id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-45354 | Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated remote attacker to execute arbitrary code on the operating system by using the Common Management Portal web interface. This is also known as OCMP-6589. | [
"cpe:2.3:a:atos:unify_openscape_common_management:10:-:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2010-0690 | SQL injection vulnerability in index.php in CommodityRentals Video Games Rentals allows remote attackers to execute arbitrary SQL commands via the pfid parameter in a catalog action. | [
"cpe:2.3:a:commodityrentals:video_games_rentals:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-98g4-4gpj-7rqq | The txrx stats req might be double freed in the pdev detach when the host driver is unloading in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ8064, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCA9558, QCA9880, QCA9886, QCA9980, QCS405, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24 | []
| null | null | 5.5 | null |
|
CVE-2014-10385 | The memphis-documents-library plugin before 3.0 for WordPress has XSS via $_REQUEST. | [
"cpe:2.3:a:memphis_documents_library_project:memphis_documents_library:*:*:*:*:*:wordpress:*:*"
]
| null | null | 6.1 | 4.3 |
|
RHSA-2015:1510 | Red Hat Security Advisory: clutter security update | clutter: screenlock bypass by performing certain mouse gestures | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
GHSA-v2m3-6m6p-mpfj | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saysis Starcities allows SQL Injection.This issue affects Starcities: through 1.3. | []
| null | 9.8 | null | null |
|
CVE-2023-25367 | Siglent SDS 1104X-E SDS1xx4X-E_V6.1.37R9.ADS allows unfiltered user input resulting in Remote Code Execution (RCE) with SCPI interface or web server. | [
"cpe:2.3:o:siglent:sds1204x-e_firmware:6.1.37r9.ads:*:*:*:*:*:*:*",
"cpe:2.3:h:siglent:sds1204x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siglent:sds1104x-e_firmware:6.1.37r9.ads:*:*:*:*:*:*:*",
"cpe:2.3:h:siglent:sds1104x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siglent:sds1074x-e_firmware:6.1.37r9.ads:*:*:*:*:*:*:*",
"cpe:2.3:h:siglent:sds1074x-e:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2005-1469 | Unknown vulnerability in the GSM dissector in Ethereal before 0.10.11 allows remote attackers to cause the dissector to access an invalid pointer. | [
"cpe:2.3:a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-39p4-fjv6-chrx | A possible stored JavaScript injection requiring a deliberate server administrator action was detected. The issue was fixed in JetBrains TeamCity 2018.2.3. | []
| null | null | null | null |
|
GHSA-wr27-cj9h-mv7q | Sky File v2.1.0 contains a directory traversal vulnerability in the FTP server which allows attackers to access sensitive data and files via 'null' path commands. | []
| null | null | null | null |
|
GHSA-vx98-9qm5-73r8 | A denial of service vulnerability exists when Windows improperly handles objects in memory, aka "Windows Denial of Service Vulnerability." This affects Windows 10, Windows Server 2019. | []
| null | null | 5.5 | null |
|
GHSA-cg57-5mxp-25jg | Mozilla Firefox 3.0.10, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages." | []
| null | null | null | null |
|
CVE-2021-34902 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14875. | [
"cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*"
]
| null | null | 3.3 | null |
|
GHSA-7f5w-fj39-gxxh | Unquoted Windows search path vulnerability in the agent in Symantec Workspace Streaming (SWS) 6.1 before SP8 MP2 HF7 and 7.5 before SP1 HF4, when AppMgrService.exe is configured as a service, allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe. | []
| null | null | null | null |
|
CVE-2023-37912 | XWiki Rendering's footnote macro vulnerable to privilege escalation via the footnote macro | XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. Prior to version 14.10.6 of `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` and `org.xwiki.platform:xwiki-rendering-macro-footnotes` and prior to version 15.1-rc-1 of `org.xwiki.platform:xwiki-rendering-macro-footnotes`, the footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1. There is no workaround apart from upgrading to a fixed version of the footnote macro. | [
"cpe:2.3:a:xwiki:xwiki-rendering:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki-rendering:15.0:rc1:*:*:*:*:*:*"
]
| null | 10 | null | null |
GHSA-6f7w-hx2c-cxpj | GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.The specific flaw exists within the parsing of AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22226. | []
| null | null | 8.8 | null |
|
GHSA-ff3j-px4r-rvxm | Missing Authorization vulnerability in wpcreativeidea Advanced Testimonial Carousel for Elementor.This issue affects Advanced Testimonial Carousel for Elementor: from n/a through 3.0.0. | []
| null | 4.3 | null | null |
|
CVE-2008-1646 | SQL injection vulnerability in wp-download.php in the WP-Download 1.2 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the dl_id parameter. | [
"cpe:2.3:a:arnos_toolbox:wp-download:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wp_download:1.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-50212 | lib: alloc_tag_module_unload must wait for pending kfree_rcu calls | In the Linux kernel, the following vulnerability has been resolved:
lib: alloc_tag_module_unload must wait for pending kfree_rcu calls
Ben Greear reports following splat:
------------[ cut here ]------------
net/netfilter/nf_nat_core.c:1114 module nf_nat func:nf_nat_register_fn has 256 allocated at module unload
WARNING: CPU: 1 PID: 10421 at lib/alloc_tag.c:168 alloc_tag_module_unload+0x22b/0x3f0
Modules linked in: nf_nat(-) btrfs ufs qnx4 hfsplus hfs minix vfat msdos fat
...
Hardware name: Default string Default string/SKYBAY, BIOS 5.12 08/04/2020
RIP: 0010:alloc_tag_module_unload+0x22b/0x3f0
codetag_unload_module+0x19b/0x2a0
? codetag_load_module+0x80/0x80
nf_nat module exit calls kfree_rcu on those addresses, but the free
operation is likely still pending by the time alloc_tag checks for leaks.
Wait for outstanding kfree_rcu operations to complete before checking
resolves this warning.
Reproducer:
unshare -n iptables-nft -t nat -A PREROUTING -p tcp
grep nf_nat /proc/allocinfo # will list 4 allocations
rmmod nft_chain_nat
rmmod nf_nat # will WARN.
[[email protected]: add comment] | []
| null | null | null | null |
CVE-2017-6815 | In WordPress before 4.7.3 (wp-includes/pluggable.php), control characters can trick redirect URL validation. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 5.8 |
|
CVE-2024-10592 | Mapster WP Maps <= 1.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
RHSA-2022:1158 | Red Hat Security Advisory: OpenShift Container Platform 4.9.27 bug fix and security update | ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod | [
"cpe:/a:redhat:openshift:4.9::el8"
]
| null | 8.2 | null | null |
GHSA-4jgr-2587-qr74 | The FireWire driver in IOFireWireFamily in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app. | []
| null | null | null | null |
|
GHSA-fw7h-357f-67ff | VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure. | []
| null | 3.3 | null | null |
|
GHSA-cxfc-q5xx-wr6x | Ultrafunk Popcorn 1.20 allows remote attackers to cause a denial of service (crash) via a malformed Date field that is converted into a year greater than 2037. | []
| null | null | null | null |
|
CVE-2022-28081 | A reflected cross-site scripting (XSS) vulnerability in the component Query.php of arPHP v3.6.0 allows attackers to execute arbitrary web scripts. | [
"cpe:2.3:a:ar-php:arphp:3.6.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-9jcg-45pr-7qhw | Unspecified vulnerability in Jelsoft vBulletin before 3.6.6, when unauthenticated User Infraction Permissions is disabled, allows remote attackers to see the infraction "red flag" for a deleted user. | []
| null | null | null | null |
|
CVE-2009-0862 | Cross-site scripting (XSS) vulnerability in the hook_cntrlr_error_output function in modules/page/hooks/listeners.php in the admincp component in TangoCMS 2.2.x (aka Eagle) before 2.2.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:tangocms:tangocms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:1.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tangocms:tangocms:2.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2024-55994 | WordPress 畅言评论系统 plugin <= 2.0.5 - Broken Access Control vulnerability | Missing Authorization vulnerability in 搜狐畅言 畅言评论系统 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 畅言评论系统: from n/a through 2.0.5. | []
| null | 4.3 | null | null |
CVE-2009-0982 | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.49.19 allows remote authenticated users to affect integrity via unknown vectors. | [
"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.49.19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:*:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
CVE-2007-0900 | Multiple PHP remote file inclusion vulnerabilities in TagIt! Tagboard 2.1.B Build 2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) configpath parameter to (a) tagviewer.php, (b) tag_process.php, and (c) CONFIG/errmsg.inc.php; and (d) addTagmin.php, (e) ban_watch.php, (f) delTagmin.php, (g) delTag.php, (h) editTagmin.php, (i) editTag.php, (j) manageTagmins.php, and (k) verify.php in tagmin/; the (2) adminpath parameter to (l) tagviewer.php, (m) tag_process.php, and (n) tagmin/index.php; and the (3) admin parameter to (o) readconf.php, (p) updateconf.php, (q) updatefilter.php, and (r) wordfilter.php in tagmin/; different vectors than CVE-2006-5249. | [
"cpe:2.3:a:tagit:tagboard:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2022-34413 |
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
| [
"cpe:2.3:o:dell:r6515_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r6515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r7515_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r7515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r6525_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r6525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r7525_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r7525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xe8545_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xe8545:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:c6525_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:c6525:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r6415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r6415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r7415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r7415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r7425_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r7425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r750xa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r750xa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:c6520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:c6520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:mx750c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:mx750c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r650xs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r650xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r750xs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r750xs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xr11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xr11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xr12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xr12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r740_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r740xd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r740xd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r940_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xr2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xr2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r740xd2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r740xd2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r840_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r940xa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r940xa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:c6420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:c6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:fc640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:fc640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:m640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:m640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:m640p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:m640p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:mx740c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:mx740c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:mx840c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:mx840c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:c4140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:c4140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dss8440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:dss8440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xe2420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xe2420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xe7420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xe7420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xe7440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xe7440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r730_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r730xd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r730xd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:c4130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:c4130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r930_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:m630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:m630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:m630p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:m630p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:fc630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:fc630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:fc430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:fc430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:m830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:m830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:m830p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:m830p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:fc830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:fc830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r830_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:c6320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:c6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:t330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:t330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:r330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:r330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx430_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx3230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx3230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx3330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx3330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx3240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx3240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:nx3340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:nx3340:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-qwmj-9j79-8g4m | Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to obtain sensitive information via vectors involving saving an SWF file to a hard drive, related to a "local sandbox vulnerability." | []
| null | null | null | null |
|
GHSA-qw7r-jh4c-hgfq | XSS exists in Zoho ManageEngine Netflow Analyzer Professional v7.0.0.2 in the Administration zone "/netflow/jspui/editProfile.jsp" file in the userName parameter. | []
| null | null | 6.1 | null |
|
CVE-2024-7766 | Adicon Server <= 1.2 - Admin+ SQL Injection | The Adicon Server WordPress plugin through 1.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks | [
"cpe:2.3:a:erichamby:adicon_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:erichamby:adicon_server:*:*:*:*:*:wordpress:*:*"
]
| null | 7.2 | null | null |
CVE-2021-39218 | Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime | Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where there are no live references at this safepoint, and there is a safepoint with live references earlier in this frame's function. Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes. Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to `wasmtime::Config::wasm_reference_types`. | [
"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
GHSA-gqg8-h7gm-47hq | JFrog Artifactory versions below 7.77.7, are vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism. | []
| null | 8.8 | null | null |
|
CVE-2024-30007 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Microsoft Brokering File System Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:x64:*"
]
| null | 8.8 | null | null |
GHSA-rqx4-5362-4v5v | LogicalDoc before 8.3.3 allows /servlet.gupld Directory Traversal, a different vulnerability than CVE-2020-9423 and CVE-2020-10365. | []
| null | null | null | null |
|
CVE-2025-23711 | WordPress Quote me plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Quote me allows Reflected XSS. This issue affects Quote me: from n/a through 1.0. | []
| null | 7.1 | null | null |
GHSA-3wx9-g76r-9crv | Missing Authorization vulnerability in Shakeeb Sadikeen RapidLoad allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RapidLoad: from n/a through 2.4.4. | []
| null | 4.3 | null | null |
|
CVE-2019-7340 | POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[Query][terms][0][val]' parameter value in the view filter (filter.php) because proper filtration is omitted. | [
"cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-fjqf-3qv4-g42p | The autofill implementation in Google Chrome before 20.0.1132.43 does not properly display text, which has unspecified impact and remote attack vectors. | []
| null | null | null | null |
|
GHSA-8hj4-3g8f-gwwq | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated GIF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | []
| null | null | null | null |
|
CVE-2014-9946 | In Core Kernel in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-q7g6-89f5-6c2m | The The Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. This functionality is also vulnerable to Reflected Cross-Site Scripting. Version 1.7.0 patched the Reflected XSS issue, however, the arbitrary shortcode execution issue remains. | []
| null | 6.5 | null | null |
|
GHSA-6xrf-hmv4-8vwv | Multiple cross-site scripting (XSS) vulnerabilities in WikyBlog before 1.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) key parameter to index.php/Special/Main/keywordSearch, (2) revNum parameter to index.php/Edit/Main/Home, (3) to parameter to index.php/Special/Main/WhatLinksHere, (4) user parameter to index.php/Special/Main/UserEdits, and (5) the PATH_INFO to index.php. | []
| null | null | null | null |
|
GHSA-r6hj-9v4h-whwg | SQL injection vulnerability in the BookFlip (com_bookflip) component 2.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the book_id parameter to index.php. | []
| null | null | null | null |
|
GHSA-ccfg-9f3p-jm5r | Qibosoft QiboCMS v7 was discovered to contain a remote code execution (RCE) vulnerability via the Get_Title function at label_set_rs.php | []
| null | 8.8 | null | null |
|
RHSA-2018:2001 | Red Hat Security Advisory: qemu-kvm security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 5.6 | null |
CVE-2023-47662 | WordPress Live Gold Price & Silver Price Charts Widgets Plugin <= 2.4 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GoldBroker.Com Live Gold Price & Silver Price Charts Widgets plugin <= 2.4 versions. | [
"cpe:2.3:a:goldbroker:live_gold_price_\\&_silver_price_charts_widgets:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null |
CVE-2018-16956 | The AjaxControl component of Oracle WebCenter Interaction Portal 10.3.3 does not validate the names of pages when processing page rename requests. Pages can be renamed to include characters unsupported for URIs by the web server hosting the WCI Portal software (such as IIS). Renaming pages to include unsupported characters, such as 0x7f, prevents these pages from being accessed over the web server, causing a Denial of Service (DoS) to the page. NOTE: this CVE is assigned by MITRE and isn't validated by Oracle because Oracle WebCenter Interaction Portal is out of support. | [
"cpe:2.3:a:oracle:webcenter_interaction:10.3.3:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
CVE-2020-13833 | An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The system area allows arbitrary file overwrites via a symlink attack. The Samsung ID is SVE-2020-17183 (June 2020). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 9.1 | null | 6.4 |
|
RHSA-2019:2682 | Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth | [
"cpe:/a:redhat:devtools:2019"
]
| null | null | 7.5 | null |
GHSA-gwgx-cqxp-m7q4 | Cross-site scripting (XSS) vulnerability in Horde Accounts module before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the parent's frame page title. | []
| null | null | null | null |
|
GHSA-5h56-hp83-f22q | Orca Browser 1.2 build 5 does not properly block data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (3) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header; and does not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (5) injecting a Location HTTP response header or (6) specifying the content of a Location HTTP response header. | []
| null | null | null | null |
|
GHSA-c79h-6wmh-q4mh | SQL injection vulnerability in staticpages/easyecards/index.php in MyioSoft EasyE-Cards 3.5 trial edition (tr) and 3.10a, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the sid parameter in a pickup action. | []
| null | null | null | null |
|
GHSA-9289-82mv-9386 | The xatitv program in the gatos package does not properly drop root privileges when the configuration file does not exist, which allows local users to execute arbitrary commands via shell metacharacters in a system call. | []
| null | null | null | null |
|
GHSA-6wm5-xwc9-xpjr | Multiple untrusted search path vulnerabilities in Adobe Device Central CS4 2.0.0 0476 allow local users to gain privileges via a Trojan horse (1) ibfs32.dll or (2) amt_cdb.dll file in the current working directory, as demonstrated by a directory that contains a .adcp file. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
CVE-2007-2539 | The show_files function in RunCms 1.5.2 and earlier allows remote attackers to obtain sensitive information (file existence and file metadata) via unspecified vectors. | [
"cpe:2.3:a:runcms:runcms:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2020-12256 | rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php. | [
"cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
GHSA-rgg6-wh38-9vv5 | A vulnerability classified as critical has been found in PHPGurukul Daily Expense Tracker System 1.1. This affects an unknown part of the file /expense-datewise-reports-detailed.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | null | null |
|
GHSA-3mp6-cvg4-cj7v | Unrestricted Upload of File with Dangerous Type vulnerability in Myriad Solutionz Property Lot Management System allows Upload a Web Shell to a Web Server.This issue affects Property Lot Management System: from n/a through 4.2.38. | []
| null | 9.9 | null | null |
|
CVE-2017-7606 | coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.5-4:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
GHSA-rv7m-x5vr-r5rg | NVIDIA GPU Display Driver R378 contains a vulnerability in the kernel mode layer handler where improper access control may lead to denial of service or possible escalation of privileges. | []
| null | null | 8.8 | null |
|
GHSA-4hmm-4p87-cjh8 | Marconi ForeThought 7.1 allows remote attackers to cause a denial of service by causing both telnet sessions to be locked via unusual input (e.g., from a port scanner), which prevents others from logging into the device. | []
| null | null | null | null |
|
GHSA-958w-v5jh-m736 | Cross-Site Request Forgery (CSRF) vulnerability in Rajeev Chauhan Load More Posts allows Stored XSS.This issue affects Load More Posts: from n/a through 1.4.0. | []
| null | 7.1 | null | null |
|
GHSA-w4xx-xxh4-422c | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WPFactory EU/UK VAT Manager for WooCommerce allows Cross-Site Scripting (XSS).This issue affects EU/UK VAT Manager for WooCommerce: from n/a through 2.12.14. | []
| null | 7.1 | null | null |
|
CVE-2024-10434 | Tenda AC1206 ate ate_Tenda_mfg_check_usb3 stack-based overflow | A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac1206_firmware:*:*:*:*:*:*:*:*"
]
| 8.7 | 8.8 | 8.8 | 9 |
CVE-2024-8276 | WPZOOM Portfolio Lite – Filterable Portfolio Plugin <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via align Attribute | The WPZOOM Portfolio Lite – Filterable Portfolio Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ attribute within the 'wp:wpzoom-blocks' Gutenberg block in all versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:wpzoom:wpzoom_portfolio:-:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpzoom:wpzoom_portfolio:*:*:*:*:*:wordpress:*:*"
]
| null | 6.4 | null | null |
GHSA-qw5m-vmp3-f553 | Magento Open Source allows Incorrect Authorization | Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass a minor functionality. Exploitation of this issue does not require user interaction. | []
| 6.9 | 5.3 | null | null |
GHSA-3fmh-frpw-xcrq | webctrl.cgi.elf on Christie Digital DWU850-GS V06.46 devices allows attackers to perform any desired action via a crafted query containing an unspecified Cookie header. Authentication bypass can be achieved by including an administrative cookie that the device does not validate. | []
| null | null | null | null |
|
GHSA-xg2h-3f4g-42hc | MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form. | []
| null | null | null | null |
|
GHSA-353r-3v84-9pjj | Malicious Package in nothing-js | `nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run.RecommendationThis module has been unpublished from the npm Registry. If you find this module in your environment remove it. | []
| null | 9.8 | null | null |
GHSA-cwrc-hc6x-63r7 | Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | []
| null | 6.1 | null | null |
|
GHSA-qrr6-fpf4-x3v4 | In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. | []
| null | null | null | null |
|
CVE-2021-46203 | Taocms v3.0.2 was discovered to contain an arbitrary file read vulnerability via the path parameter. | [
"cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 |
|
GHSA-x4mr-7jcx-v2x6 | The ECT Provider component in OutSystems Platform Server 10 before 10.0.1104.0 and 11 before 11.9.0 (and LifeTime management console before 11.7.0) allows SSRF for arbitrary outbound HTTP requests. | []
| null | null | null | null |
|
GHSA-7664-jhg9-7j9c | The Lifeline Donation plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2.6. This is due to insufficient verification on the user being supplied during the checkout through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. | []
| null | 9.8 | null | null |
|
CVE-2008-3424 | Condor before 7.0.4 does not properly handle wildcards in the ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, or HOSTDENY_WRITE configuration variables in authorization policy lists, which might allow remote attackers to bypass intended access restrictions. | [
"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2018-13420 | Google gperftools 2.7 has a memory leak in malloc_extension.cc, related to MallocExtension::Register and InitModule. NOTE: the software maintainer indicates that this is not a bug; it is only a false-positive report from the LeakSanitizer program | [
"cpe:2.3:a:gperftools_project:gperftools:2.7:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2016-4805 | Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions. | [
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_workstation_extension:12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_module_for_public_cloud:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:opensuse_leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_live_patching:12.0:-:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
CVE-2017-7888 | Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which makes brute-force attacks easier. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:4.0.4:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 5 |
|
GHSA-6pcr-45mv-9gp3 | Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine. | []
| null | 8.4 | null | null |
|
GHSA-jr84-3q6c-4x89 | Win32 File Enumeration Remote Code Execution Vulnerability. | []
| null | 7.5 | null | null |
|
CVE-2000-0361 | The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information. | [
"cpe:2.3:o:suse:suse_linux:*:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
GHSA-m3mh-8r5f-q9v7 | TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the port parameter in the setting/setOpenVpnClientCfg function. | []
| null | null | null | null |
|
GHSA-5c8f-8f5q-mw49 | The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request. | []
| null | null | null | null |
|
GHSA-hgw8-98j5-vg4c | Themify Portfolio Post WordPress plugin before 1.1.7 does not sanitise and escape the num_of_pages parameter before outputting it back the response of the themify_create_popup_page_pagination AJAX action (available to any authenticated user), leading to a Reflected Cross-Site Scripting | []
| null | null | null | null |
|
GHSA-32fp-mqg5-24wv | PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP Code Snippets via WordPress metaboxes, which could be used by any user able to edit posts. | []
| null | null | null | null |
|
CVE-2021-34817 | A Cross-Site Scripting (XSS) issue in the chat component of Etherpad 1.8.13 allows remote attackers to inject arbitrary JavaScript or HTML by importing a crafted pad. | [
"cpe:2.3:a:etherpad:etherpad:1.8.13:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-qf3v-hhp7-rfh5 | The SumaHo application 3.0.0 and earlier for Android and the SumaHo "driving capability" diagnosis result transmission application 1.2.2 and earlier for Android allow man-in-the-middle attackers to spoof servers and obtain sensitive information by leveraging failure to verify SSL/TLS server certificates. | []
| null | null | 5.9 | null |
|
CVE-2021-45229 | Apache Airflow: Reflected XSS via Origin Query Argument in URL | It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below. | [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
CVE-2023-27212 | A cross-site scripting (XSS) vulnerability in /php-opos/signup.php of Online Pizza Ordering System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the redirect parameter. | [
"cpe:2.3:a:online_pizza_ordering_system_project:online_pizza_ordering_system:1.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
CVE-2023-5529 | Advanced Page Visit Counter <= 8.0.6 - Admin+ Stored XSS | The Advanced Page Visit Counter WordPress plugin before 8.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | []
| null | 4.8 | null | null |
CVE-2016-7862 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 9.3 |
|
CVE-2025-30933 | WordPress LogisticsHub <= 1.1.6 - Arbitrary File Upload Vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in LiquidThemes LogisticsHub allows Upload a Web Shell to a Web Server. This issue affects LogisticsHub: from n/a through 1.1.6. | []
| null | 10 | null | null |
CVE-2021-4319 | Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-4946-85pr-fvxh | vantage6's CORS settings overly permissive | ImpactThe vantage6 server has no restrictions on CORS settings. It should be possible for people to set the allowed origins of the server.The impact is limited because v6 does not use session cookiesPatchesNoWorkaroundsNo | []
| null | 4.2 | null | null |
cisco-sa-20180516-fnd | Cisco IoT Field Network Director Cross-Site Request Forgery Vulnerability | A vulnerability in the web-based management interface of Cisco IoT Field Network Director (IoT-FND) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and alter the data of existing users and groups on an affected device.
The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the user has administrative privileges, the attacker could create a new, privileged account to obtain full control over the device interface.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-fnd ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-fnd"] | []
| null | null | 8.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.