial with a crafted filename, related to the commands.getoutput function. | [
"cpe:2.3:a:setroubleshoot_project:setroubleshoot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
GHSA-v67r-p67m-4f23 | SQL injection vulnerability in board.php for WoltLab Burning Board (wBB) 2.0 RC 1 and earlier allows remote attackers to modify the database and possibly gain privileges via the boardid parameter. | [] | null | null | null | null |
|
GHSA-3jm3-4g5c-j2w3 | All versions of NVIDIA Linux GPU Display Driver contain a vulnerability in the kernel mode layer handler where improper validation of an input parameter may cause a denial of service on the system. | [] | null | null | 5.5 | null |
|
GHSA-gq84-cpqh-7vmv | Unrestricted Upload of File with Dangerous Type vulnerability in Bit Apps Bit Form – Contact Form Plugin allows Code Injection.This issue affects Bit Form – Contact Form Plugin: from n/a through 2.13.10. | [] | null | 8 | null | null |
|
GHSA-gm34-2m74-w3v9 | Cross-Site Request Forgery (CSRF) vulnerability in victoracano Cazamba allows Reflected XSS.This issue affects Cazamba: from n/a through 1.2. | [] | null | 7.1 | null | null |
|
CVE-2010-0051 | WebKit in Apple Safari before 4.0.5 does not properly validate the cross-origin loading of stylesheets, which allows remote attackers to obtain sensitive information via a crafted HTML document. NOTE: this might overlap CVE-2010-0651. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-h8hf-x3f4-xwgp | Mongoose Vulnerable to Prototype Pollution in Schema Object | DescriptionMongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.Affected versions of this package are vulnerable to Prototype Pollution. The `Schema.path()` function is vulnerable to prototype pollution when setting the `schema` object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.Proof of ConceptImpactThis vulnerability can be manipulated to exploit other types of attacks, such as Denial of service (DoS), Remote Code Execution, or Property Injection. | [] | null | 9.8 | null | null |
CVE-2018-8919 | Information exposure vulnerability in SYNO.Core.Desktop.SessionData in Synology DiskStation Manager (DSM) before 6.1.6-15266 allows remote attackers to steal credentials via unspecified vectors. | [
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*"
] | null | null | 8.3 | null |
|
GHSA-m2gv-rr38-g5r4 | In the Linux kernel, the following vulnerability has been resolved:tipc: re-fetch skb cb after tipc_msg_validateAs the call trace shows, the original skb was freed in tipc_msg_validate(),
and dereferencing the old skb cb would cause an use-after-free crash.BUG: KASAN: use-after-free in tipc_crypto_rcv_complete+0x1835/0x2240 [tipc]
Call Trace:
<IRQ>
tipc_crypto_rcv_complete+0x1835/0x2240 [tipc]
tipc_crypto_rcv+0xd32/0x1ec0 [tipc]
tipc_rcv+0x744/0x1150 [tipc]
...
Allocated by task 47078:
kmem_cache_alloc_node+0x158/0x4d0
__alloc_skb+0x1c1/0x270
tipc_buf_acquire+0x1e/0xe0 [tipc]
tipc_msg_create+0x33/0x1c0 [tipc]
tipc_link_build_proto_msg+0x38a/0x2100 [tipc]
tipc_link_timeout+0x8b8/0xef0 [tipc]
tipc_node_timeout+0x2a1/0x960 [tipc]
call_timer_fn+0x2d/0x1c0
...
Freed by task 47078:
tipc_msg_validate+0x7b/0x440 [tipc]
tipc_crypto_rcv_complete+0x4b5/0x2240 [tipc]
tipc_crypto_rcv+0xd32/0x1ec0 [tipc]
tipc_rcv+0x744/0x1150 [tipc]This patch fixes it by re-fetching the skb cb from the new allocated skb
after calling tipc_msg_validate(). | [] | null | 7.8 | null | null |
|
GHSA-v99j-m2v5-3c7x | A SQL injection vulnerability in zzzphp v1.8.0 through /form/index.php?module=getjson may lead to a possible access restriction bypass. | [] | null | null | null | null |
|
CVE-2018-11583 | SeaCMS 6.61 has stored XSS in admin_collect.php via the siteurl parameter. | [
"cpe:2.3:a:seacms:seacms:6.61:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-f5ww-x9w7-q9v2 | The CM Tooltip Glossary WordPress plugin before 4.3.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
GHSA-6358-4v63-4jh4 | The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 through 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available. | [] | null | null | 7.8 | null |
|
GHSA-frxj-xq8w-jxfm | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L). | [] | null | null | 6.5 | null |
|
CVE-2002-0799 | Buffer overflow in YoungZSoft CMailServer 3.30 allows remote attackers to execute arbitrary code via a long USER argument. | [
"cpe:2.3:a:youngzsoft:cmailserver:3.30:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-32cw-wqcr-7m6r | The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.6.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
CVE-2007-2619 | Symantec pcAnywhere 11.5.x and 12.0.x retains unencrypted login credentials for the most recent login within process memory, which allows local administrators to obtain the credentials by reading process memory, a different vulnerability than CVE-2006-3785. | [
"cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pcanywhere:12.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2024-1426 | The Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ attribute of the Price List widget in all versions up to, and including, 5.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2023-6731 | The WP Show Posts plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 1.1.5. This makes it possible for authenticated attackers, with subscriber access and above, to view arbitrary post metadata, list posts, and view terms and taxonomies. | [] | null | 4.3 | null | null |
|
CVE-2021-24516 | PlanSo Forms <= 2.6.3 - Authenticated Stored Cross-Site Scripting | The PlanSo Forms WordPress plugin through 2.6.3 does not escape the title of its Form before outputting it in attributes, allowing high privilege users such as admin to set XSS payload in it, even when the unfiltered_html is disallowed, leading to an Authenticated Stored Cross-Site Scripting issue. | [
"cpe:2.3:a:planso:planso_forms:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2009-1053 | chaozzDB 1.2 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing user credentials via a direct request for user.tsv. | [
"cpe:2.3:a:chaozz:chaozzdb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:chaozz:chaozzdb:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:chaozz:chaozzdb:1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vjgm-xxw7-95f8 | The Mobile and Remote Access (MRA) services implementation in Cisco Unified Communications Manager mishandles edge-device identity validation, which allows remote attackers to bypass intended call-reception and call-setup restrictions by spoofing a user, aka Bug ID CSCuu97283. | [] | null | null | null | null |
|
CVE-2014-1765 | Multiple use-after-free vulnerabilities in Microsoft Internet Explorer 6 through 11 allow remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by Sebastian Apelt and Andreas Schmidt during a Pwn2Own competition at CanSecWest 2014. | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
GHSA-c9p4-xwr9-rfhx | Zot IdP group membership revocation ignored | SummaryThe group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API.Details[SetUserGroups](https://github.com/project-zot/zot/blob/5e30fec65c49e3139907e2819ccb39b2e3bd784e/pkg/meta/boltdb/boltdb.go#L1665) is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn't obvious to me if it were the case.PoCLogin with group claims, logout, remove the user from a group from at IdP and log in again, the API still grants access and the new list of groups is appended creating meaningless duplicate entries and no longer mathing the expected groups from the IdP. The behavior can be verified by seeing the API or UI still presenting images it should not or by viewing the data directly: `bbolt get meta.db UserData <user>`, eg:Note this example also has duplicates due to group hierarchy changes that were left in the database.ImpactAny Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP. | [] | null | 7.3 | null | null |
CVE-2010-0550 | admin.htm in Geo++ GNCASTER 1.4.0.7 and earlier does not properly enforce HTTP Digest Authentication, which allows remote authenticated users to use HTTP Basic Authentication, bypassing intended server policy. | [
"cpe:2.3:a:geopp:geo\\+\\+_gncaster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:geopp:geo\\+\\+_gncaster:1.4.0.0:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-8vm9-65gg-h8qh | Directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. | [] | null | null | null | null |
|
GHSA-fx8g-cgwg-pm6c | In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact. | [] | null | null | null | null |
|
GHSA-qh92-424h-5c76 | Multiple interpretation error in unspecified versions of TheHacker allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. | [] | null | null | null | null |
|
GHSA-xqcw-gm88-2753 | Unrestricted file upload vulnerability in Micro Focus ArcSight Logger, version 6.7.0 and later. This vulnerability could allow Unrestricted Upload of File with Dangerous type. | [] | null | 8.8 | null | null |
|
ICSA-15-050-01A | Siemens SIMATIC STEP 7 TIA Portal Vulnerabilities (Update A) | Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 allows man-in-the-middle attackers to obtain sensitive information or modify transmitted data via unspecified vectors. Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 improperly stores password data within project files, which makes it easier for local users to determine cleartext (1) protection-level passwords or (2) web-server passwords by leveraging the ability to read these files. | [] | null | null | null | null |
GHSA-3p3h-j9q4-q239 | Incorrect access control in the firmware update and download processes of IVY Smart v4.5.0 allows attackers to access sensitive information by analyzing the code and data within the APK file. | [] | null | 8.4 | null | null |
|
CVE-2015-9392 | The users-ultra plugin before 1.5.63 for WordPress has XSS via the p_name parameter. | [
"cpe:2.3:a:usersultra:users_ultra_membership:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-6x5r-m43r-p8r3 | Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a command injection vulnerability that could allow an attacker to inject arbitrary commands, which could result in remote code execution. | [] | null | 8.8 | null | null |
|
CVE-2021-32090 | The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitrary shell commands via the functionName parameter. | [
"cpe:2.3:a:localstack:localstack:0.12.6:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2025-3975 | ScriptAndTools eCommerce-website-in-PHP subscriber-csv.php information disclosure | A vulnerability was found in ScriptAndTools eCommerce-website-in-PHP 3.0 and classified as problematic. This issue affects some unknown processing of the file /admin/subscriber-csv.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 5.3 | 5.3 | 5 |
CVE-2024-13786 | Education Center | LMS & Online Courses WordPress Theme <= 3.6.10 - PHP Object Injection | The education theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.6.10 via deserialization of untrusted input in the 'themerex_callback_view_more_posts' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. | [] | null | 9.8 | null | null |
CVE-2018-4387 | A lock screen issue allowed access to photos via Reply With Message on a locked device. This issue was addressed with improved state management. This issue affected versions prior to iOS 12.1. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | 2.4 | 2.1 |
|
GHSA-gcw3-8xrx-4mpm | A Cross-Site Request Forgery (CSRF) vulnerability exists in the management console of WSO2 Enterprise Integrator 6.6.0 due to the absence of CSRF token validation. This flaw allows attackers to craft malicious requests that can trigger state-changing operations on behalf of an authenticated user, potentially compromising account settings and data integrity. The vulnerability only affects a limited set of state-changing operations, and successful exploitation requires social engineering to trick a user with access to the management console into performing the malicious action. | [] | null | 5.4 | null | null |
|
cisco-sa-20190306-nxos-sig-verif | Cisco NX-OS Software Image Signature Verification Vulnerability | A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device.
The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vulnerability by loading an unsigned software image on an affected device. A successful exploit could allow the attacker to boot a malicious software image.
Note: The fix for this vulnerability requires a BIOS upgrade as part of the software upgrade. For additional information, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 26 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-70757"]. | [] | null | null | 6.7 | null |
GHSA-jq6w-jf5j-5585 | crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue. | [] | null | null | 7.5 | null |
|
RHSA-2024:7432 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1 and kpatch-patch-5_14_0-427_31_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
CVE-2010-1630 | Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a "forum id" in circumstances related to a "global announcement." | [
"cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb:phpbb:3.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-26277 | Arbitrary read/write in DBdeployer | DBdeployer is a tool that deploys MySQL database servers easily. In DBdeployer before version 1.58.2, users unpacking a tarball may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defenses. For the attack to succeed, the following factors need to contribute: 1) The user is logged in as root. While dbdeployer is usable as root, it was designed to run as unprivileged user. 2) The user has taken a tarball from a non secure source, without testing the checksum. When the tarball is retrieved through dbdeployer, the checksum is compared before attempting to unpack. This has been fixed in version 1.58.2. | [
"cpe:2.3:a:dbdeployer:dbdeployer:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-r23r-h529-fcxw | Cross-site Scripting (XSS) - DOM in GitHub repository pkp/pkp-lib prior to 3.3.0-16. | [] | null | null | 3.5 | null |
|
CVE-2020-19888 | DBHcms v1.2.0 has an unauthorized operation vulnerability because there's no access control at line 175 of dbhcms\page.php for empty cache operation. This vulnerability can be exploited to empty a table. | [
"cpe:2.3:a:dbhcms_project:dbhcms:1.2.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
GHSA-jmhj-vh4q-hhmq | tkvideo has a memory issue in playing videos | Huge memory consumption even when playing small files. This issue has been patched in 2.0.0. Please upgrade to version 2.0.0 or above. | [] | null | 4.3 | null | null |
GHSA-85fm-7wqr-x5m4 | In contacts service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed. | [] | null | 5.5 | null | null |
|
CVE-2021-45104 | An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data. | [
"cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | 5.8 |
|
CVE-2022-34220 | Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability | Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | null | 7.8 | null |
RHSA-2025:7901 | Red Hat Security Advisory: kernel security update | kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt kernel: vsock: Keep the binding until socket destruction | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.8 | null | null |
CVE-2019-14134 | Possible out of bound access in WLAN handler when the received value of length in rx path is shorter than the expected value of country IE in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ8074, QCA8081, QCS605, SDA845, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130 | [
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-m568-g4fp-65j5 | The Red Hat docker package before 1.5.0-28, when using the --add-registry option, falls back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. NOTE: this vulnerability exists because of a CVE-2014-5277 regression. | [] | null | null | null | null |
|
CVE-2020-2099 | Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | 8.6 | null | 7.5 |
|
CVE-2004-0530 | The PHP package in Slackware 8.1, 9.0, and 9.1, when linked against a static library, includes /tmp in the search path, which allows local users to execute arbitrary code as the PHP user by inserting shared libraries into the appropriate path. | [
"cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2018-14298 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Ink annotations. By manipulating a document's elements, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6214. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2007-0225 | Cross-site scripting (XSS) vulnerability in shopcustadmin.asp in VP-ASP Shopping Cart 6.09 and earlier allows remote attackers to inject arbitrary web script or HTML via the msg parameter. | [
"cpe:2.3:a:virtual_programming:vp-asp:6.09:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-px79-w28w-3h24 | The mstatus.sd field in CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a does not update when the mstatus.fs field is set to Dirty. | [] | null | 9.8 | null | null |
|
CVE-2021-43282 | An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key. | [
"cpe:2.3:o:govicture:wr1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:govicture:wr1200:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
GHSA-94rm-rq6h-h95x | Improper Privilege Management vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Privilege Escalation.This issue affects upKeeper Instant Privilege Access: before 1.2. | [] | 10 | null | null | null |
|
GHSA-wfr9-xqjv-8w45 | Multiple SQL injection vulnerabilities in the Kunena component before 3.0.6 for Joomla! allow remote authenticated users to execute arbitrary SQL commands via the index value in an array parameter, as demonstrated by the topics[] parameter in an unfavorite action to index.php. | [] | null | null | null | null |
|
ICSA-23-304-02 | INEA ME RTU | Versions of INEA ME RTU firmware 3.36b and prior are vulnerable to operating system (OS) command injection, which could allow remote code execution. Versions of INEA ME RTU firmware 3.36b and prior do not require authentication to the "root" account on the host system of the device. This could allow an attacker to obtain admin-level access to the host system. | [] | null | 9.8 | null | null |
RHSA-2004:638 | Red Hat Security Advisory: gd security update | gd: additional overflows security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
GHSA-9x4q-26cx-fr52 | login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1. | [] | null | 9.8 | null | null |
|
GHSA-6rrc-h5ph-44m6 | This High severity Injection vulnerability was introduced in Assets Discovery 1.0 - 6.2.0 (all versions).Assets Discovery, which can be downloaded via Atlassian Marketplace, is a network scanning tool that can be used with or without an agent with Jira Service Management Cloud, Data Center or Server. It detects hardware and software that is connected to your local network and extracts detailed information about each asset. This data can then be imported into Assets in Jira Service Management to help you manage all of the devices and configuration items within your local network.This Injection vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to modify the actions taken by a system call which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.Atlassian recommends that Assets Discovery customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versionsSee the release notes (https://confluence.atlassian.com/assetapps/assets-discovery-3-2-1-cloud-6-2-1-data_center-1333987182.html). You can download the latest version of Assets Discovery from the Atlassian Marketplace (https://marketplace.atlassian.com/apps/1214668/assets-discovery?hosting=datacenter&tab=installation).This vulnerability was reported via our Penetration Testing program. | [] | null | null | 7.2 | null |
|
CVE-2018-9488 | In the SELinux permissions of crash_dump.te, there is a permissions bypass due to a missing restriction. This could lead to a local escalation of privilege, with System privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Android-8.1 Android-9.0 Android ID: A-110107376. | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
RHSA-2021:3172 | Red Hat Security Advisory: edk2 security update | edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.1 | null | null |
CVE-2024-1032 | openBI Test Connection Databasesource.php testConnection deserialization | A vulnerability classified as critical was found in openBI up to 1.0.8. Affected by this vulnerability is the function testConnection of the file /application/index/controller/Databasesource.php of the component Test Connection Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252307. | [
"cpe:2.3:a:openbi_project:openbi:*:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 |
GHSA-7xwg-339m-2rw9 | camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly. | [] | null | null | 9.8 | null |
|
CVE-2024-3403 | Local File Inclusion in imartinez/privategpt | imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the 'Search in Docs' feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files. | [
"cpe:2.3:a:zylon-ai:private-gpt:0.2.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
GHSA-fh99-4pgr-8j99 | Insertion of Sensitive Information into Log File in typo3/cms-core | MetaCVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9)ProblemIt has been discovered that system internal credentials or keys (e.g. database credentials) have been logged as plaintext in exception handlers, when logging the complete exception stack trace.SolutionUpdate to TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.CreditsThanks to Marco Huber who reported this issue and to TYPO3 security member Torben Hansen who fixed the issue.References[TYPO3-CORE-SA-2022-002](https://typo3.org/security/advisory/typo3-core-sa-2022-002) | [] | null | 5.3 | null | null |
CVE-2025-47727 | Out-of-bounds Write in CNCSoft | Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process. | [] | 7.3 | null | null | null |
CVE-2025-49453 | WordPress BP Profile as Homepage plugin <= 1.1 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Jatinder Pal Singh BP Profile as Homepage allows Stored XSS. This issue affects BP Profile as Homepage: from n/a through 1.1. | [] | null | 7.1 | null | null |
CVE-1999-1451 | The Winmsdp.exe sample file in IIS 4.0 and Site Server 3.0 allows remote attackers to read arbitrary files. | [
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2007-5651 | Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet. | [
"cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catos:8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-qwh3-64hp-pv93 | Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | null | null |
|
GHSA-7xx4-x85v-pc9j | loaders/load_it.c in libmikmod, possibly 3.1.12, does not properly account for the larger size of name##env relative to name##tick and name##node, which allows remote attackers to trigger a buffer over-read and possibly have unspecified other impact via a crafted Impulse Tracker file, a related issue to CVE-2010-2546. NOTE: this issue exists because of an incomplete fix for CVE-2009-3995. | [] | null | null | null | null |
|
CVE-2014-0173 | The Jetpack plugin before 1.9 before 1.9.4, 2.0.x before 2.0.9, 2.1.x before 2.1.4, 2.2.x before 2.2.7, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.2, 2.6.x before 2.6.3, 2.7.x before 2.7.2, 2.8.x before 2.8.2, and 2.9.x before 2.9.3 for WordPress does not properly restrict access to the XML-RPC service, which allows remote attackers to bypass intended restrictions and publish posts via unspecified vectors. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:automattic:jetpack:1.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:1.9.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:1.9.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.0.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.0.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.0.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.0.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.1.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.1.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.2.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.2.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.2.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.2.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.2.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.3.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.3.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.3.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.3.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.3.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.4.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.4.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.6.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.9.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.9.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:automattic:jetpack:2.9.3:*:*:*:*:wordpress:*:*"
] | null | null | null | 5.8 |
|
GHSA-r22x-56pw-w758 | AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability. | [] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.