id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-fgmv-8487-84w4 | Blueboy 1.0.3 stores bb_news_config.inc under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information, including the database configuration. | [] | null | null | null | null |
|
GHSA-84qr-vpxc-hcpg | Symonics libmysofa 0.7 has an invalid write in readOHDRHeaderMessageDataLayout in hdf/dataobject.c. | [] | null | 9.8 | null | null |
|
CVE-2010-4417 | Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code. | [
"cpe:2.3:a:oracle:beehive:2.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-30347 | Cross Site Scripting (XSS) vulnerability in Neox Contact Center 2.3.9, via the serach_sms_api_name parameter to the SMA API search. | [
"cpe:2.3:a:stl:neox_dial_centre:2.3.9:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
CVE-2025-21251 | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | [] | null | 7.5 | null | null |
GHSA-2f4q-xh8v-r37w | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. This vulnerability affects unknown code of the file /boafrm/formTmultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 7.4 | 8.8 | null | null |
|
GHSA-2pjq-j823-9rpw | An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux, aka 'Windows Subsystem for Linux Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0682, CVE-2019-0692, CVE-2019-0693, CVE-2019-0694. | [] | null | null | 7.8 | null |
|
GHSA-m9mx-fh6q-cw99 | A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger the reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. | [] | null | 8.8 | null | null |
|
RHSA-2025:7898 | Red Hat Security Advisory: kernel security update | kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7 | null | null |
CVE-2022-43688 | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Stored Cross-Site Scripting (XSS) in icons since the Microsoft application tile color is not sanitized. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
GHSA-53j9-987j-m4vw | SQL injection vulnerability in location.php in the eCal module in E-Xoopport Samsara 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the lid parameter. | [] | null | null | null | null |
|
CVE-2025-24240 | A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data. | [] | null | 4.7 | null | null |
|
CVE-2019-5142 | An exploitable command injection vulnerability exists in the hostname functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various authenticated requests to trigger this vulnerability. | [
"cpe:2.3:o:moxa:awk-3131a_firmware:1.13:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:awk-3131a:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
|
CVE-2018-17922 | Circontrol CirCarLife all versions prior to 4.3.1, the PAP credentials of the device are stored in clear text in a log file that is accessible without authentication. | [
"cpe:2.3:o:circontrol:circarlife_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:circontrol:circarlife:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-6v2c-8r55-2hp7 | Multiple SQL injection vulnerabilities in PHP Classifieds 7.1 allow remote attackers to execute arbitrary SQL commands via (1) the catid_search parameter in search.php and (2) the catid parameter in index.php. | [] | null | null | null | null |
|
CVE-2005-0155 | The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable. | [
"cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-wc2j-86rx-j339 | TOTOLINK EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution on the cstecgi.cgi NTPSyncWithHost interface. | [] | null | 9.8 | null | null |
|
CVE-2024-48911 | OpenCanary Executes Commands From Potentially Writable Config File | OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its config file. Prior to version 0.9.4, where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon. Version 0.9.4 contains a fix for the issue. | [
"cpe:2.3:a:thinkst:opencanary:*:*:*:*:*:*:*:*"
] | 5.8 | null | null | null |
GHSA-38rr-jh2c-6vfp | Cross-site scripting (XSS) vulnerability in the web application firewall in Cisco CallManager before 3.3(5)sr3, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allows remote attackers to inject arbitrary web script or HTML via the pattern parameter to CCMAdmin/serverlist.asp (aka the search-form) and possibly other unspecified vectors. | [] | null | null | null | null |
|
GHSA-h32p-cwph-5qx4 | A vulnerability in the access control list (ACL) functionality of the standby route processor management interface of Cisco IOS XR Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the standby route processor management Gigabit Ethernet Management interface. The vulnerability is due to a logic error that was introduced in the Cisco IOS XR Software, which prevents the ACL from working when applied against the standby route processor management interface. An attacker could exploit this vulnerability by attempting to access the device through the standby route processor management interface. | [] | null | null | null | null |
|
CVE-2023-23716 | WordPress Zendesk Support for WordPress plugin <= 1.8.4 - Broken Access Control vulnerability | Missing Authorization vulnerability in Zendesk Zendesk Support for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zendesk Support for WordPress: from n/a through 1.8.4. | [] | null | 4.3 | null | null |
GHSA-gg93-c88h-27x6 | Bank Management System v1.o was discovered to contain a SQL injection vulnerability via the email parameter. | [] | null | 9.8 | null | null |
|
RHSA-2006:0605 | Red Hat Security Advisory: perl security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2010-0391 | Multiple stack-based buffer overflows in Embarcadero Technologies InterBase SMP 2009 9.0.3.437 allow remote attackers to execute arbitrary code via unknown vectors involving crafted packets. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:embarcadero:interbase_smp_2009:9.0.3.437:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-7820 | Tobesoft NEXACRO14/17 ExCommonApiV13 Arbitrary Code Execution Vulnerability | Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by setting the arguments to the vulnerable API. This can be leveraged for code execution by rebooting the victim’s PC | [
"cpe:2.3:a:nexaweb:nexacro_14:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nexaweb:nexacro_17:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-285w-5q64-gvjx | A remote denial of service vulnerability in libvpx in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34360591. | [] | null | null | 5.5 | null |
|
GHSA-5hfh-rpj4-39xm | Mozilla Firefox before 44.0 on Android does not ensure that HTTPS is used for a lightweight-theme installation, which allows man-in-the-middle attackers to replace a theme's images and colors by modifying the client-server data stream. | [] | null | null | 5.3 | null |
|
GHSA-gghg-5rj2-xp8x | Cross-site request forgery (CSRF) vulnerability in pages.php in Wikipad 1.6.0 allows remote attackers to hijack the authentication of administrators for requests that modify pages via the data[text] parameter. | [] | null | null | null | null |
|
CVE-2006-3311 | Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8, Flash MX 2004, and Flex 1.5 allows user-assisted remote attackers to execute arbitrary code via a long, dynamically created string in a SWF movie. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:mx_2004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:1.5:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
GHSA-7689-m3w7-j29p | The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c. | [] | null | null | 4.7 | null |
|
CVE-2023-47198 | An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This vulnerability is similar to, but not identical to, CVE-2023-47199. | [
"cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:windows:*:*",
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:on-premises:windows:*:*"
] | null | 7.8 | null | null |
|
GHSA-2gq5-rpfx-46r3 | A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 4). SmartVNC has a heap allocation leak vulnerability in the server Tight encoder, which could result in a Denial-of-Service condition. | [] | null | null | null | null |
|
GHSA-268w-8v2j-mm3q | ** DISPUTED ** NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus 2002 allows remote attackers to send viruses that bypass the e-mail scanning via a NULL character in the MIME header before the virus. NOTE: the vendor has disputed this issue, acknowledging that the initial scan is bypassed, but the AutoProtect feature would detect the virus before it is executed. | [] | null | null | null | null |
|
CVE-2024-38083 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Microsoft Edge (Chromium-based) Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:iphone_os:*:*"
] | null | 4.3 | null | null |
GHSA-rmpg-8873-cgwp | Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. | [] | null | null | 5.5 | null |
|
GHSA-7wpm-j27w-6r7j | CHANGING Mobile One Time Password does not properly filter parameters for the file download functionality, allowing remote attackers with administrator privilege to read arbitrary file on the system. | [] | null | 4.9 | null | null |
|
GHSA-gq76-mjm5-q3g9 | Sourcecodester Lost and Found Information System's Version 1.0 is vulnerable to unauthenticated SQL Injection at "?page=items/view&id=*". | [] | null | 5.4 | null | null |
|
CVE-2024-13930 | Authenticated Unchecked Loop Condition | An Unchecked Loop Condition in ASPECT provides an attacker the ability to maliciously consume system resources if session administrator credentials become compromised
This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03. | [] | 5.9 | 4.9 | null | null |
GHSA-xr9g-g7xh-rw7g | The makemask function in mountd.c in mountd in FreeBSD 7.4 through 8.2 does not properly handle a -network field specifying a CIDR block with a prefix length that is not an integer multiple of 8, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances via an NFS mount request. | [] | null | null | null | null |
|
CVE-2023-3805 | Xiamen Four Letter Video Surveillance Management System Login UserInfoAction.class improper authorization | A vulnerability, which was classified as critical, has been found in Xiamen Four Letter Video Surveillance Management System up to 20230712. This issue affects some unknown processing in the library UserInfoAction.class of the component Login. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235073 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:four-faith:video_surveillance_management_system:*:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 |
CVE-2022-22779 | Retained exploded messages in Keybase clients for macOS and Windows | The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user’s filesystem. | [
"cpe:2.3:a:keybase:keybase:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.7 | null | null |
CVE-2004-1217 | Hosting Controller 6.1 Hotfix 1.4, and possibly other versions, allows remote attackers to view arbitrary directories by specifying the target pathname in the FilePath parameter to (1) Statsbrowse.asp or (2) Generalbrowse.asp. | [
"cpe:2.3:a:hosting_controller:hosting_controller:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-22820 | WordPress VR Views plugin <= 1.5.1 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel Walmsley VR Views allows Stored XSS.This issue affects VR Views: from n/a through 1.5.1. | [] | null | 6.5 | null | null |
GHSA-735r-9w5c-9j82 | NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) in which the program accesses or uses a pointer that has not been initialized, which may lead to denial of service. | [] | null | null | null | null |
|
CVE-2018-10946 | An issue was discovered in versions earlier than 1.3.0-66872 for Polycom RealPresence Debut that allows attackers to arbitrarily read the admin user's password via the admin web UI. | [
"cpe:2.3:o:polycom:realpresence_debut_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:realpresence_debut:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | 2.7 |
|
PYSEC-2010-29 | null | Multiple cross-site scripting (XSS) vulnerabilities in the paste.httpexceptions implementation in Paste before 1.7.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving a 404 status code, related to (1) paste.urlparser.StaticURLParser, (2) paste.urlparser.PkgResourcesParser, (3) paste.urlmap.URLMap, and (4) HTTPNotFound. | [] | null | null | null | null |
CVE-2021-37717 | A remote arbitrary command execution vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.6; Prior to 8.7.1.4, 8.6.0.7, 8.5.0.12, 8.3.0.16. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability. | [
"cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | 9 |
|
CVE-2024-7080 | SourceCodester Insurance Management System direct request | A vulnerability was found in SourceCodester Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /E-Insurance/. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272365 was assigned to this vulnerability. | [
"cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 5.3 | 5.3 | 5 |
CVE-2023-45585 | An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage. | [
"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:6.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisiem:7.0.0:*:*:*:*:*:*:*"
] | null | 2.1 | null | null |
|
CVE-2023-36882 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-q8fq-52x5-p228 | LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191. | [] | null | 6.5 | null | null |
|
GHSA-7whx-v52v-gg25 | A vulnerability was found in wangl1989 mysiteforme 1.0. It has been rated as critical. This issue affects the function doContent of the file src/main/java/com/mysiteform/admin/controller/system/FileController. The manipulation of the argument content leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
CVE-2024-48043 | WordPress ShortPixel Image Optimizer plugin <= 5.6.3 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ShortPixel ShortPixel Image Optimizer allows Blind SQL Injection.This issue affects ShortPixel Image Optimizer: from n/a through 5.6.3. | [
"cpe:2.3:a:shortpixel:shortpixel_image_optimizer:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
CVE-2020-14175 | Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2. | [
"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-j5q5-72f6-9f78 | WorkforceROI Xpede 4.1 stores temporary expense claim reports in a world-readable and indexable /reports/temp directory, which allows remote attackers to read the reports by accessing the directory. | [] | null | null | null | null |
|
CVE-2018-11478 | An issue was discovered on Vgate iCar 2 Wi-Fi OBD2 Dongle devices. The OBD port is used to receive measurement data and debug information from the car. This on-board diagnostics feature can also be used to send commands to the car (different for every vendor / car product line / car). No authentication is needed, which allows attacks from the local Wi-Fi network. | [
"cpe:2.3:o:vgate:icar_2_wi-fi_obd2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:vgate:icar_2_wi-fi_obd2:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 |
|
GHSA-87f6-4648-854h | In TMU_IPC_GET_TABLE, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 6.2 | null | null |
|
CVE-2019-20677 | Certain NETGEAR devices are affected by stored XSS. This affects RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30. | [
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*"
] | null | null | 6 | null |
|
GHSA-crxg-42h5-fw55 | Unspecified vulnerability in the SIP implementation in Cisco IOS 12.3 and 12.4 allows remote attackers to execute arbitrary code via a malformed SIP message, aka Bug ID CSCsz48680, the "SIP Message Processing Arbitrary Code Execution Vulnerability." | [] | null | null | null | null |
|
RHSA-2024:3671 | Red Hat Security Advisory: ruby:3.3 security, bug fix, and enhancement update | ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.6 | null | null |
GHSA-p32x-cxrq-r87p | TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ 41D494 function. | [] | null | 9.8 | null | null |
|
GHSA-jrgv-pmf9-6qg5 | This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data. | [] | null | 9.8 | null | null |
|
CVE-2017-15894 | Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology DiskStation Manager (DSM) 6.0.x before 6.0.3-8754-3 and before 5.2-5967-6 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter. | [
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2024-9224 | Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read | The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | [
"cpe:2.3:a:kau-boys:hello_world:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2017-18364 | phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter. | [
"cpe:2.3:a:frank-karau:phpfk:-:*:*:*:lite:*:*:*"
] | null | null | 7.4 | null |
|
GHSA-qgc5-rj8x-fc6x | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JDev Map Store Locator allows DOM-Based XSS.This issue affects Map Store Locator: from n/a through 1.2.1. | [] | null | 6.5 | null | null |
|
GHSA-v9qr-85j3-8xph | An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0745, CVE-2020-0792. | [] | null | null | null | null |
|
GHSA-g3jr-x8v9-67fh | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Avirtum iPages Flipbook For WordPress.This issue affects iPages Flipbook For WordPress: from n/a through 1.4.8. | [] | null | 7.6 | null | null |
|
GHSA-8f76-x9r8-c3c2 | Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits. | [] | null | 7.8 | null | null |
|
CVE-2019-16862 | Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter. | [
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2023-5366 | Openvswitch don't match packets on nd_target field | A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses. | [
"cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:fast_datapath:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:/o:redhat:enterprise_linux:7::fastdatapath",
"cpe:/o:redhat:enterprise_linux:8::fastdatapath",
"cpe:/o:redhat:enterprise_linux:9::fastdatapath",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/a:redhat:openshift:3.11",
"cpe:/a:redhat:openshift:4",
"cpe:/a:redhat:openstack:16.1",
"cpe:/a:redhat:openstack:16.2",
"cpe:/:redhat:enterprise_linux:::hypervisor"
] | null | 7.1 | null | null |
CVE-2023-38409 | An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2018-13736 | The mintToken function of a smart contract implementation for ELearningCoinERC, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:elearningcoinerc_project:elearningcoinerc:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
RHSA-2019:1186 | Red Hat Security Advisory: libvirt security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 3.8 | null |
CVE-2025-5132 | Tmall Demo logout cross-site request forgery | A vulnerability was found in Tmall Demo up to 20250505. It has been rated as problematic. This issue affects some unknown processing of the file tmall/admin/account/logout. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 4.3 | 4.3 | 5 |
GHSA-hwqj-cjw9-27x8 | An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmentation fault via Ap4Atom.cpp, specifically in AP4_AtomParent::RemoveChild, during the execution of mp4encrypt with a specially crafted MP4 input file. | [] | null | 5.5 | null | null |
|
GHSA-jqf7-2vx9-v35c | Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file. | [] | null | null | null | null |
|
CVE-2022-41184 | Due to lack of proper memory management, when a victim opens a manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
| [
"cpe:2.3:a:sap:3d_visual_enterprise_author:9.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-9mhq-xcrq-xc75 | An authentication bypass vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to gain access by exploiting the SetUser method or can exploit the Race Condition in the authentication message. | [] | null | 5.9 | null | null |
|
GHSA-q35w-7696-fc7r | A malformed packet containing an invalid destination address, causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error. | [] | null | 6.5 | null | null |
|
CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | [
"cpe:2.3:a:gnome:pango:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2021-37539 | Zoho ManageEngine ADManager Plus before 7111 is vulnerable to unrestricted file which leads to Remote code execution. | [
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7110:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-9p66-pv4c-2gjf | The custom-sidebars plugin before 3.0.8.1 for WordPress has CSRF. | [] | null | null | 8.8 | null |
|
CVE-2024-26228 | Windows Cryptographic Services Security Feature Bypass Vulnerability | Windows Cryptographic Services Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2004-2201 | SQL injection vulnerability in DUware DUforum 3.0 through 3.1 allows remote attackers to execute arbitrary SQL commands via the FOR_ID parameter in messages.asp, (2) MSG_ID parameter in messageDetail.asp, or (3) password parameter in the login form. | [
"cpe:2.3:a:duware:duforum:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:duware:duforum:3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-3925 | Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command. | [
"cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-gqw7-f3qg-cwgq | Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request. | [] | null | null | null | null |
|
GHSA-rw8p-9rcw-27w7 | Melange Chat Server (aka M-Chat), when accessed via a web browser, automatically sends cookies and other sensitive information for a server to any port specified in the associated link, which allows local users on that server to read the cookies from HTTP headers and possibly gain sensitive information, such as credentials, by setting up a listening port and reading the credentials when the victim clicks on the link. | [] | null | null | null | null |
|
GHSA-287j-5qww-5g5x | Unrestricted Upload of File with Dangerous Type vulnerability in Hive Support Hive Support – WordPress Help Desk allows Upload a Web Shell to a Web Server.This issue affects Hive Support – WordPress Help Desk: from n/a through 1.1.1. | [] | null | 9.9 | null | null |
|
GHSA-c5gm-r7c3-j9cp | In the Linux kernel, the following vulnerability has been resolved:tee: amdtee: fix use-after-free vulnerability in amdtee_close_sessionThere is a potential race condition in amdtee_close_session that may
cause use-after-free in amdtee_open_session. For instance, if a session
has refcount == 1, and one thread tries to free this session via:the reference count will get decremented, and the next step would be to
call destroy_session(). However, if in another thread,
amdtee_open_session() is called before destroy_session() has completed
execution, alloc_session() may return 'sess' that will be freed up
later in destroy_session() leading to use-after-free in
amdtee_open_session.To fix this issue, treat decrement of sess->refcount and removal of
'sess' from session list in destroy_session() as a critical section, so
that it is executed atomically. | [] | null | 7 | null | null |
|
GHSA-5cfh-9256-97w3 | PHP remote file inclusion vulnerability in zpanel.php in ZPanel allows remote attackers to (1) execute arbitrary PHP code in ZPanel 2.0 or (2) include local files in ZPanel 2.5 beta 10 and earlier by modifying the page parameter. | [] | null | null | null | null |
|
GHSA-4jw3-6wgx-w4c7 | An issue was discovered in Zoho ManageEngine EventLog Analyzer 11.12. A Cross-Site Scripting vulnerability allows a remote attacker to inject arbitrary web script or HTML via the search functionality (the search box of the Dashboard). | [] | null | null | 6.1 | null |
|
CVE-2009-3004 | Avant Browser 11.7 Builds 35 and 36 allows remote attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary URL on the web site visited by the victim, as demonstrated by a visit to an attacker-controlled web page, which triggers a spoofed login form for the site containing that page. NOTE: a related attack was reported in which an arbitrary file: URL is shown. | [
"cpe:2.3:a:avant_force:avant_browser:11.7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-12116 | An exploitable improper authorization vulnerability exists in miner_setGasPrice API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability. | [
"cpe:2.3:a:ethereum:aleth:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
|
GHSA-92cx-4xm7-jr9m | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_scalar_function has a use-after-free. | [] | null | 7.5 | null | null |
GHSA-9xrg-mh99-h5f7 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSIMYTH Nexter allows SQL Injection.This issue affects Nexter: from n/a through 2.0.3. | [] | null | 9.8 | null | null |
|
GHSA-79c7-fcvq-hwm8 | A vulnerability exists which could allow an unauthorized user to learn aspects of the communication protocol used to pair system components while the pump is being paired with other system components. Exploitation requires nearby wireless signal proximity with the patient and the device; advanced technical knowledge is required for exploitation. Please refer to the Medtronic Product Security Bulletin for guidance | [] | null | 4.8 | null | null |
|
GHSA-6w3g-x8mp-cp7x | In the Linux kernel, the following vulnerability has been resolved:comedi: vmk80xx: fix transfer-buffer overflowsThe driver uses endpoint-sized USB transfer buffers but up until
recently had no sanity checks on the sizes.Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize
of usb endpoints found") inadvertently fixed NULL-pointer dereferences
when accessing the transfer buffers in case a malicious device has a
zero wMaxPacketSize.Make sure to allocate buffers large enough to handle also the other
accesses that are done without a size check (e.g. byte 18 in
vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond
the buffers, for example, when doing descriptor fuzzing.The original driver was for a low-speed device with 8-byte buffers.
Support was later added for a device that uses bulk transfers and is
presumably a full-speed device with a maximum 64-byte wMaxPacketSize. | [] | null | null | null | null |
|
GHSA-wxph-f75j-5289 | IBM StoredIQ 7.6.0.17 through 7.6.0.20 could disclose sensitive information to a local user due to data in certain directories not being encrypted when it contained symbolic links. IBM X-Force ID: 175133. | [] | null | null | null | null |
|
GHSA-84wr-7m4v-hrcf | Cross-site scripting (XSS) vulnerability in manuals_search.php in ViArt Shop (aka Shopping Cart) 3.5 allows remote attackers to inject arbitrary web script or HTML via the manuals_search parameter. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.