id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-w8mg-g59g-ww6x
In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Additional check in ntfs_file_release
[]
null
7.8
null
null
RHSA-2020:3714
Red Hat Security Advisory: httpd:2.4 security update
httpd: Push diary crash on specifically crafted HTTP/2 header
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
CVE-2023-1565
FeiFeiCMS Extension Tool slide_add.html cross site scripting
A vulnerability was found in FeiFeiCMS 2.7.130201. It has been classified as problematic. This affects an unknown part of the file \Public\system\slide_add.html of the component Extension Tool. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223557 was assigned to this vulnerability.
[ "cpe:2.3:a:feifeicms:feifeicms:2.7.130201:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
RHSA-2023:3931
Red Hat Security Advisory: python27:2.7 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
CVE-2020-15496
Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.
[ "cpe:2.3:a:acronis:true_image:*:*:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:-:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:macos:*:*", "cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:macos:*:*" ]
null
7.8
null
4.6
GHSA-37gh-342p-m59x
Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
7.5
null
null
GHSA-4rmw-pqrq-m8x7
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157.
[]
null
null
null
null
GHSA-fj85-3hpv-97rg
Improper Control of Generation of Code ('Code Injection') vulnerability in WP Sharks s2Member Pro allows Code Injection.This issue affects s2Member Pro: from n/a through 241114.
[]
null
9
null
null
GHSA-789g-f8cr-fh2g
Stack-based buffer overflow in the OpenType Compact Font Format (aka OTF or CFF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted parameter values in an OpenType font, aka "OpenType Font Stack Overflow Vulnerability."
[]
null
null
null
null
CVE-2021-32792
XSS vulnerability when using OIDCPreservePost On in mod_auth_openidc
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`.
[ "cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
3.1
null
null
CVE-2025-1285
Resido - Real Estate WordPress Theme <= 3.6 - Missing Authorization to Unauthenticated Server-Side Request Forgery and API Key Settings Update
The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details.
[]
null
5.3
null
null
CVE-2015-8511
Race condition in the lockscreen feature in Mozilla Firefox OS before 2.5 allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors.
[ "cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*" ]
null
null
6.4
6.9
GHSA-9229-f3q3-427j
IBM Lotus Sametime 8.5.2 and 8.5.2.1 allows remote attackers to cause a denial of service (WebPlayer Firefox extension crash) via a crafted Audio Visual (AV) session.
[]
null
null
null
null
CVE-2020-2510
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via OracleNet to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Core RDBMS. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*" ]
null
null
7.5
null
CVE-2025-26494
Server Side Request Forgery vulnerability in Tableau Server
Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server allows Authentication Bypass.This issue affects Tableau Server: from 2023.3 through 2023.3.5.
[]
null
7.7
null
null
CVE-2014-8346
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.
[ "cpe:2.3:a:samsung:findmymobile:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:mobile:-:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-84x6-2366-7jjm
In the Linux kernel, the following vulnerability has been resolved:stm class: Fix a double free in stm_register_device()The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a double free.
[]
null
7.8
null
null
CVE-2024-6056
nasirkhan Laravel Starter Password Reset forgot-password observable response discrepancy
A vulnerability was found in nasirkhan Laravel Starter up to 11.8.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /forgot-password of the component Password Reset Handler. The manipulation of the argument Email leads to observable response discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268784. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:nasirkhan:laravel_starter:*:*:*:*:*:*:*:*" ]
6.3
3.7
3.7
2.6
GHSA-q4v4-q7v7-cvq2
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Wolfgang Ertl weebotLite plugin <= 1.0.0 versions.
[]
null
5.9
null
null
cisco-sa-sna-xss-mCA9tQnJ
Cisco Secure Network Analytics Network Diagrams Application Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of the Network Diagrams application for Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure ["https://www.cisco.com/c/en/us/products/security/secure-names.html"].
[]
null
5.4
null
null
GHSA-vwgg-2q82-38c5
Solon is vulnerable to Deserialization of Untrusted Data
Ssolon <= 2.6.0 and <=2.5.12 is vulnerable to Deserialization of Untrusted Data.
[]
null
9.8
null
null
RHSA-2019:0364
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 on RHEL 6 security update
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
5.3
null
CVE-2009-0180
Certain Fedora build scripts for nfs-utils before 1.1.2-9.fc9 on Fedora 9, and before 1.1.4-6.fc10 on Fedora 10, omit TCP Wrapper support, which might allow remote attackers to bypass intended access restrictions, possibly a related issue to CVE-2008-1376.
[ "cpe:2.3:a:nfs:nfs-utils:*:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.7:pre-1:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.7:pre-2:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-1:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-2:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-3:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-4:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.1.0:rc-1:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora:9:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nfs:nfs-utils:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora:10:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-23862
Cross-Site Scripting (XSS) vulnerability in Cups Easy
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grndisplay.php, in the grnno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[ "cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*" ]
null
8.2
null
null
CVE-2021-46914
ixgbe: fix unbalanced device enable/disable in suspend/resume
In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix unbalanced device enable/disable in suspend/resume pci_disable_device() called in __ixgbe_shutdown() decreases dev->enable_cnt by 1. pci_enable_device_mem() which increases dev->enable_cnt by 1, was removed from ixgbe_resume() in commit 6f82b2558735 ("ixgbe: use generic power management"). This caused unbalanced increase/decrease. So add pci_enable_device_mem() back. Fix the following call trace. ixgbe 0000:17:00.1: disabling already-disabled device Call Trace: __ixgbe_shutdown+0x10a/0x1e0 [ixgbe] ixgbe_suspend+0x32/0x70 [ixgbe] pci_pm_suspend+0x87/0x160 ? pci_pm_freeze+0xd0/0xd0 dpm_run_callback+0x42/0x170 __device_suspend+0x114/0x460 async_suspend+0x1f/0xa0 async_run_entry_fn+0x3c/0xf0 process_one_work+0x1dd/0x410 worker_thread+0x34/0x3f0 ? cancel_delayed_work+0x90/0x90 kthread+0x14c/0x170 ? kthread_park+0x90/0x90 ret_from_fork+0x1f/0x30
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-6g23-6jw5-9vrf
PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own.
[]
null
null
null
null
CVE-2003-0778
saned in sane-backends 1.0.7 and earlier, and possibly later versions, does not properly allocate memory in certain cases, which could allow attackers to cause a denial of service (memory consumption).
[ "cpe:2.3:a:sane:sane:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.7_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.7_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:sane:sane-backend:1.0.10:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-r6w3-g3f4-466h
Buffer overflow in Lotus Domino Mail Server 5.0.5 and earlier allows a remote attacker to crash the server or execute arbitrary code via a long "RCPT TO" command.
[]
null
null
null
null
CVE-2020-23834
Insecure Service File Permissions in the bd service in Real Time Logic BarracudaDrive v6.5 allow local attackers to escalate privileges to admin by replacing the %SYSTEMDRIVE%\bd\bd.exe file. When the computer next starts, the new bd.exe will be run as LocalSystem.
[ "cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-3w66-96j7-fmcp
The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT.
[]
null
null
null
null
CVE-2014-7884
Multiple unspecified vulnerabilities in HP ArcSight Logger before 6.0P1 have unknown impact and remote authenticated attack vectors.
[ "cpe:2.3:a:hp:arcsight_logger:6.0:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2022-25390
DCN Firewall DCME-520 was discovered to contain a remote command execution (RCE) vulnerability via the host parameter in the file /system/tool/ping.php.
[ "cpe:2.3:o:dcnglobal:dcme-520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dcnglobal:dcme-520:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2016-10994
The Truemag theme 2016 Q2 for WordPress has XSS via the s parameter.
[ "cpe:2.3:a:truemag_theme_project:truemag_theme:2016_q2:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
GHSA-jph8-h7wq-4r8p
A vulnerability in the web-based management interface of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
6.1
null
null
GHSA-w94w-cg39-6r6h
The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com.
[]
null
null
null
null
GHSA-vppj-mhmw-vqvx
An issue was discovered on Samsung mobile devices with N(7.x) (MT6755/MT6757 Mediatek models) software. Bootloader has an integer overflow that leads to arbitrary code execution via the download offset control. The Samsung ID is SVE-2017-10732 (January 2018).
[]
null
null
null
null
CVE-2004-2420
Hitachi Job Management Partner (JP1) JP1/File Transmission Server/FTP 6 and 7 allows remote attackers to cause a denial of service (daemon halt) via a port scan involving reset packets.
[ "cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_00_h:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_01_d:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_02-b:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_02_c:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1b41-9471:07_00_a:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1b41-9471:07_10:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1b41-9471:07_10_a:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1j41-9471:07_00:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1j41-9471:07_10:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:jp1_p-1j41-9471:07_10_a:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-f57m-fvgm-36q5
Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files.
[]
null
null
null
null
CVE-2023-37719
Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromP2pListFilter.
[ "cpe:2.3:h:tenda:f1202:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:f1202_firmware:1.2.0.20\\(408\\):*:*:*:*:*:*:*", "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.19_en:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:f1202_firmware:1.0br:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:pa202_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:pa202:-:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:pw201a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:pw201a:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-mw23-8m9f-c29g
Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11.
[]
null
null
null
null
CVE-2018-5012
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
RHSA-2023:6837
Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update
golang.org/x/net/html: Cross site scripting golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
GHSA-p95h-29v8-j2h6
A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. Malformed content added to the issue description could have been used to trigger high CPU usage.
[]
null
7.5
null
null
GHSA-g5gx-5qf2-m4gh
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[]
null
7.2
null
null
CVE-2024-44964
idpf: fix memory leaks and crashes while performing a soft reset
In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leaks and crashes while performing a soft reset The second tagged commit introduced a UAF, as it removed restoring q_vector->vport pointers after reinitializating the structures. This is due to that all queue allocation functions are performed here with the new temporary vport structure and those functions rewrite the backpointers to the vport. Then, this new struct is freed and the pointers start leading to nowhere. But generally speaking, the current logic is very fragile. It claims to be more reliable when the system is low on memory, but in fact, it consumes two times more memory as at the moment of running this function, there are two vports allocated with their queues and vectors. Moreover, it claims to prevent the driver from running into "bad state", but in fact, any error during the rebuild leaves the old vport in the partially allocated state. Finally, if the interface is down when the function is called, it always allocates a new queue set, but when the user decides to enable the interface later on, vport_open() allocates them once again, IOW there's a clear memory leak here. Just don't allocate a new queue set when performing a reset, that solves crashes and memory leaks. Readd the old queue number and reopen the interface on rollback - that solves limbo states when the device is left disabled and/or without HW queues enabled.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-45081
IBM Cognos Controller incorrect authorization
IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 could allow an authenticated user to modify restricted content due to incorrect authorization checks.
[]
null
6.5
null
null
GHSA-mqvh-83g7-mc9g
The search and replay servers in IBM Tealeaf Customer Experience 8.0 through 9.0.2 allow remote attackers to bypass authentication via unspecified vectors. IBM X-Force ID: 105896.
[]
null
null
6.5
null
GHSA-r76h-m46c-jfwg
MauryCMS 0.53.2 and earlier does not require administrative authentication for Editors/fckeditor/editor/filemanager/browser/default/browser.html, which allows remote attackers to upload arbitrary files via a direct request.
[]
null
null
null
null
CVE-2024-9462
Poll Maker – Versus Polls, Anonymous Polls, Image Polls <= 5.4.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via Poll Settings
The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Stored Cross-Site Scripting via poll settings in all versions up to, and including, 5.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
5.5
null
null
GHSA-wwv6-9vqw-fwxx
An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.
[]
null
null
null
null
GHSA-4g9c-v26v-gp27
Inappropriate implementation in Background Fetch API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
[]
null
5.4
null
null
CVE-2023-48522
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2018-1000824
MegaMek version < v0.45.1 contains a Other/Unknown vulnerability in Object Stream Connection that can result in Disclosure of confidential data, denial of service, SSRF, remote code execution.
[ "cpe:2.3:a:megamek:megamek:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-pcxx-29j4-gxjh
The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
[]
null
null
null
null
CVE-2015-3374
Multiple cross-site request forgery (CSRF) vulnerabilities in the Corner module for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable or (2) disable corners via unspecified vectors.
[ "cpe:2.3:a:corner_project:corner:-:*:*:*:*:drupal:*:*" ]
null
null
null
5.8
CVE-2008-0489
Directory traversal vulnerability in install.php in Clansphere 2007.4.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
[ "cpe:2.3:a:clansphere:clansphere:2007.4.4:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-p2wg-8h29-874v
Drupal Link field display mode formatter Cross-Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Link field display mode formatter allows Cross-Site Scripting (XSS). This issue affects Link field display mode formatter: from 0.0.0 before 1.6.0.
[]
1.3
6.1
null
null
GHSA-fr2h-5mph-34mj
pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash'].
[]
null
null
null
null
CVE-2020-27147
TIBCO PartnerExpress REST API
The REST API component of TIBCO Software Inc.'s TIBCO PartnerExpress contains a vulnerability that theoretically allows an unauthenticated attacker with network access to obtain an authenticated login URL for the affected system via a REST API. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: version 6.2.0.
[ "cpe:2.3:a:tibco:partnerexpress:6.2.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-cjfr-9f5r-3q93
TYPO3 Cross-Site Request Forgery in Log Module
ProblemA vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method.Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions:the user opens a malicious link, such as one sent via email.the user visits a compromised or manipulated website while the following settings are misconfigured:`security.backend.enforceReferrer` feature is disabled,`BE/cookieSameSite` configuration is set to `lax` or `none`The vulnerability in the affected downstream component “Log Module” allows attackers to remove log entries.SolutionUpdate to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.CreditsThanks to Gabriel Dimitrov who reported this issue and to TYPO3 core and security members Benjamin Franzke, Oliver Hader, Andreas Kienast, Torben Hansen, Elias Häußler who fixed the issue.References[TYPO3-CORE-SA-2025-003](https://typo3.org/security/advisory/typo3-core-sa-2025-003)
[]
null
4.3
null
null
CVE-2006-2183
Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount command.
[ "cpe:2.3:a:truecrypt_foundation:truecrypt:4.1:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-jw37-w32x-m633
SQL injection vulnerability in the Mad4Joomla Mailforms (com_mad4joomla) component before 1.1.8.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the jid parameter to index.php.
[]
null
null
null
null
CVE-2021-24717
AutomatorWP < 1.7.6 - Missing Authorization and Privilege Escalation
The AutomatorWP WordPress plugin before 1.7.6 does not perform capability checks which allows users with Subscriber roles to enumerate automations, disclose title of private posts or user emails, call functions, or perform privilege escalation via Ajax actions.
[ "cpe:2.3:a:automatorwp:automatorwp:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
6.5
CVE-2021-43097
A Server-side Template Injection (SSTI) vulnerability exists in bbs 5.3 in TemplateManageAction.javawhich could let a malicoius user execute arbitrary code.
[ "cpe:2.3:a:diyhi:bbs:5.3:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
GHSA-jvjw-9wvw-vw24
Western Digital My Cloud EX2 Ultra firmware 2.31.183 allows web users (including guest account) to remotely execute arbitrary code via a stack-based buffer overflow. There is no size verification logic in one of functions in libscheddl.so, and download_mgr.cgi makes it possible to enter large-sized f_idx inputs.
[]
null
null
null
null
GHSA-fjvh-mchr-664c
A read-only authentication bypass vulnerability was reported in the Third Quarter 2021 release of Lenovo XClarity Controller (XCC) firmware affecting XCC devices configured in LDAP Authentication Only Mode and using an LDAP server that supports “unauthenticated bind”, such as Microsoft Active Directory. An unauthenticated user can gain read-only access to XCC in such a configuration, thereby allowing the XCC device configuration to be viewed but not changed. XCC devices configured to use local authentication, LDAP Authentication + Authorization Mode, or LDAP servers that support only “authenticated bind” and/or “anonymous bind” are not affected.
[]
null
5.3
null
null
CVE-1999-0836
UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack.
[ "cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2021-20044
A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
[ "cpe:2.3:o:sonicwall:sma_200_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_200_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_210_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_210_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_410_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_410_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_400_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_400_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
GHSA-wpm5-fh4f-wr9q
The Forminator – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.13.4. This is due to missing or incorrect nonce validation on the listen_for_saving_export_schedule() function. This makes it possible for unauthenticated attackers to export form submissions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
5.4
null
null
CVE-2023-38666
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4encrypt.
[ "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-wmgr-g86h-2x5r
Cross-Site Request Forgery (CSRF) vulnerability in Zorem Advanced Shipment Tracking for WooCommerce plugin <= 3.5.2 versions.
[]
null
4.3
null
null
GHSA-7vgj-gmp4-h3w6
Security Onion Solutions Squert version 1.0.1 through 1.6.7 contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in .inc/callback.php that can result in execution of OS Commands. This attack appear to be exploitable via Web request to .inc/callback.php with the payload in the txdata parameter, used in tx()/transcript(), or the catdata parameter, used in cat(). This vulnerability appears to have been fixed in 1.7.0.
[]
null
null
9.8
null
CVE-2021-35063
Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
[ "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2017-10844
baserCMS 3.0.14 and earlier, 4.0.5 and earlier allows an attacker to execute arbitrary PHP code on the server via unspecified vectors.
[ "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-m595-3vgf-8pqg
Cross-site request forgery (CSRF) vulnerability in IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors. IBM X-Force ID: 111736.
[]
null
null
8.8
null
CVE-2022-2879
Unbounded memory consumption when reading headers in archive/tar
Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.
[ "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-9wph-276j-gvg9
Directory traversal vulnerability in acp/index.php in AneCMS allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter.
[]
null
null
null
null
CVE-2007-3876
Stack-based buffer overflow in SMB in Apple Mac OS X 10.4.11 allows local users to execute arbitrary code via (1) a long workgroup (-W) option to mount_smbfs or (2) an unspecified manipulation of the command line to smbutil.
[ "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*" ]
null
null
null
6.6
CVE-2014-6822
The Nerdico (aka com.nerdico.danielepais) application 1.9 Stable for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:nerdico_project:nerdico:1.9:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-ppm7-4pw6-8xq9
Double free vulnerability in Apple iOS before 9.1 and OS X before 10.11.1 allows attackers to write to arbitrary files via a crafted app that accesses AtomicBufferedFile descriptors.
[]
null
null
null
null
RHSA-2024:1487
Red Hat Security Advisory: firefox security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
CVE-2007-1617
SQL injection vulnerability in index.php in ScriptMagix Recipes 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter.
[ "cpe:2.3:a:scriptmagix:scriptmagix_recipes:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-2279
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM.
[ "cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*" ]
null
9.9
null
6.5
RHSA-2022:0163
Red Hat Security Advisory: Cryostat security update
golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:cryostat:2::el8" ]
null
7.5
null
null
CVE-2022-30016
Rescue Dispatch Management System 1.0 is vulnerable to Incorrect Access Control via http://localhost/rdms/admin/?page=system_info.
[ "cpe:2.3:a:rescue_dispatch_management_system_project:rescue_dispatch_management_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2025-4191
PHPGurukul Employee Record Management System editmyeducation.php sql injection
A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /editmyeducation.php. The manipulation of the argument coursepg/yophsc leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
6.9
7.3
7.3
7.5
GHSA-g83h-qmpp-jpwq
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected.
[]
null
8.8
null
null
GHSA-j63x-3p7v-q64j
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Agent Evolution IMPress Listings plugin <= 2.6.2 versions.
[]
null
6.5
null
null
GHSA-v3w7-82hc-2c6w
Directory traversal vulnerability in index.php in IDevSpot iSupport 1.8 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter.
[]
null
null
null
null
GHSA-f927-34r4-vxxw
CRMEB <=5.4.0 is vulnerable to Incorrect Access Control. Users can bypass the front-end restriction of only being able to claim coupons once by capturing packets and sending a large number of data packets for coupon collection, achieving unlimited coupon collection.
[]
null
7.5
null
null
RHSA-2025:7544
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Privilege escalation in Firefox Updater firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames firefox: thunderbird: Unsafe attribute access during XPath parsing firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2012:0074
Red Hat Security Advisory: jbossweb security update
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
CVE-2024-37678
Cross Site Scripting vulnerability in Hangzhou Meisoft Information Technology Co., Ltd. Finesoft v.8.0 and before allows a remote attacker to execute arbitrary code via a crafted script.
[ "cpe:2.3:a:hangzhou_meisoft_information_technology:finesoft:8.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2012-2908
Multiple SQL injection vulnerabilities in admin/bbcodes.php in Viscacha 0.8.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) bbcodeexample, (2) buttonimage, or (3) bbcodetag parameter.
[ "cpe:2.3:a:viscacha:viscacha:0.8.1.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2010:0333
Red Hat Security Advisory: seamonkey security update
Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-2rwp-q9wg-42qm
A vulnerability classified as critical was found in Arthmoor QSF-Portal. This vulnerability affects unknown code of the file index.php. The manipulation of the argument a leads to path traversal. The name of the patch is ea4f61e23ecb83247d174bc2e2cbab521c751a7d. It is recommended to apply a patch to fix this issue. VDB-217558 is the identifier assigned to this vulnerability.
[]
null
5.3
null
null
GHSA-m8j6-8cc3-4c4f
SQL injection vulnerability in detail.php in the Dictionary module for XOOPS 2.0.18 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
GHSA-75hg-8v8m-22xg
Missing Authorization vulnerability in YummyWP Smart WooCommerce Search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart WooCommerce Search: from n/a through 2.5.0.
[]
null
4.3
null
null
GHSA-8whf-2phw-rrxr
Unspecified vulnerability in BES before 3.5.0 in OPeNDAP 4 (Hydrax) before 1.2.1 allows remote attackers to list filesystem contents and obtain sensitive information via unknown vectors.
[]
null
null
null
null
CVE-2020-11545
Project Worlds Official Car Rental System 1 is vulnerable to multiple SQL injection issues, as demonstrated by the email and parameters (account.php), uname and pass parameters (login.php), and id parameter (book_car.php) This allows an attacker to dump the MySQL database and to bypass the login authentication prompt.
[ "cpe:2.3:a:projectworlds:official_car_rental_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5