id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-h74p-5crf-72xc
The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet.
[]
null
null
null
null
CVE-2024-5396
itsourcecode Online Student Enrollment System newfaculty.php sql injection
A vulnerability classified as critical has been found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file newfaculty.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266310 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-5q9f-4pxq-x2gv
This issue was addressed with improved redaction of sensitive information. This issue is fixed in watchOS 9.5, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to bypass Privacy preferences
[]
null
5.5
null
null
CVE-2024-56711
drm/panel: himax-hx83102: Add a check to prevent NULL pointer dereference
In the Linux kernel, the following vulnerability has been resolved: drm/panel: himax-hx83102: Add a check to prevent NULL pointer dereference drm_mode_duplicate() could return NULL due to lack of memory, which will then call NULL pointer dereference. Add a check to prevent it.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2021-24400
Display users <= 2.0.0 - Authenticated SQL Injection
The Edit Role functionality in the Display Users WordPress plugin through 2.0.0 had an `id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
[ "cpe:2.3:a:wp-display-users_project:wp-display-users:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
RHSA-2020:3519
Red Hat Security Advisory: OpenShift Container Platform 4.5.7 jenkins and openshift packages security update
jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links kubernetes: Node disk DOS by writing to container /etc/hosts
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
5.5
null
null
GHSA-4jjh-fj8q-cr9r
Cross-site scripting (XSS) vulnerability in index.php in sabros.us 1.7 allows remote attackers to inject arbitrary web script or HTML via the tag parameter.
[]
null
null
null
null
CVE-2023-23804
WordPress HT Feed Plugin <= 1.2.7 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in HasThemes HT Feed plugin <= 1.2.7 versions.
[ "cpe:2.3:a:hasthemes:ht_feed:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
cisco-sa-cucm-imp-dos-49GL7rzT
Cisco Unified Communications Manager IM & Presence Service Denial of Service Vulnerability
A vulnerability in the XCP Authentication Service of the Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to cause a temporary service outage for all Cisco Unified CM IM&P users who are attempting to authenticate to the service, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted login message to the affected device. A successful exploit could allow the attacker to cause an unexpected restart of the authentication service, preventing new users from successfully authenticating. Exploitation of this vulnerability does not impact Cisco Unified CM IM&P users who were authenticated prior to an attack. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
7.5
null
null
CVE-2018-8641
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8639.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-qxhg-cm25-fj25
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
6.5
null
CVE-2012-5606
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before 4.0.9 and 4.5.0 allow remote attackers to inject arbitrary web script or HTML via the (1) file name to apps/files_versions/js/versions.js or (2) apps/files/js/filelist.js; or (3) event title to 3rdparty/fullcalendar/js/fullcalendar.js.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-cq38-jh5f-37mq
sigstore-go has an unbounded loop over untrusted input can lead to endless data attack
Impactsigstore-go is susceptible to a denial of service attack when a verifier is provided a maliciously crafted Sigstore Bundle containing large amounts of verifiable data, in the form of signed transparency log entries, RFC 3161 timestamps, and attestation subjects. The verification of these data structures is computationally expensive. This can be used to consume excessive CPU resources, leading to a denial of service attack. TUF's security model labels this type of vulnerability an "Endless data attack," and can lead to verification failing to complete and disrupting services that rely on sigstore-go for verification.The vulnerable loops are in the verification functions in the package `github.com/sigstore/sigstore-go/pkg/verify`. The first is the DSSE envelope verification loop in `verifyEnvelopeWithArtifact`, which decodes all the digests in an attestation can be found here:https://github.com/sigstore/sigstore-go/blob/725e508ed4933e6f5b5206e32af4bbe76f587b54/pkg/verify/signature.go#L183-L193The next loop is in the `VerifyArtifactTransparencyLog` function, which verifies all the signed entries in a bundle:https://github.com/sigstore/sigstore-go/blob/725e508ed4933e6f5b5206e32af4bbe76f587b54/pkg/verify/tlog.go#L74-L178The next loop is the `VerifyTimestampAuthority` function, which verifies all the RFC 3161 timestamps in a bundle:https://github.com/sigstore/sigstore-go/blob/725e508ed4933e6f5b5206e32af4bbe76f587b54/pkg/verify/tsa.go#L59-L68PatchesThis vulnerability is addressed with sigstore-go 0.6.1, which adds hard limits to the number of verifiable data structures that can be processed in a bundle. Verification will fail if a bundle has data that exceeds these limits. The limits are:32 signed transparency log entries32 RFC 3161 timestamps1024 attestation subjects32 digests per attestation subjectThese limits are intended to be high enough to accommodate the vast majority of use cases, while preventing the verification of maliciously crafted bundles that contain large amounts of verifiable data.WorkaroundsThe best way to mitigate the risk is to upgrade to sigstore-go 0.6.1 or later. Users who are vulnerable but unable to quickly upgrade may consider adding manual bundle validation to enforce limits similar to those in the referenced patch prior to calling sigstore-go's verification functions.
[]
2.3
3.1
null
null
GHSA-3rq9-p85x-qfcj
Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for eShop plugin 3.7.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter.
[]
null
null
null
null
GHSA-32jr-8q2g-wwf3
Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI.
[]
null
null
null
null
GHSA-jxr5-qf7m-8vh9
rejucms 2.1 has XSS via the ucenter/cms_user_add.php u_name parameter.
[]
null
null
6.1
null
CVE-2024-45751
tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.
[]
null
5.9
null
null
CVE-2006-4246
Usermin before 1.220 (20060629) allows remote attackers to read arbitrary files, possibly related to chfn/save.cgi not properly handling an empty shell parameter, which results in changing root's shell instead of the shell of a specified user.
[ "cpe:2.3:a:usermin:usermin:*:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*" ]
null
null
null
3.6
GHSA-hjjc-xj45-xrrg
The Login using WordPress Users ( WP as SAML IDP ) WordPress plugin before 1.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
4.8
null
null
GHSA-9mqj-rmc8-938f
Password Manager for IIS 2.0 has a cross-site scripting (XSS) vulnerability via the /isapi/PasswordManager.dll ResultURL parameter.
[]
null
6.1
null
null
CVE-2013-1406
The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors.
[ "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:fusion:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:4.0.0:u2:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:5.0.0:u2:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:view:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-hf55-2mfj-2hrg
An issue was discovered in FusionPBX before 4.5.30. The fax_post_size may have risky characters (it is not constrained to preset values).
[]
null
null
null
null
GHSA-9qwg-ch53-9rxw
A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.
[]
null
6.5
null
null
GHSA-w65f-4h2f-cpj2
TruDesk Help Desk/Ticketing Solution v1.1.11 is vulnerable to a Cross-Site Request Forgery (CSRF) attack which would allow an attacker to restart the server, causing a DoS attack. The attacker must craft a webpage that would perform a GET request to the /api/v1/admin/restart endpoint, then the victim (who has sufficient privileges), would visit the page and the server restart would begin. The attacker must know the full URL that TruDesk is on in order to craft the webpage.
[]
null
6.5
null
null
GHSA-5f2r-qp73-37mr
`CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow
ImpactThe Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger `CHECK` failures.PatchesWe have patched the issue in GitHub commit [92dba16749fae36c246bec3f9ba474d9ddeb7662](https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
[]
null
6.5
null
null
RHSA-2011:0858
Red Hat Security Advisory: xerces-j2 security update
JDK: XML parsing Denial-Of-Service (6845701)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2023-3657
SourceCodester AC Repair and Services System HTTP POST Request sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. This issue affects some unknown processing of the file Master.php?f=save_book of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-234011.
[ "cpe:2.3:a:oretnom23:ac_repair_and_services_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2011-0653
Cross-site scripting (XSS) vulnerability in Microsoft Office SharePoint Server 2010 Gold and SP1, and SharePoint Foundation 2010, allows remote attackers to inject arbitrary web script or HTML via the URI, aka "XSS in SharePoint Calendar Vulnerability."
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-xmmx-7jpf-fx42
Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing
ImpactIn the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of Moby (Docker Engine) prior to 20.10.11 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image.PatchesThis issue has been fixed in Moby (Docker Engine) 20.10.11. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected.WorkaroundsEnsure you only pull images from trusted sources.Referenceshttps://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qhFor more informationIf you have any questions or comments about this advisory:[Open an issue in](https://github.com/moby/moby/issues/new)Email us at [[email protected]](mailto:[email protected])
[]
null
null
null
null
GHSA-j34w-447c-w9jw
IBM Emptoris Contract Management 10.0.0 and 10.1.3.0 could disclose sensitive information from detailed information from error messages. IBM X-Force ID: 153657.
[]
null
null
5.3
null
GHSA-2h73-vgw2-r579
Improper handling of pending navigation entries in Navigation in Google Chrome on iOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
[]
null
null
6.5
null
GHSA-fcw4-qcmw-m499
Multiple unrestricted file upload vulnerabilities in the WP Symposium plugin before 11.12.24 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension using (1) uploadify/upload_admin_avatar.php or (2) uploadify/upload_profile_avatar.php, then accessing it via a direct request to the file in an unspecified directory inside the webroot.
[]
null
null
null
null
CVE-2022-29359
A stored cross-site scripting (XSS) vulnerability in /scas/?page=clubs/application_form&id=7 of School Club Application System v0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
[ "cpe:2.3:a:school_club_application_system_project:school_club_application_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-8chj-vfwh-89pj
The WP Table Builder WordPress plugin through 1.5.0 does not sanitise and escape some of its Table data, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
4.8
null
null
RHSA-2011:1089
Red Hat Security Advisory: systemtap security update
systemtap: signed module loading race condition
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-wwjw-r3gj-39fq
Insufficient Session Expiration in TYPO3's Admin Tool
MetaCVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.6)ProblemAdmin Tool sessions initiated via the TYPO3 backend user interface have not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit.SolutionUpdate to TYPO3 versions 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.CreditsThanks to Kien Hoang who reported this issue and to TYPO3 framework merger Ralf Zimmermann and TYPO3 security member Oliver Hader who fixed the issue.References[TYPO3-CORE-SA-2022-005](https://typo3.org/security/advisory/typo3-core-sa-2022-005)
[]
null
6
null
null
GHSA-3wpm-h778-w432
PHP Scripts Mall Online Lottery PHP Readymade Script 1.7.0 has Reflected Cross-site Scripting (XSS) via the err value in a .ico picture upload.
[]
null
null
5.4
null
CVE-2022-39022
e-Excellence Inc. U-Office Force - Path Traversal
U-Office Force Download function has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to download arbitrary system file.
[ "cpe:2.3:a:edetw:u-office_force:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
RHSA-2017:0457
Red Hat Security Advisory: Red Hat JBoss Web Server security and enhancement update
tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1" ]
null
null
7.5
null
CVE-2022-40118
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds_action.php.
[ "cpe:2.3:a:online_banking_system_project:online_banking_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-xf73-8777-6w59
Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'coursecode' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
null
9.8
null
null
CVE-2022-34094
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via request_token.php.
[ "cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2025-26486
Broken or Risky Cryptographic Algorithm, Use of Password Hash With Insufficient Computational Effort, Use of Weak Hash, Use of a One-Way Hash with a Predictable Salt vulnerabilities in Beta80 "Life 1st Identity Manager" enable an attacker with access to password hashes to bruteforce user passwords or find a collision to ultimately while attempting to gain access to a target application that uses "Life 1st Identity Manager" as a service for authentication. This issue affects Life 1st: 1.5.2.14234.
[]
null
6
null
null
GHSA-j9xx-xhxp-xr79
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
[]
null
null
null
null
GHSA-m7cw-wqhh-5pr9
COMFAST CF-WR630AX v2.7.0.2 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
[]
null
9.8
null
null
GHSA-r6h8-vrh6-m65f
Uncontrolled search path for some Intel(R) Chipset Software Installation Utility before version 10.1.19867.8574 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
5.4
6.7
null
null
GHSA-3r8p-382h-8p7p
Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via the GET_DOMAIN_INDEX_METADATA function in the DBMS_EXPORT_EXTENSION package. NOTE: this issue was originally linked to DB05 (CVE-2006-1870), but a reliable third party has claimed that it is not the same issue. Based on details of the problem, the primary issue appears to be insecure privileges that facilitate the introduction of SQL in a way that is not related to special characters, so this is not "SQL injection" per se.
[]
null
null
null
null
GHSA-3w44-mqq2-q3wr
Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20485.
[]
null
null
7.8
null
CVE-2019-0586
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server.
[ "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2015-3795
libxpc in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app that sends a malformed XPC message.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2025-23665
WordPress RSV GMaps plugin <= 1.5 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Rapid Sort RSV GMaps allows Stored XSS.This issue affects RSV GMaps: from n/a through 1.5.
[]
null
7.1
null
null
CVE-2008-2503
Buffer overflow in Uploadlist in eMule X-Ray before 1.4 has unknown impact and remote attack vectors.
[ "cpe:2.3:a:sourceforge:emule_x-ray:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:sourceforge:emule_x-ray:1.3:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-hr6r-r632-pjw9
The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.3 allows SVG files to be uploaded by default via the dnd_codedropz_upload AJAX action, which could lead to Stored Cross-Site Scripting issue
[]
null
5.4
null
null
CVE-2002-1928
602Pro LAN SUITE 2002 allows remote attackers to view the directory tree via an HTTP GET request with a trailing "~" (tilde) or ".bak" extension.
[ "cpe:2.3:a:software602:602pro_lan_suite:2002:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-52876
clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-rhqc-pf5h-2p72
Dragonfly in Opera before 11.60 allows remote attackers to cause a denial of service (application crash) via unspecified content on a web page, as demonstrated by forbes.com.
[]
null
null
null
null
CVE-2015-8034
The state.sls function in Salt before 2015.8.3 uses weak permissions on the cache data, which allows local users to obtain sensitive information by reading the file.
[ "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
GHSA-6w59-822p-m435
An issue was discovered in Mattermost Server before 5.7, 5.6.3, 5.5.2, and 4.10.5. It mishandles permissions for user-access token creation.
[]
null
null
null
null
GHSA-4c85-h2g3-r272
Stack-based buffer overflow in Vortex Light Alloy before 4.7.4 allows remote attackers to execute arbitrary code via a long URL in a .m3u file.
[]
null
null
null
null
RHSA-2015:1920
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
CVE-2022-24820
Unauthenticated user can list hidden document from multiple velocity templates
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A guest user without the right to view pages of the wiki can still list documents by rendering some velocity documents. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.
[ "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:13.9:-:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-8648-h559-8h42
Fluid Components TYPO3 extension vulnerable to Cross-Site Scripting
All versions of Fluid Components before 3.5.0 were susceptible to Cross-Site Scripting. Version 3.5.0 of the extension fixes this issue. Due to the nature of the problem, some changes in your project's Fluid templates might be necessary to prevent unwanted double-escaping of HTML markup.
[]
null
6.1
null
null
CVE-2017-5786
A local Unauthorized Data Modification vulnerability in HPE OfficeConnect Network Switches version PT.02.01 including PT.01.03 through PT.01.14
[ "cpe:2.3:o:hp:officeconnect_1820_8g_switch_j9979a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_8g_switch_j9979a_firmware:pt.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_8g_switch_j9979a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a_firmware:pt.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_24g_poe\\+_\\(185w\\)_switch_j9983a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_24g_switch_j9980a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_24g_switch_j9980a_firmware:pt.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_24g_switch_j9980a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a_firmware:pt.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_48g_poe\\+_\\(370w\\)_switch_j9984a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_48g_switch_j9981a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_48g_switch_j9981a_firmware:pt.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_48g_switch_j9981a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a_firmware:pt.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:officeconnect_1820_8g_poe\\+_\\(65w\\)_switch_j9982a:-:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
CVE-2024-23094
Flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /cover/addons/info_media_gallery/action/edit_addon_post.php
[ "cpe:2.3:a:flusity:cms:v2.33:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-hvrx-8j5q-54c6
An exploitable out-of-bounds write vulnerability exists in the ico_read function of the igcore19d.dll library of Accusoft ImageGear 19.6.0. A specially crafted ICO file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.
[]
null
8.8
null
null
CVE-2021-28055
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
[ "cpe:2.3:a:centreon:centreon:20.10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-pgfm-49cm-23cx
An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[]
null
7.8
null
null
CVE-2002-0622
The Office Web Components (OWC) package installer for Microsoft Commerce Server 2000 allows remote attackers to execute commands by passing the commands as input to the OWC package installer, aka "OWC Package Command Execution".
[ "cpe:2.3:a:microsoft:commerce_server:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:commerce_server:2000:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:commerce_server:2000:sp2:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-42vc-w257-pp26
The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
[]
null
6.5
null
null
CVE-2022-47213
Microsoft Office Graphics Remote Code Execution Vulnerability
Microsoft Office Graphics Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*" ]
null
7.8
null
null
RHSA-2020:3280
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
nss: Use-after-free in sftk_FreeSession due to improper refcounting nss: Check length of inputs for cryptographic primitives nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state nss: Timing attack on DSA signature generation nss: Side channel vulnerabilities during RSA key generation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.4
8.1
null
GHSA-r2r4-m6fw-2jwh
SQL Injection exists in the Fastball 2.5 component for Joomla! via the season parameter in a view=player action.
[]
null
9.8
null
null
GHSA-62pg-hjc9-8wrw
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.
[]
null
null
null
null
CVE-2024-9759
Tungsten Automation Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Tungsten Automation Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of GIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24475.
[ "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
GHSA-fh42-q9qf-98jh
IBM Storage Protect Plus Server 10.1.0 through 10.1.15.2 Admin Console could allow a remote attacker to obtain sensitive information due to improper validation of unsecured endpoints which could be used in further attacks against the system. IBM X-Force ID: 270599.
[]
null
5.3
null
null
GHSA-vc68-vpf2-7xq5
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16368.
[]
null
7.8
null
null
CVE-2025-45487
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.InternetConnection function.
[]
null
6.5
null
null
GHSA-gvjh-w2gj-wqhg
Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6 might allow remote attackers to cause a denial of service (memory consumption) via (1) plaintext data to the openssl_encrypt function or (2) ciphertext data to the openssl_decrypt function.
[]
null
null
null
null
GHSA-7mq4-q26p-5pj7
The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.
[]
null
null
8.8
null
CVE-2019-8158
An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to limited access to underlying XML data.
[ "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.3.2:-:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.2:-:*:*:open_source:*:*:*" ]
null
9.8
null
7.5
CVE-2010-0478
Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-84fw-wvq7-7x27
Nextcloud Server before 11.0.7 and 12.0.5 suffers from an Authorization Bypass Through User-Controlled Key vulnerability. A missing ownership check allowed logged-in users to change the scope of app passwords of other users. Note that the app passwords themselves where neither disclosed nor could the error be misused to identify as another user.
[]
null
null
5.7
null
GHSA-7c37-p4gh-wrh2
Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames.
[]
null
null
null
null
CVE-2023-25753
Server-Side Request Forgery in Apache ShenYu
There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter. Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing. This issue affects Apache ShenYu: 2.5.1. Upgrade to Apache ShenYu 2.6.0 or apply patch  https://github.com/apache/shenyu/pull/4776  .
[ "cpe:2.3:a:apache:shenyu:2.5.1:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-c954-w2fm-c62r
SQL injection vulnerability in libs/Wakka.class.php in WikkaWiki (Wikka Wiki) before 1.1.6.3 allows remote attackers to execute arbitrary SQL commands via the limit parameter. NOTE: this issue only applies to a "modified installation."
[]
null
null
null
null
CVE-1999-0578
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
[ "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2008-4080
SQL injection vulnerability in Stash 1.0.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username parameter to admin/library/authenticate.php and the (2) download parameter to downloadmp3.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:stash:stash:1.0.3:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2024-20076
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01297806; Issue ID: MSV-1481.
[ "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2019-19734
_account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.
[ "cpe:2.3:a:mfscripts:yetishare:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2014-8987
Cross-site scripting (XSS) vulnerability in the "set configuration" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986.
[ "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-wfpw-hqjg-58ph
CSRF vulnerability in Jenkins Maven Cascade Release Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Maven Cascade Release Plugin 1.3.2 and earlier allows attackers to start cascade builds and layout builds, and reconfigure the plugin.
[]
null
6.5
null
null
GHSA-c6hx-6fwx-2855
In PHP Scripts Mall advanced-real-estate-script 4.0.9, the search-results.php searchtext parameter is vulnerable to XSS.
[]
null
null
null
null
CVE-2022-36712
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /staff/studentdetails.php.
[ "cpe:2.3:a:library_management_system_project:library_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
RHSA-2022:1455
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: fget: check that the fd still exists after getting a ref to it kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: heap out of bounds write in nf_dup_netdev.c
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.8
null
null
GHSA-v446-8p4r-76m4
Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi.
[]
null
5.5
null
null
RHSA-2010:0837
Red Hat Security Advisory: rhpki security and enhancement update
MD5: MD5 Message-Digest Algorithm is not collision resistant System: unauthenticated user can request SCEP one-time PIN decryption System: SCEP one-time PIN reuse
[ "cpe:/a:redhat:certificate_system:7.3" ]
null
null
null
null
CVE-2016-1432
Cisco IOS XE 3.15S and 3.16S on cBR-8 Converged Broadband Router devices allows remote authenticated users to cause a denial of service (NULL pointer dereference and card restart) via a crafted SNMP request, aka Bug ID CSCuu68862.
[ "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*" ]
null
null
6.5
6.8
CVE-2020-7605
gulp-tape through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of 'gulp-tape' options.
[ "cpe:2.3:a:gulp-tape_project:gulp-tape:*:*:*:*:*:node.js:*:*" ]
null
9.8
null
7.5
CVE-2014-5869
The CNNMoney Portfolio (aka com.cnn.cnnmoney) application 1.03 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:cnn:cnnmoney_portfolio:1.03:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-f596-88pf-rrm5
Missing Authorization vulnerability in ProfilePress Membership Team ProfilePress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ProfilePress: from n/a through 4.13.2.
[]
null
5.3
null
null