id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-f82j-r7r9-rwqc | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.7. | []
| null | 8.1 | null | null |
|
GHSA-h3pq-gc7r-6m6p | html/index.php in TorrentFlux 2.3 allows remote authenticated users to execute arbitrary code via a URL with a file containing an executable extension in the url_upload parameter, which is downloaded by TorrentFlux and can be accessed via a direct request in a html/downloads/ user directory. | []
| null | null | null | null |
|
RHSA-2008:0194 | Red Hat Security Advisory: xen security and bug fix update | xen xenmon.py / xenbaked insecure temporary file accesss QEMU Buffer overflow via crafted "net socket listen" option Qemu insufficient block device address range checking PVFB backend fails to validate frontend's framebuffer description PVFB SDL backend chokes on bogus screen updates qemu/kvm/xen: qemu block format auto-detection vulnerability | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2025-24544 | WordPress Bitcoin and Altcoin Wallets plugin <= 6.3.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexandros Georgiou Bitcoin and Altcoin Wallets allows Reflected XSS. This issue affects Bitcoin and Altcoin Wallets: from n/a through 6.3.1. | []
| null | 7.1 | null | null |
GHSA-xgf4-vh79-4g7j | IBM Security Verify Privilege On-Premises 11.5 does not validate, or incorrectly validates, a certificate which could disclose sensitive information which could aid further attacks against the system. IBM X-Force ID: 240455. | []
| null | 3.7 | null | null |
|
CVE-2021-3669 | A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_copy_data_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_protect_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:build_of_quarkus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-w9xp-gh5g-rf6p | Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by manipulating a symbolic link in the IOCTL interface. | []
| null | 7.8 | null | null |
|
CVE-2015-4035 | scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name. | [
"cpe:2.3:a:tukaani:xz:*:beta:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
CVE-2018-14868 | Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. | [
"cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*"
]
| null | null | 6.5 | 4 |
|
CVE-2023-2644 | DigitalPersona FPSensor DpHost.exe unquoted search path | A vulnerability, which was classified as problematic, has been found in DigitalPersona FPSensor 1.0.0.1. This issue affects some unknown processing of the file C:\Program Files (x86)\FPSensor\bin\DpHost.exe. The manipulation leads to unquoted search path. Attacking locally is a requirement. The identifier VDB-228773 was assigned to this vulnerability. | [
"cpe:2.3:a:digitalpersona_fpsensor_project:digitalpersona_fpsensor:1.0.0.1:*:*:*:*:*:*:*"
]
| null | 5.3 | 5.3 | 4.3 |
GHSA-hcq5-84v9-8hvq | The nelio-ab-testing plugin before 4.5.0 for WordPress has filename=..%2f directory traversal. | []
| null | null | null | null |
|
GHSA-c39h-g3mf-r3mh | A Prototype Pollution issue in getsetprop 1.1.0 allows an attacker to execute arbitrary code via global.accessor. | []
| null | 9.8 | null | null |
|
GHSA-q5jv-7j7q-rggq | Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka "System Center Operations Manager Web Console XSS Vulnerability," a different vulnerability than CVE-2013-0010. | []
| null | null | null | null |
|
CVE-2013-7020 | The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not properly enforce certain bit-count and colorspace constraints, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted FFV1 data. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-2qv5-7mw5-j3cg | spin-rs initialisation failure in `Once::try_call_once` can lead to undefined behaviour for other initialisers | `Once::try_call_once` is unsound if invoked more than once concurrently and any call fails to initialise successfully. | []
| null | null | null | null |
CVE-2000-0524 | Microsoft Outlook and Outlook Express allow remote attackers to cause a denial of service by sending email messages with blank fields such as BCC, Reply-To, Return-Path, or From. | [
"cpe:2.3:a:microsoft:exchange_server:4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:97:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-jf4r-vjvc-pj36 | An issue discovered in IXP Data Easy Install v.6.6.14884.0 allows local attackers to gain escalated privileges via weak encoding of sensitive information. | []
| null | 7.8 | null | null |
|
GHSA-7mph-p784-2x2p | Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr. | []
| null | null | null | null |
|
CVE-2007-0981 | Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:preview_release:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2016-1189 | Cybozu Garoon 3.x and 4.x before 4.2.1 allows remote authenticated users to bypass intended restrictions on reading, creating, or modifying a portlet via unspecified vectors. | [
"cpe:2.3:a:cybozu:garoon:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.2.0:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 5.5 |
|
CVE-2022-38227 | XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp. | [
"cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2023-3025 | The Dropbox Folder Share plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.9.7 via the 'link' parameter. This can allow unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | [
"cpe:2.3:a:hyno:dropbox_folder_share:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hynotech:dropbox_folder_share:*:*:*:*:*:wordpress:*:*"
]
| null | 7.2 | null | null |
|
CVE-2020-16297 | A buffer overflow vulnerability in FloydSteinbergDitheringC() in contrib/gdevbjca.c of Artifex Software GhostScript v9.18 to v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | [
"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
CVE-2020-13225 | phpIPAM 1.4 contains a stored cross site scripting (XSS) vulnerability within the Edit User Instructions field of the User Instructions widget. | [
"cpe:2.3:a:phpipam:phpipam:1.4:*:*:*:*:*:*:*"
]
| null | 4.8 | null | 3.5 |
|
ICSA-25-177-01 | Mitsubishi Electric Air Conditioning Systems | An authentication bypass vulnerability exists in Mitsubishi Electric air conditioning systems. An attacker may bypass authentication to control the air conditioning systems illegally or disclose information from them by exploiting this vulnerability. In addition, the attacker may tamper with the firmware of the affected products using the disclosed information. | []
| null | 9.8 | null | null |
GHSA-3jf5-fxfr-q6hw | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Parcel Panel ParcelPanel allows Reflected XSS.This issue affects ParcelPanel: from n/a through 4.3.2. | []
| null | 7.1 | null | null |
|
GHSA-j658-fjmg-478v | In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()The function gfx_v9_4_3_init_microcode in gfx_v9_4_3.c was generating
about potential truncation of output when using the snprintf function.
The issue was due to the size of the buffer 'ucode_prefix' being too
small to accommodate the maximum possible length of the string being
written into it.The string being written is "amdgpu/%s_mec.bin" or "amdgpu/%s_rlc.bin",
where %s is replaced by the value of 'chip_name'. The length of this
string without the %s is 16 characters. The warning message indicated
that 'chip_name' could be up to 29 characters long, resulting in a total
of 45 characters, which exceeds the buffer size of 30 characters.To resolve this issue, the size of the 'ucode_prefix' buffer has been
reduced from 30 to 15. This ensures that the maximum possible length of
the string being written into the buffer will not exceed its size, thus
preventing potential buffer overflow and truncation issues.Fixes the below with gcc W=1:
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c: In function ‘gfx_v9_4_3_early_init’:
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:379:52: warning: ‘%s’ directive output may be truncated writing up to 29 bytes into a region of size 23 [-Wformat-truncation=]
379 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_rlc.bin", chip_name);
| ^~
......
439 | r = gfx_v9_4_3_init_rlc_microcode(adev, ucode_prefix);
| ~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:379:9: note: ‘snprintf’ output between 16 and 45 bytes into a destination of size 30
379 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_rlc.bin", chip_name);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:413:52: warning: ‘%s’ directive output may be truncated writing up to 29 bytes into a region of size 23 [-Wformat-truncation=]
413 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_mec.bin", chip_name);
| ^~
......
443 | r = gfx_v9_4_3_init_cp_compute_microcode(adev, ucode_prefix);
| ~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:413:9: note: ‘snprintf’ output between 16 and 45 bytes into a destination of size 30
413 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_mec.bin", chip_name);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | []
| null | 7.8 | null | null |
|
GHSA-5qwg-mmw5-6m2r | Vulnerability in the Oracle Hospitality Reporting and Analytics component of Oracle Food and Beverage Applications. The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker having Inventory Integration privilege with network access via HTTP to compromise Oracle Hospitality Reporting and Analytics. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Reporting and Analytics accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). | []
| null | 7.1 | null | null |
|
GHSA-mhx2-r3jx-g94c | Apache Camel allows remote actor to read arbitrary files via external entity in invalid XML string or GenericFile object | Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query. | []
| null | null | null | null |
CVE-2024-2589 | SQL injection vulnerability in AMSS++ | Vulnerability in AMSS++ version 4.31 that allows SQL injection through /amssplus/modules/book/main/bookdetail_school_person.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the DB. | [
"cpe:2.3:a:amssplus:amss_plus:4.31:*:*:*:*:*:*:*"
]
| null | 8.2 | null | null |
GHSA-4qrg-v6p3-7pjf | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. A sandboxed process may be able to circumvent sandbox restrictions. | []
| null | null | null | null |
|
CVE-2017-7885 | Artifex jbig2dec 0.13 has a heap-based buffer over-read leading to denial of service (application crash) or disclosure of sensitive information from process memory, because of an integer overflow in the jbig2_decode_symbol_dict function in jbig2_symbol_dict.c in libjbig2dec.a during operation on a crafted .jb2 file. | [
"cpe:2.3:a:artifex:jbig2dec:0.13:*:*:*:*:*:*:*"
]
| null | null | 7.1 | 5.8 |
|
CVE-2014-7352 | The India's Anthem (aka appinventor.ai_opalfoxy83.India_Anthem) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:india\\'s_anthem_project:india\\'s_anthem:1:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
ICSA-24-352-02 | Hitachi Energy TropOS Devices Series 1400/2400/6400 | The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013. | []
| null | 5.3 | null | null |
CVE-2024-54044 | Adobe Connect | Cross-site Scripting (Reflected XSS) (CWE-79) | Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
CVE-2012-6707 | WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2017-14699 | Multiple XML external entity (XXE) vulnerabilities in the AiCloud feature on ASUS DSL-AC51, DSL-AC52U, DSL-AC55U, DSL-N55U C1, DSL-N55U D1, DSL-AC56U, DSL-N10_C1, DSL-N12U C1, DSL-N12E C1, DSL-N14U, DSL-N14U-B1, DSL-N16, DSL-N16U, DSL-N17U, DSL-N66U, and DSL-AC750 routers allow remote authenticated users to read arbitrary files via a crafted DTD in (1) an UPDATEACCOUNT or (2) a PROPFIND request. | [
"cpe:2.3:o:asus:dsl-ac51_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac51:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac52u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac52u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac55u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac55u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n55u_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n55u_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n55u_d1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n55u_d1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac56u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac56u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n10_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n10_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n12u_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n12u_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n12e_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n12e_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n14u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n14u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n14u-b1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n14u-b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n16_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n16u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n16u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n17u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n17u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n66u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n66u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac750:-:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-ghq6-mwc8-hg9r | A vulnerability classified as critical was found in IBOS OA 4.5.5. Affected by this vulnerability is the function actionEdit of the file ?r=dashboard/roleadmin/edit&op=member of the component Add User Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232759. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | null | 4.7 | null |
|
GHSA-r695-r662-34g4 | A CWE-787: Out-of-bounds write vulnerability exists inIGSS Definition (Def.exe) V15.0.0.21140 and prior that could result in disclosure of information or execution of arbitrary code due to lack of input validation, when a malicious CGF (Configuration Group File) file is imported to IGSS Definition. | []
| null | null | null | null |
|
CVE-2023-29106 | A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1). The export endpoint is accessible via REST API without authentication. This could allow an unauthenticated remote attacker to download the files available via the endpoint. | [
"cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2007-4435 | Multiple SQL injection vulnerabilities in TorrentTrader before 1.07 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) account-inbox.php, (2) account-settings.php, and possibly (3) backend/functions.php. | [
"cpe:2.3:a:torrenttrader:torrenttrader:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2002-2337 | Kaspersky Anti-Hacker 1.0, when configured to automatically block attacks, allows remote attackers to block IP addresses and cause a denial of service via spoofed packets. | [
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-hacker:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-mrfr-p4j4-54cw | A Remote Gain Privileged Access vulnerability in HPE Vertica Analytics Platform version v4.1 and later was found. | []
| null | null | 9.8 | null |
|
GHSA-xf2w-rwcj-q83w | A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988. | []
| null | 7.8 | null | null |
|
GHSA-8pvv-px4f-4px7 | An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition.This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor.This issue affects:Juniper Networks Junos OS:All versions prior to 20.4R3-S8;21.1 versions 21.1R1 and later;21.2 versions prior to 21.2R3-S6;21.3 versions prior to 21.3R3-S5;21.4 versions prior to 21.4R3-S5;22.1 versions prior to 22.1R3-S4;22.2 versions prior to 22.2R3-S2;22.3 versions prior to 22.3R2-S2, 22.3R3-S1;22.4 versions prior to 22.4R2-S1, 22.4R3;23.2 versions prior to 23.2R2.Juniper Networks Junos OS EvolvedAll versions prior to 20.4R3-S8-EVO;21.1 versions 21.1R1-EVO and later;21.2 versions prior to 21.2R3-S6-EVO;21.3 versions prior to 21.3R3-S5-EVO;21.4 versions prior to 21.4R3-S5-EVO;22.1 versions prior to 22.1R3-S4-EVO;22.2 versions prior to 22.2R3-S2-EVO;22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;23.2 versions prior to 23.2R2-EVO. | []
| null | 7.5 | null | null |
|
GHSA-hcwc-38vw-2h96 | Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: Web Listener). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle HTTP Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | []
| null | null | 5.3 | null |
|
CVE-2023-6427 | Cross-site Scripting vulnerability in BigProf products | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /invoicing/app/invoices_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | [
"cpe:2.3:a:bigprof:online_invoicing_system:2.6:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
GHSA-wr39-hjqv-c783 | There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability. | []
| null | 5.5 | null | null |
|
CVE-2017-18357 | Shopware before 5.3.4 has a PHP Object Instantiation issue via the sort parameter to the loadPreviewAction() method of the Shopware_Controllers_Backend_ProductStream controller, with resultant XXE via instantiation of a SimpleXMLElement object. | [
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-9rfx-jpvq-2f9g | Directory traversal vulnerability in index.php in ezContents 1.4.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the link parameter. | []
| null | null | null | null |
|
GHSA-qrmw-h7g2-7vjj | The Djelibeybi configuration examples for use of NGINX in SUSE Portus 2.3, when applied to certain configurations involving Docker Compose, have a Missing SSL Certificate Validation issue because no proxy_ssl_* directives are used. | []
| null | null | 8.8 | null |
|
GHSA-fqpg-f87m-4pv9 | Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 does not properly validate CA chains during signature validation, which allows man-in-the-middle attackers to upload and execute arbitrary files via a crafted certificate. | []
| null | null | null | null |
|
CVE-2016-10601 | webdrvr is a npm wrapper for Selenium Webdriver including Chromedriver / IEDriver / IOSDriver / Ghostdriver. webdrvr downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:uxebu:webdrvr:*:*:*:*:*:node.js:*:*"
]
| null | null | 8.1 | 9.3 |
|
RHSA-2014:0247 | Red Hat Security Advisory: gnutls security update | gnutls: incorrect handling of V1 intermediate certificates gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2018-6653 | comforte SWAP 1049 through 1069 and 20.0.0 through 21.5.3 (as used in SSLOBJ on HPE NonStop SSL T0910, and in the comforte SecurCS, SecurFTP, SecurLib/SSL-AT, and SecurTN products), after executing the RELOAD CERTIFICATES command, does not ensure that clients use a strong TLS cipher suite, which makes it easier for remote attackers to defeat intended cryptographic protection mechanisms by sniffing the network. This is fixed in 21.6.0. | [
"cpe:2.3:a:comforte:swap:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:nonstop_server:-:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 |
|
GHSA-9fj2-4gvw-3877 | The Water Lateral Sizer (aka com.wWaterLateralSizer) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
CVE-2024-3838 | Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
|
GHSA-4h4p-v3r6-7fj5 | Unknown vulnerability in The Ignition Project ignitionServer 0.1.2 through 0.3.1, with the linking service enabled, allows remote attackers to bypass authentication. | []
| null | null | null | null |
|
CVE-2017-10619 | Junos: SRX cluster denial of service vulnerability in flowd due to multicast packets | When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled by default and is only supported in high-end SRX platforms. Affected releases are Juniper Networks Junos OS 12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80 on SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800. | [
"cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
CVE-2024-11445 | Image Magnify <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Image Magnify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'image_magnify' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
CVE-2006-0536 | Cross-site scripting (XSS) vulnerability in neomail.pl in NeoMail 1.27 allows remote attackers to inject arbitrary web script or HTML via the sort parameter. NOTE: some sources say that the affected parameter is "date," but the demonstration URL shows that it is "sort". | [
"cpe:2.3:a:neomail:neomail:1.27:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-f8m2-3jrc-9x5r | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jeffrey-WP Media Library Categories plugin <= 1.9.9 versions. | []
| null | 4.8 | null | null |
|
GHSA-63v4-64x6-h6c2 | Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device. | []
| null | null | 9.8 | null |
|
CVE-2023-33316 | WordPress WooCommerce Follow-Up Emails (AutomateWoo) plugin <= 4.9.40 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Follow-Up Emails (AutomateWoo) plugin <= 4.9.40 versions. | [
"cpe:2.3:a:woocommerce:automatewoo:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
CVE-2008-4835 | SMB in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via malformed values of unspecified "fields inside the SMB packets" in an NT Trans2 request, related to "insufficiently validating the buffer size," aka "SMB Validation Remote Code Execution Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2013-4280 | Insecure temporary file vulnerability in RedHat vsdm 4.9.6. | [
"cpe:2.3:a:redhat:virtual_desktop_server_manager:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
GHSA-fr42-p77x-54x8 | An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. Photos in the Hidden Photos Album may be viewed without authentication. | []
| null | 5.3 | null | null |
|
CVE-1999-1129 | Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag. | [
"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_2900_vlan:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-cm82-c58j-hhv5 | An issue was discovered in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.0 before 9.0.0 Patch 16. An XSS vulnerability exists in the login component of Zimbra Web Client, in which an attacker can execute arbitrary JavaScript by adding executable JavaScript to the loginErrorCode parameter of the login url. | []
| null | null | null | null |
|
CVE-2014-9583 | common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change. | [
"cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:wrt_firmware:3.0.0.4.376.2524-g0012f52:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:wrt_firmware:3.0.0.4.376_1071:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac66u:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-n66u:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-78gh-fjr2-xgcp | Certain NETGEAR devices are affected by denial of service. This affects R6400v2 before 1.0.4.98, R6700v3 before 1.0.4.98, R7900 before 1.0.3.18, and R8000 before 1.0.4.46. | []
| null | null | null | null |
|
GHSA-fmgx-grvc-558f | Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload. | []
| null | null | null | null |
|
CVE-2022-32996 | The django-navbar-client package of v0.9.50 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | [
"cpe:2.3:a:pypi:django-navbar-client:*:*:*:*:*:pypi:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2024-12091 | Stored Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x | A stored Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session. | []
| null | 8.7 | null | null |
GHSA-rfm6-67q9-fgg9 | NetScout nGeniusONE 6.3.4 build 2298 allows a Reflected Cross-Site scripting vulnerability. | []
| null | 6.1 | null | null |
|
RHSA-2007:0126 | Red Hat Security Advisory: xorg-x11 security update | xserver XC-MISC integer overflow Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352) XGetPixel() integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
GHSA-3x4g-qr6f-2pmw | itetris/xitetris 1.6.2 and earlier trusts the PATH environmental variable to find and execute the gunzip program, which allows local users to gain root privileges by changing their PATH so that it points to a malicious gunzip program. | []
| null | null | null | null |
|
RHSA-2023:3455 | Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0 | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:openshift_serverless:1.29::el8"
]
| null | 7.3 | null | null |
GHSA-rc6c-ccqw-5hw9 | dg-user/?controller=users&action=add in doorGets 7.0 has CSRF that results in adding an administrator account. | []
| null | null | 8.8 | null |
|
GHSA-rwh9-5jcm-w345 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Daniel Powney Multi Rating plugin <= 5.0.6 versions. | []
| null | 5.9 | null | null |
|
GHSA-xprj-4wm5-xgr4 | Cross-Site Request Forgery (CSRF) vulnerability in Djo Original texts Yandex WebMaster plugin <= 1.18 versions. | []
| null | 8.8 | null | null |
|
CVE-2024-11482 | A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API and enables remote code execution through command injection, executed as the root user. | [
"cpe:2.3:a:hp:enterprise_security_manager:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
RHSA-2022:7958 | Red Hat Security Advisory: libguestfs security, bug fix, and enhancement update | libguestfs: Buffer overflow in get_keys leads to DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 5.5 | null | null |
CVE-2021-1466 | Cisco SD-WAN vDaemon Buffer Overflow Vulnerability | A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a denial of service (DoS) condition.
The vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could allow the attacker to cause the vDaemon listening service to reload and result in a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | []
| null | 5.4 | null | null |
CVE-2015-7553 | Race condition in the kernel in Red Hat Enterprise Linux 7, kernel-rt and Red Hat Enterprise MRG 2, when the nfnetlink_log module is loaded, allows local users to cause a denial of service (panic) by creating netlink sockets. | [
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:kernel-rt:-:*:*:*:*:*:*:*"
]
| null | null | 4.7 | 4.7 |
|
CVE-2008-1804 | preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment. | [
"cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-jx8f-jjvw-f6vf | VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed. | []
| null | 8.2 | null | null |
|
CVE-2022-46999 | Tuzicms v2.0.6 was discovered to contain a SQL injection vulnerability via the component \App\Manage\Controller\UserController.class.php. | [
"cpe:2.3:a:tuzicms:tuzicms:2.0.6:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2016-8922 | Exphox WebRadar is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [
"cpe:2.3:a:ibm:web_content_manager_production_analytics:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.5:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
RHSA-2016:1480 | Red Hat Security Advisory: mysql55-mysql security update | mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) mysql: unspecified vulnerability related to Server:Types (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:SP (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) mysql: ssl-validate-cert incorrect hostname check mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
]
| null | null | 3.7 | null |
CVE-2007-0325 | Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remote attackers to execute arbitrary code via a crafted HTML document. | [
"cpe:2.3:a:trend_micro:client-server-messaging_security:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:officescan_corporate_edition:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:officescan_corporate_edition:7.3:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2022-44381 | Snipe-IT through 6.0.14 allows attackers to check whether a user account exists because of response variations in a /password/reset request. | [
"cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2015-1863 | Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries. | [
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
CVE-2025-43001 | Multiple Privilege Escalation Vulnerabilities in SAPCAR | SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system. | []
| null | 6.9 | null | null |
GHSA-cjm7-r96j-5xx3 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | []
| null | 8.8 | null | null |
|
CVE-2016-2331 | The web interface on SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors. | [
"cpe:2.3:h:systech:syslink_sl-1000_modular_gateway:-:*:*:*:*:*:*:*",
"cpe:2.3:o:systech:syslink_sl-1000_modular_gateway_firmware:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2021-4365 | The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in versions up to, and including, 18.2. This is due to lacking authentication protections and santisation all on the wpfm_edit_file_title_desc AJAX action. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:najeebmedia:frontend_file_manager_plugin:*:*:*:*:*:wordpress:*:*"
]
| null | 7.2 | null | null |
|
GHSA-hw25-ffp2-52rq | Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | null | null | null |
|
CVE-2023-0619 | The Kraken.io Image Optimizer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset image optimizations. | [
"cpe:2.3:a:kraken:kraken.io_image_optimizer:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
|
CVE-2023-27465 | A vulnerability has been identified in SIMOTION C240 (All versions >= V5.4 < V5.5 SP1), SIMOTION C240 PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D445-2 DP/PN (All versions >= V5.4), SIMOTION D445-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D455-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION P320-4 E (All versions >= V5.4), SIMOTION P320-4 S (All versions >= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device. | [
"cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d425-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d425-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d435-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d435-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\)_firmware:5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d455-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_p320-4_e_firmware:5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_p320-4_e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_p320-4_s_firmware:5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d410-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d410-2_dp\\/pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_pn_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_c240_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c240_firmware:5.5:-:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_c240:-:*:*:*:*:*:*:*"
]
| null | 4.6 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.