id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-w8mg-g59g-ww6x | In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Additional check in ntfs_file_release | []
| null | 7.8 | null | null |
|
RHSA-2020:3714 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Push diary crash on specifically crafted HTTP/2 header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
CVE-2023-1565 | FeiFeiCMS Extension Tool slide_add.html cross site scripting | A vulnerability was found in FeiFeiCMS 2.7.130201. It has been classified as problematic. This affects an unknown part of the file \Public\system\slide_add.html of the component Extension Tool. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223557 was assigned to this vulnerability. | [
"cpe:2.3:a:feifeicms:feifeicms:2.7.130201:*:*:*:*:*:*:*"
]
| null | 3.5 | 3.5 | 4 |
RHSA-2023:3931 | Red Hat Security Advisory: python27:2.7 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 7.5 | null | null |
CVE-2020-15496 | Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions. | [
"cpe:2.3:a:acronis:true_image:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:acronis:true_image:2021:-:*:*:*:macos:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:macos:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:macos:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:macos:*:*"
]
| null | 7.8 | null | 4.6 |
|
GHSA-37gh-342p-m59x | Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality. | []
| null | 7.5 | null | null |
|
GHSA-4rmw-pqrq-m8x7 | IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157. | []
| null | null | null | null |
|
GHSA-fj85-3hpv-97rg | Improper Control of Generation of Code ('Code Injection') vulnerability in WP Sharks s2Member Pro allows Code Injection.This issue affects s2Member Pro: from n/a through 241114. | []
| null | 9 | null | null |
|
GHSA-789g-f8cr-fh2g | Stack-based buffer overflow in the OpenType Compact Font Format (aka OTF or CFF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted parameter values in an OpenType font, aka "OpenType Font Stack Overflow Vulnerability." | []
| null | null | null | null |
|
CVE-2021-32792 | XSS vulnerability when using OIDCPreservePost On in mod_auth_openidc | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`. | [
"cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
]
| null | 3.1 | null | null |
CVE-2025-1285 | Resido - Real Estate WordPress Theme <= 3.6 - Missing Authorization to Unauthenticated Server-Side Request Forgery and API Key Settings Update | The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details. | []
| null | 5.3 | null | null |
CVE-2015-8511 | Race condition in the lockscreen feature in Mozilla Firefox OS before 2.5 allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. | [
"cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*"
]
| null | null | 6.4 | 6.9 |
|
GHSA-9229-f3q3-427j | IBM Lotus Sametime 8.5.2 and 8.5.2.1 allows remote attackers to cause a denial of service (WebPlayer Firefox extension crash) via a crafted Audio Visual (AV) session. | []
| null | null | null | null |
|
CVE-2020-2510 | Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via OracleNet to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Core RDBMS. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
|
CVE-2025-26494 | Server Side Request Forgery vulnerability in Tableau Server | Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server allows Authentication Bypass.This issue affects Tableau Server: from 2023.3 through 2023.3.5. | []
| null | 7.7 | null | null |
CVE-2014-8346 | The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic. | [
"cpe:2.3:a:samsung:findmymobile:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:mobile:-:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-84x6-2366-7jjm | In the Linux kernel, the following vulnerability has been resolved:stm class: Fix a double free in stm_register_device()The put_device(&stm->dev) call will trigger stm_device_release() which
frees "stm" so the vfree(stm) on the next line is a double free. | []
| null | 7.8 | null | null |
|
CVE-2024-6056 | nasirkhan Laravel Starter Password Reset forgot-password observable response discrepancy | A vulnerability was found in nasirkhan Laravel Starter up to 11.8.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /forgot-password of the component Password Reset Handler. The manipulation of the argument Email leads to observable response discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268784. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:nasirkhan:laravel_starter:*:*:*:*:*:*:*:*"
]
| 6.3 | 3.7 | 3.7 | 2.6 |
GHSA-q4v4-q7v7-cvq2 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Wolfgang Ertl weebotLite plugin <= 1.0.0 versions. | []
| null | 5.9 | null | null |
|
cisco-sa-sna-xss-mCA9tQnJ | Cisco Secure Network Analytics Network Diagrams Application Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of the Network Diagrams application for Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure ["https://www.cisco.com/c/en/us/products/security/secure-names.html"]. | []
| null | 5.4 | null | null |
GHSA-vwgg-2q82-38c5 | Solon is vulnerable to Deserialization of Untrusted Data | Ssolon <= 2.6.0 and <=2.5.12 is vulnerable to Deserialization of Untrusted Data. | []
| null | 9.8 | null | null |
RHSA-2019:0364 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 on RHEL 6 security update | wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
]
| null | null | 5.3 | null |
CVE-2009-0180 | Certain Fedora build scripts for nfs-utils before 1.1.2-9.fc9 on Fedora 9, and before 1.1.4-6.fc10 on Fedora 10, omit TCP Wrapper support, which might allow remote attackers to bypass intended access restrictions, possibly a related issue to CVE-2008-1376. | [
"cpe:2.3:a:nfs:nfs-utils:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.7:pre-1:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.7:pre-2:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-1:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-2:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-3:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-4:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.1.0:rc-1:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora:9:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nfs:nfs-utils:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora:10:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-23862 | Cross-Site Scripting (XSS) vulnerability in Cups Easy | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grndisplay.php, in the grnno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials. | [
"cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*"
]
| null | 8.2 | null | null |
CVE-2021-46914 | ixgbe: fix unbalanced device enable/disable in suspend/resume | In the Linux kernel, the following vulnerability has been resolved:
ixgbe: fix unbalanced device enable/disable in suspend/resume
pci_disable_device() called in __ixgbe_shutdown() decreases
dev->enable_cnt by 1. pci_enable_device_mem() which increases
dev->enable_cnt by 1, was removed from ixgbe_resume() in commit
6f82b2558735 ("ixgbe: use generic power management"). This caused
unbalanced increase/decrease. So add pci_enable_device_mem() back.
Fix the following call trace.
ixgbe 0000:17:00.1: disabling already-disabled device
Call Trace:
__ixgbe_shutdown+0x10a/0x1e0 [ixgbe]
ixgbe_suspend+0x32/0x70 [ixgbe]
pci_pm_suspend+0x87/0x160
? pci_pm_freeze+0xd0/0xd0
dpm_run_callback+0x42/0x170
__device_suspend+0x114/0x460
async_suspend+0x1f/0xa0
async_run_entry_fn+0x3c/0xf0
process_one_work+0x1dd/0x410
worker_thread+0x34/0x3f0
? cancel_delayed_work+0x90/0x90
kthread+0x14c/0x170
? kthread_park+0x90/0x90
ret_from_fork+0x1f/0x30 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-6g23-6jw5-9vrf | PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own. | []
| null | null | null | null |
|
CVE-2003-0778 | saned in sane-backends 1.0.7 and earlier, and possibly later versions, does not properly allocate memory in certain cases, which could allow attackers to cause a denial of service (memory consumption). | [
"cpe:2.3:a:sane:sane:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.7_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.7_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sane:sane-backend:1.0.10:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-r6w3-g3f4-466h | Buffer overflow in Lotus Domino Mail Server 5.0.5 and earlier allows a remote attacker to crash the server or execute arbitrary code via a long "RCPT TO" command. | []
| null | null | null | null |
|
CVE-2020-23834 | Insecure Service File Permissions in the bd service in Real Time Logic BarracudaDrive v6.5 allow local attackers to escalate privileges to admin by replacing the %SYSTEMDRIVE%\bd\bd.exe file. When the computer next starts, the new bd.exe will be run as LocalSystem. | [
"cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-3w66-96j7-fmcp | The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT. | []
| null | null | null | null |
|
CVE-2014-7884 | Multiple unspecified vulnerabilities in HP ArcSight Logger before 6.0P1 have unknown impact and remote authenticated attack vectors. | [
"cpe:2.3:a:hp:arcsight_logger:6.0:*:*:*:*:*:*:*"
]
| null | null | null | 9 |
|
CVE-2022-25390 | DCN Firewall DCME-520 was discovered to contain a remote command execution (RCE) vulnerability via the host parameter in the file /system/tool/ping.php. | [
"cpe:2.3:o:dcnglobal:dcme-520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dcnglobal:dcme-520:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2016-10994 | The Truemag theme 2016 Q2 for WordPress has XSS via the s parameter. | [
"cpe:2.3:a:truemag_theme_project:truemag_theme:2016_q2:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-jph8-h7wq-4r8p | A vulnerability in the web-based management interface of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | []
| null | 6.1 | null | null |
|
GHSA-w94w-cg39-6r6h | The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com. | []
| null | null | null | null |
|
GHSA-vppj-mhmw-vqvx | An issue was discovered on Samsung mobile devices with N(7.x) (MT6755/MT6757 Mediatek models) software. Bootloader has an integer overflow that leads to arbitrary code execution via the download offset control. The Samsung ID is SVE-2017-10732 (January 2018). | []
| null | null | null | null |
|
CVE-2004-2420 | Hitachi Job Management Partner (JP1) JP1/File Transmission Server/FTP 6 and 7 allows remote attackers to cause a denial of service (daemon halt) via a port scan involving reset packets. | [
"cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_00_h:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_01_d:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_02-b:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1b41-9461:06_02_c:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1b41-9471:07_00_a:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1b41-9471:07_10:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1b41-9471:07_10_a:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1j41-9471:07_00:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1j41-9471:07_10:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachi:jp1_p-1j41-9471:07_10_a:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-f57m-fvgm-36q5 | Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. | []
| null | null | null | null |
|
CVE-2023-37719 | Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromP2pListFilter. | [
"cpe:2.3:h:tenda:f1202:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:f1202_firmware:1.2.0.20\\(408\\):*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:fh1202_firmware:1.2.0.19_en:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:f1202_firmware:1.0br:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:pa202_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:pa202:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:pw201a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:pw201a:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-mw23-8m9f-c29g | Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11. | []
| null | null | null | null |
|
CVE-2018-5012 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
RHSA-2023:6837 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update | golang.org/x/net/html: Cross site scripting golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 7.5 | null | null |
GHSA-p95h-29v8-j2h6 | A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. Malformed content added to the issue description could have been used to trigger high CPU usage. | []
| null | 7.5 | null | null |
|
GHSA-g5gx-5qf2-m4gh | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | []
| null | 7.2 | null | null |
|
CVE-2024-44964 | idpf: fix memory leaks and crashes while performing a soft reset | In the Linux kernel, the following vulnerability has been resolved:
idpf: fix memory leaks and crashes while performing a soft reset
The second tagged commit introduced a UAF, as it removed restoring
q_vector->vport pointers after reinitializating the structures.
This is due to that all queue allocation functions are performed here
with the new temporary vport structure and those functions rewrite
the backpointers to the vport. Then, this new struct is freed and
the pointers start leading to nowhere.
But generally speaking, the current logic is very fragile. It claims
to be more reliable when the system is low on memory, but in fact, it
consumes two times more memory as at the moment of running this
function, there are two vports allocated with their queues and vectors.
Moreover, it claims to prevent the driver from running into "bad state",
but in fact, any error during the rebuild leaves the old vport in the
partially allocated state.
Finally, if the interface is down when the function is called, it always
allocates a new queue set, but when the user decides to enable the
interface later on, vport_open() allocates them once again, IOW there's
a clear memory leak here.
Just don't allocate a new queue set when performing a reset, that solves
crashes and memory leaks. Readd the old queue number and reopen the
interface on rollback - that solves limbo states when the device is left
disabled and/or without HW queues enabled. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2024-45081 | IBM Cognos Controller incorrect authorization | IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0
could allow an authenticated user to modify restricted content due to incorrect authorization checks. | []
| null | 6.5 | null | null |
GHSA-mqvh-83g7-mc9g | The search and replay servers in IBM Tealeaf Customer Experience 8.0 through 9.0.2 allow remote attackers to bypass authentication via unspecified vectors. IBM X-Force ID: 105896. | []
| null | null | 6.5 | null |
|
GHSA-r76h-m46c-jfwg | MauryCMS 0.53.2 and earlier does not require administrative authentication for Editors/fckeditor/editor/filemanager/browser/default/browser.html, which allows remote attackers to upload arbitrary files via a direct request. | []
| null | null | null | null |
|
CVE-2024-9462 | Poll Maker – Versus Polls, Anonymous Polls, Image Polls <= 5.4.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via Poll Settings | The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Stored Cross-Site Scripting via poll settings in all versions up to, and including, 5.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | []
| null | 5.5 | null | null |
GHSA-wwv6-9vqw-fwxx | An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource. | []
| null | null | null | null |
|
GHSA-4g9c-v26v-gp27 | Inappropriate implementation in Background Fetch API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) | []
| null | 5.4 | null | null |
|
CVE-2023-48522 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
CVE-2018-1000824 | MegaMek version < v0.45.1 contains a Other/Unknown vulnerability in Object Stream Connection that can result in Disclosure of confidential data, denial of service, SSRF, remote code execution. | [
"cpe:2.3:a:megamek:megamek:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-pcxx-29j4-gxjh | The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location. | []
| null | null | null | null |
|
CVE-2015-3374 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Corner module for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable or (2) disable corners via unspecified vectors. | [
"cpe:2.3:a:corner_project:corner:-:*:*:*:*:drupal:*:*"
]
| null | null | null | 5.8 |
|
CVE-2008-0489 | Directory traversal vulnerability in install.php in Clansphere 2007.4.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter. | [
"cpe:2.3:a:clansphere:clansphere:2007.4.4:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-p2wg-8h29-874v | Drupal Link field display mode formatter Cross-Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Link field display mode formatter allows Cross-Site Scripting (XSS). This issue affects Link field display mode formatter: from 0.0.0 before 1.6.0. | []
| 1.3 | 6.1 | null | null |
GHSA-fr2h-5mph-34mj | pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash']. | []
| null | null | null | null |
|
CVE-2020-27147 | TIBCO PartnerExpress REST API | The REST API component of TIBCO Software Inc.'s TIBCO PartnerExpress contains a vulnerability that theoretically allows an unauthenticated attacker with network access to obtain an authenticated login URL for the affected system via a REST API. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: version 6.2.0. | [
"cpe:2.3:a:tibco:partnerexpress:6.2.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
GHSA-cjfr-9f5r-3q93 | TYPO3 Cross-Site Request Forgery in Log Module | ProblemA vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method.Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions:the user opens a malicious link, such as one sent via email.the user visits a compromised or manipulated website while the following settings are misconfigured:`security.backend.enforceReferrer` feature is disabled,`BE/cookieSameSite` configuration is set to `lax` or `none`The vulnerability in the affected downstream component “Log Module” allows attackers to remove log entries.SolutionUpdate to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.CreditsThanks to Gabriel Dimitrov who reported this issue and to TYPO3 core and security members Benjamin Franzke, Oliver Hader, Andreas Kienast, Torben Hansen, Elias Häußler who fixed the issue.References[TYPO3-CORE-SA-2025-003](https://typo3.org/security/advisory/typo3-core-sa-2025-003) | []
| null | 4.3 | null | null |
CVE-2006-2183 | Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount command. | [
"cpe:2.3:a:truecrypt_foundation:truecrypt:4.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
GHSA-jw37-w32x-m633 | SQL injection vulnerability in the Mad4Joomla Mailforms (com_mad4joomla) component before 1.1.8.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the jid parameter to index.php. | []
| null | null | null | null |
|
CVE-2021-24717 | AutomatorWP < 1.7.6 - Missing Authorization and Privilege Escalation | The AutomatorWP WordPress plugin before 1.7.6 does not perform capability checks which allows users with Subscriber roles to enumerate automations, disclose title of private posts or user emails, call functions, or perform privilege escalation via Ajax actions. | [
"cpe:2.3:a:automatorwp:automatorwp:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | 6.5 |
CVE-2021-43097 | A Server-side Template Injection (SSTI) vulnerability exists in bbs 5.3 in TemplateManageAction.javawhich could let a malicoius user execute arbitrary code. | [
"cpe:2.3:a:diyhi:bbs:5.3:*:*:*:*:*:*:*"
]
| null | 7.2 | null | 6.5 |
|
GHSA-jvjw-9wvw-vw24 | Western Digital My Cloud EX2 Ultra firmware 2.31.183 allows web users (including guest account) to remotely execute arbitrary code via a stack-based buffer overflow. There is no size verification logic in one of functions in libscheddl.so, and download_mgr.cgi makes it possible to enter large-sized f_idx inputs. | []
| null | null | null | null |
|
GHSA-fjvh-mchr-664c | A read-only authentication bypass vulnerability was reported in the Third Quarter 2021 release of Lenovo XClarity Controller (XCC) firmware affecting XCC devices configured in LDAP Authentication Only Mode and using an LDAP server that supports “unauthenticated bind”, such as Microsoft Active Directory. An unauthenticated user can gain read-only access to XCC in such a configuration, thereby allowing the XCC device configuration to be viewed but not changed. XCC devices configured to use local authentication, LDAP Authentication + Authorization Mode, or LDAP servers that support only “authenticated bind” and/or “anonymous bind” are not affected. | []
| null | 5.3 | null | null |
|
CVE-1999-0836 | UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack. | [
"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2021-20044 | A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. | [
"cpe:2.3:o:sonicwall:sma_200_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_200_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_210_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_210_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_410_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_410_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_400_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_400_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sma_500v_firmware:10.2.1.1-19sv:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 9 |
|
GHSA-wpm5-fh4f-wr9q | The Forminator – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.13.4. This is due to missing or incorrect nonce validation on the listen_for_saving_export_schedule() function. This makes it possible for unauthenticated attackers to export form submissions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 5.4 | null | null |
|
CVE-2023-38666 | Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4encrypt. | [
"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-wmgr-g86h-2x5r | Cross-Site Request Forgery (CSRF) vulnerability in Zorem Advanced Shipment Tracking for WooCommerce plugin <= 3.5.2 versions. | []
| null | 4.3 | null | null |
|
GHSA-7vgj-gmp4-h3w6 | Security Onion Solutions Squert version 1.0.1 through 1.6.7 contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in .inc/callback.php that can result in execution of OS Commands. This attack appear to be exploitable via Web request to .inc/callback.php with the payload in the txdata parameter, used in tx()/transcript(), or the catdata parameter, used in cat(). This vulnerability appears to have been fixed in 1.7.0. | []
| null | null | 9.8 | null |
|
CVE-2021-35063 | Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion." | [
"cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2017-10844 | baserCMS 3.0.14 and earlier, 4.0.5 and earlier allows an attacker to execute arbitrary PHP code on the server via unspecified vectors. | [
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.5 |
|
GHSA-m595-3vgf-8pqg | Cross-site request forgery (CSRF) vulnerability in IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors. IBM X-Force ID: 111736. | []
| null | null | 8.8 | null |
|
CVE-2022-2879 | Unbounded memory consumption when reading headers in archive/tar | Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB. | [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-9wph-276j-gvg9 | Directory traversal vulnerability in acp/index.php in AneCMS allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter. | []
| null | null | null | null |
|
CVE-2007-3876 | Stack-based buffer overflow in SMB in Apple Mac OS X 10.4.11 allows local users to execute arbitrary code via (1) a long workgroup (-W) option to mount_smbfs or (2) an unspecified manipulation of the command line to smbutil. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*"
]
| null | null | null | 6.6 |
|
CVE-2014-6822 | The Nerdico (aka com.nerdico.danielepais) application 1.9 Stable for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:nerdico_project:nerdico:1.9:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
GHSA-ppm7-4pw6-8xq9 | Double free vulnerability in Apple iOS before 9.1 and OS X before 10.11.1 allows attackers to write to arbitrary files via a crafted app that accesses AtomicBufferedFile descriptors. | []
| null | null | null | null |
|
RHSA-2024:1487 | Red Hat Security Advisory: firefox security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
]
| null | 8.8 | null | null |
CVE-2007-1617 | SQL injection vulnerability in index.php in ScriptMagix Recipes 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter. | [
"cpe:2.3:a:scriptmagix:scriptmagix_recipes:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-2279 | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM. | [
"cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*"
]
| null | 9.9 | null | 6.5 |
|
RHSA-2022:0163 | Red Hat Security Advisory: Cryostat security update | golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:cryostat:2::el8"
]
| null | 7.5 | null | null |
CVE-2022-30016 | Rescue Dispatch Management System 1.0 is vulnerable to Incorrect Access Control via http://localhost/rdms/admin/?page=system_info. | [
"cpe:2.3:a:rescue_dispatch_management_system_project:rescue_dispatch_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.5 |
|
CVE-2025-4191 | PHPGurukul Employee Record Management System editmyeducation.php sql injection | A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /editmyeducation.php. The manipulation of the argument coursepg/yophsc leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | []
| 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-g83h-qmpp-jpwq | An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected. | []
| null | 8.8 | null | null |
|
GHSA-j63x-3p7v-q64j | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Agent Evolution IMPress Listings plugin <= 2.6.2 versions. | []
| null | 6.5 | null | null |
|
GHSA-v3w7-82hc-2c6w | Directory traversal vulnerability in index.php in IDevSpot iSupport 1.8 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter. | []
| null | null | null | null |
|
GHSA-f927-34r4-vxxw | CRMEB <=5.4.0 is vulnerable to Incorrect Access Control. Users can bypass the front-end restriction of only being able to claim coupons once by capturing packets and sending a large number of data packets for coupon collection, achieving unlimited coupon collection. | []
| null | 7.5 | null | null |
|
RHSA-2025:7544 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Privilege escalation in Firefox Updater firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames firefox: thunderbird: Unsafe attribute access during XPath parsing firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
]
| null | 8.8 | null | null |
RHSA-2012:0074 | Red Hat Security Advisory: jbossweb security update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
]
| null | null | null | null |
CVE-2024-37678 | Cross Site Scripting vulnerability in Hangzhou Meisoft Information Technology Co., Ltd. Finesoft v.8.0 and before allows a remote attacker to execute arbitrary code via a crafted script. | [
"cpe:2.3:a:hangzhou_meisoft_information_technology:finesoft:8.0:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2012-2908 | Multiple SQL injection vulnerabilities in admin/bbcodes.php in Viscacha 0.8.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) bbcodeexample, (2) buttonimage, or (3) bbcodetag parameter. | [
"cpe:2.3:a:viscacha:viscacha:0.8.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2010:0333 | Red Hat Security Advisory: seamonkey security update | Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
GHSA-2rwp-q9wg-42qm | A vulnerability classified as critical was found in Arthmoor QSF-Portal. This vulnerability affects unknown code of the file index.php. The manipulation of the argument a leads to path traversal. The name of the patch is ea4f61e23ecb83247d174bc2e2cbab521c751a7d. It is recommended to apply a patch to fix this issue. VDB-217558 is the identifier assigned to this vulnerability. | []
| null | 5.3 | null | null |
|
GHSA-m8j6-8cc3-4c4f | SQL injection vulnerability in detail.php in the Dictionary module for XOOPS 2.0.18 allows remote attackers to execute arbitrary SQL commands via the id parameter. | []
| null | null | null | null |
|
GHSA-75hg-8v8m-22xg | Missing Authorization vulnerability in YummyWP Smart WooCommerce Search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart WooCommerce Search: from n/a through 2.5.0. | []
| null | 4.3 | null | null |
|
GHSA-8whf-2phw-rrxr | Unspecified vulnerability in BES before 3.5.0 in OPeNDAP 4 (Hydrax) before 1.2.1 allows remote attackers to list filesystem contents and obtain sensitive information via unknown vectors. | []
| null | null | null | null |
|
CVE-2020-11545 | Project Worlds Official Car Rental System 1 is vulnerable to multiple SQL injection issues, as demonstrated by the email and parameters (account.php), uname and pass parameters (login.php), and id parameter (book_car.php) This allows an attacker to dump the MySQL database and to bypass the login authentication prompt. | [
"cpe:2.3:a:projectworlds:official_car_rental_system:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.