id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2023-45354
Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated remote attacker to execute arbitrary code on the operating system by using the Common Management Portal web interface. This is also known as OCMP-6589.
[ "cpe:2.3:a:atos:unify_openscape_common_management:10:-:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2010-0690
SQL injection vulnerability in index.php in CommodityRentals Video Games Rentals allows remote attackers to execute arbitrary SQL commands via the pfid parameter in a catalog action.
[ "cpe:2.3:a:commodityrentals:video_games_rentals:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-98g4-4gpj-7rqq
The txrx stats req might be double freed in the pdev detach when the host driver is unloading in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ8064, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCA9558, QCA9880, QCA9886, QCA9980, QCS405, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24
[]
null
null
5.5
null
CVE-2014-10385
The memphis-documents-library plugin before 3.0 for WordPress has XSS via $_REQUEST.
[ "cpe:2.3:a:memphis_documents_library_project:memphis_documents_library:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
RHSA-2015:1510
Red Hat Security Advisory: clutter security update
clutter: screenlock bypass by performing certain mouse gestures
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
GHSA-v2m3-6m6p-mpfj
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saysis Starcities allows SQL Injection.This issue affects Starcities: through 1.3.
[]
null
9.8
null
null
CVE-2023-25367
Siglent SDS 1104X-E SDS1xx4X-E_V6.1.37R9.ADS allows unfiltered user input resulting in Remote Code Execution (RCE) with SCPI interface or web server.
[ "cpe:2.3:o:siglent:sds1204x-e_firmware:6.1.37r9.ads:*:*:*:*:*:*:*", "cpe:2.3:h:siglent:sds1204x-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siglent:sds1104x-e_firmware:6.1.37r9.ads:*:*:*:*:*:*:*", "cpe:2.3:h:siglent:sds1104x-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siglent:sds1074x-e_firmware:6.1.37r9.ads:*:*:*:*:*:*:*", "cpe:2.3:h:siglent:sds1074x-e:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2005-1469
Unknown vulnerability in the GSM dissector in Ethereal before 0.10.11 allows remote attackers to cause the dissector to access an invalid pointer.
[ "cpe:2.3:a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-39p4-fjv6-chrx
A possible stored JavaScript injection requiring a deliberate server administrator action was detected. The issue was fixed in JetBrains TeamCity 2018.2.3.
[]
null
null
null
null
GHSA-wr27-cj9h-mv7q
Sky File v2.1.0 contains a directory traversal vulnerability in the FTP server which allows attackers to access sensitive data and files via 'null' path commands.
[]
null
null
null
null
GHSA-vx98-9qm5-73r8
A denial of service vulnerability exists when Windows improperly handles objects in memory, aka "Windows Denial of Service Vulnerability." This affects Windows 10, Windows Server 2019.
[]
null
null
5.5
null
GHSA-cg57-5mxp-25jg
Mozilla Firefox 3.0.10, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages."
[]
null
null
null
null
CVE-2021-34902
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14875.
[ "cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
GHSA-7f5w-fj39-gxxh
Unquoted Windows search path vulnerability in the agent in Symantec Workspace Streaming (SWS) 6.1 before SP8 MP2 HF7 and 7.5 before SP1 HF4, when AppMgrService.exe is configured as a service, allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe.
[]
null
null
null
null
CVE-2023-37912
XWiki Rendering's footnote macro vulnerable to privilege escalation via the footnote macro
XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. Prior to version 14.10.6 of `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` and `org.xwiki.platform:xwiki-rendering-macro-footnotes` and prior to version 15.1-rc-1 of `org.xwiki.platform:xwiki-rendering-macro-footnotes`, the footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1. There is no workaround apart from upgrading to a fixed version of the footnote macro.
[ "cpe:2.3:a:xwiki:xwiki-rendering:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki-rendering:15.0:rc1:*:*:*:*:*:*" ]
null
10
null
null
GHSA-6f7w-hx2c-cxpj
GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.The specific flaw exists within the parsing of AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22226.
[]
null
null
8.8
null
GHSA-ff3j-px4r-rvxm
Missing Authorization vulnerability in wpcreativeidea Advanced Testimonial Carousel for Elementor.This issue affects Advanced Testimonial Carousel for Elementor: from n/a through 3.0.0.
[]
null
4.3
null
null
CVE-2008-1646
SQL injection vulnerability in wp-download.php in the WP-Download 1.2 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the dl_id parameter.
[ "cpe:2.3:a:arnos_toolbox:wp-download:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wp_download:1.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-50212
lib: alloc_tag_module_unload must wait for pending kfree_rcu calls
In the Linux kernel, the following vulnerability has been resolved: lib: alloc_tag_module_unload must wait for pending kfree_rcu calls Ben Greear reports following splat: ------------[ cut here ]------------ net/netfilter/nf_nat_core.c:1114 module nf_nat func:nf_nat_register_fn has 256 allocated at module unload WARNING: CPU: 1 PID: 10421 at lib/alloc_tag.c:168 alloc_tag_module_unload+0x22b/0x3f0 Modules linked in: nf_nat(-) btrfs ufs qnx4 hfsplus hfs minix vfat msdos fat ... Hardware name: Default string Default string/SKYBAY, BIOS 5.12 08/04/2020 RIP: 0010:alloc_tag_module_unload+0x22b/0x3f0 codetag_unload_module+0x19b/0x2a0 ? codetag_load_module+0x80/0x80 nf_nat module exit calls kfree_rcu on those addresses, but the free operation is likely still pending by the time alloc_tag checks for leaks. Wait for outstanding kfree_rcu operations to complete before checking resolves this warning. Reproducer: unshare -n iptables-nft -t nat -A PREROUTING -p tcp grep nf_nat /proc/allocinfo # will list 4 allocations rmmod nft_chain_nat rmmod nf_nat # will WARN. [[email protected]: add comment]
[]
null
null
null
null
CVE-2017-6815
In WordPress before 4.7.3 (wp-includes/pluggable.php), control characters can trick redirect URL validation.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
CVE-2024-10592
Mapster WP Maps <= 1.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
RHSA-2022:1158
Red Hat Security Advisory: OpenShift Container Platform 4.9.27 bug fix and security update
ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
8.2
null
null
GHSA-4jgr-2587-qr74
The FireWire driver in IOFireWireFamily in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.
[]
null
null
null
null
GHSA-fw7h-357f-67ff
VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure.
[]
null
3.3
null
null
GHSA-cxfc-q5xx-wr6x
Ultrafunk Popcorn 1.20 allows remote attackers to cause a denial of service (crash) via a malformed Date field that is converted into a year greater than 2037.
[]
null
null
null
null
CVE-2022-28081
A reflected cross-site scripting (XSS) vulnerability in the component Query.php of arPHP v3.6.0 allows attackers to execute arbitrary web scripts.
[ "cpe:2.3:a:ar-php:arphp:3.6.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-9jcg-45pr-7qhw
Unspecified vulnerability in Jelsoft vBulletin before 3.6.6, when unauthenticated User Infraction Permissions is disabled, allows remote attackers to see the infraction "red flag" for a deleted user.
[]
null
null
null
null
CVE-2009-0862
Cross-site scripting (XSS) vulnerability in the hook_cntrlr_error_output function in modules/page/hooks/listeners.php in the admincp component in TangoCMS 2.2.x (aka Eagle) before 2.2.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:tangocms:tangocms:*:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:1.0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:tangocms:tangocms:2.2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-55994
WordPress 畅言评论系统 plugin <= 2.0.5 - Broken Access Control vulnerability
Missing Authorization vulnerability in 搜狐畅言 畅言评论系统 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 畅言评论系统: from n/a through 2.0.5.
[]
null
4.3
null
null
CVE-2009-0982
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.49.19 allows remote authenticated users to affect integrity via unknown vectors.
[ "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.49.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise:*:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2007-0900
Multiple PHP remote file inclusion vulnerabilities in TagIt! Tagboard 2.1.B Build 2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) configpath parameter to (a) tagviewer.php, (b) tag_process.php, and (c) CONFIG/errmsg.inc.php; and (d) addTagmin.php, (e) ban_watch.php, (f) delTagmin.php, (g) delTag.php, (h) editTagmin.php, (i) editTag.php, (j) manageTagmins.php, and (k) verify.php in tagmin/; the (2) adminpath parameter to (l) tagviewer.php, (m) tag_process.php, and (n) tagmin/index.php; and the (3) admin parameter to (o) readconf.php, (p) updateconf.php, (q) updatefilter.php, and (r) wordfilter.php in tagmin/; different vectors than CVE-2006-5249.
[ "cpe:2.3:a:tagit:tagboard:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-34413
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
[ "cpe:2.3:o:dell:r6515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r6515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe8545_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe8545:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r6415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r6415:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7415:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r7425_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r7425:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r750xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r750xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r650:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:mx750c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:mx750c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r650xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r650xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r750xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r750xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xr11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xr11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xr12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xr12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t150:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r740xd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r740xd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r940_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r940:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xr2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r740xd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r740xd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r840_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r840:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r940xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r940xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m640p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m640p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:mx740c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:mx740c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:mx840c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:mx840c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c4140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c4140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:dss8440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:dss8440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r340:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe2420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe2420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xe7440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xe7440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r730_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r730:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r730xd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r730xd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c4130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c4130:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r930:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m630p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m630p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:m830p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:m830p:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:fc830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:fc830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t630_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t630:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r830_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r830:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:c6320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:c6320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t130:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r230:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:t330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:t330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:r330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:r330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3230:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3240:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:nx3340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:nx3340:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-qwmj-9j79-8g4m
Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to obtain sensitive information via vectors involving saving an SWF file to a hard drive, related to a "local sandbox vulnerability."
[]
null
null
null
null
GHSA-qw7r-jh4c-hgfq
XSS exists in Zoho ManageEngine Netflow Analyzer Professional v7.0.0.2 in the Administration zone "/netflow/jspui/editProfile.jsp" file in the userName parameter.
[]
null
null
6.1
null
CVE-2024-7766
Adicon Server <= 1.2 - Admin+ SQL Injection
The Adicon Server WordPress plugin through 1.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
[ "cpe:2.3:a:erichamby:adicon_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:erichamby:adicon_server:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
CVE-2021-39218
Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime
Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where there are no live references at this safepoint, and there is a safepoint with live references earlier in this frame's function. Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes. Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to `wasmtime::Config::wasm_reference_types`.
[ "cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-gqg8-h7gm-47hq
JFrog Artifactory versions below 7.77.7, are vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism.
[]
null
8.8
null
null
CVE-2024-30007
Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:x64:*" ]
null
8.8
null
null
GHSA-rqx4-5362-4v5v
LogicalDoc before 8.3.3 allows /servlet.gupld Directory Traversal, a different vulnerability than CVE-2020-9423 and CVE-2020-10365.
[]
null
null
null
null
CVE-2025-23711
WordPress Quote me plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Quote me allows Reflected XSS. This issue affects Quote me: from n/a through 1.0.
[]
null
7.1
null
null
GHSA-3wx9-g76r-9crv
Missing Authorization vulnerability in Shakeeb Sadikeen RapidLoad allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RapidLoad: from n/a through 2.4.4.
[]
null
4.3
null
null
CVE-2019-7340
POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[Query][terms][0][val]' parameter value in the view filter (filter.php) because proper filtration is omitted.
[ "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-fjqf-3qv4-g42p
The autofill implementation in Google Chrome before 20.0.1132.43 does not properly display text, which has unspecified impact and remote attack vectors.
[]
null
null
null
null
GHSA-8hj4-3g8f-gwwq
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated GIF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[]
null
null
null
null
CVE-2014-9946
In Core Kernel in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-q7g6-89f5-6c2m
The The Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. This functionality is also vulnerable to Reflected Cross-Site Scripting. Version 1.7.0 patched the Reflected XSS issue, however, the arbitrary shortcode execution issue remains.
[]
null
6.5
null
null
GHSA-6xrf-hmv4-8vwv
Multiple cross-site scripting (XSS) vulnerabilities in WikyBlog before 1.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) key parameter to index.php/Special/Main/keywordSearch, (2) revNum parameter to index.php/Edit/Main/Home, (3) to parameter to index.php/Special/Main/WhatLinksHere, (4) user parameter to index.php/Special/Main/UserEdits, and (5) the PATH_INFO to index.php.
[]
null
null
null
null
GHSA-r6hj-9v4h-whwg
SQL injection vulnerability in the BookFlip (com_bookflip) component 2.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the book_id parameter to index.php.
[]
null
null
null
null
GHSA-ccfg-9f3p-jm5r
Qibosoft QiboCMS v7 was discovered to contain a remote code execution (RCE) vulnerability via the Get_Title function at label_set_rs.php
[]
null
8.8
null
null
RHSA-2018:2001
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
CVE-2023-47662
WordPress Live Gold Price & Silver Price Charts Widgets Plugin <= 2.4 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GoldBroker.Com Live Gold Price & Silver Price Charts Widgets plugin <= 2.4 versions.
[ "cpe:2.3:a:goldbroker:live_gold_price_\\&_silver_price_charts_widgets:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
CVE-2018-16956
The AjaxControl component of Oracle WebCenter Interaction Portal 10.3.3 does not validate the names of pages when processing page rename requests. Pages can be renamed to include characters unsupported for URIs by the web server hosting the WCI Portal software (such as IIS). Renaming pages to include unsupported characters, such as 0x7f, prevents these pages from being accessed over the web server, causing a Denial of Service (DoS) to the page. NOTE: this CVE is assigned by MITRE and isn't validated by Oracle because Oracle WebCenter Interaction Portal is out of support.
[ "cpe:2.3:a:oracle:webcenter_interaction:10.3.3:*:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2020-13833
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The system area allows arbitrary file overwrites via a symlink attack. The Samsung ID is SVE-2020-17183 (June 2020).
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
RHSA-2019:2682
Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
[ "cpe:/a:redhat:devtools:2019" ]
null
null
7.5
null
GHSA-gwgx-cqxp-m7q4
Cross-site scripting (XSS) vulnerability in Horde Accounts module before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the parent's frame page title.
[]
null
null
null
null
GHSA-5h56-hp83-f22q
Orca Browser 1.2 build 5 does not properly block data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (3) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header; and does not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (5) injecting a Location HTTP response header or (6) specifying the content of a Location HTTP response header.
[]
null
null
null
null
GHSA-c79h-6wmh-q4mh
SQL injection vulnerability in staticpages/easyecards/index.php in MyioSoft EasyE-Cards 3.5 trial edition (tr) and 3.10a, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the sid parameter in a pickup action.
[]
null
null
null
null
GHSA-9289-82mv-9386
The xatitv program in the gatos package does not properly drop root privileges when the configuration file does not exist, which allows local users to execute arbitrary commands via shell metacharacters in a system call.
[]
null
null
null
null
GHSA-6wm5-xwc9-xpjr
Multiple untrusted search path vulnerabilities in Adobe Device Central CS4 2.0.0 0476 allow local users to gain privileges via a Trojan horse (1) ibfs32.dll or (2) amt_cdb.dll file in the current working directory, as demonstrated by a directory that contains a .adcp file. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2007-2539
The show_files function in RunCms 1.5.2 and earlier allows remote attackers to obtain sensitive information (file existence and file metadata) via unspecified vectors.
[ "cpe:2.3:a:runcms:runcms:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2020-12256
rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.
[ "cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-rgg6-wh38-9vv5
A vulnerability classified as critical has been found in PHPGurukul Daily Expense Tracker System 1.1. This affects an unknown part of the file /expense-datewise-reports-detailed.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
GHSA-3mp6-cvg4-cj7v
Unrestricted Upload of File with Dangerous Type vulnerability in Myriad Solutionz Property Lot Management System allows Upload a Web Shell to a Web Server.This issue affects Property Lot Management System: from n/a through 4.2.38.
[]
null
9.9
null
null
CVE-2017-7606
coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.5-4:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-rv7m-x5vr-r5rg
NVIDIA GPU Display Driver R378 contains a vulnerability in the kernel mode layer handler where improper access control may lead to denial of service or possible escalation of privileges.
[]
null
null
8.8
null
GHSA-4hmm-4p87-cjh8
Marconi ForeThought 7.1 allows remote attackers to cause a denial of service by causing both telnet sessions to be locked via unusual input (e.g., from a port scanner), which prevents others from logging into the device.
[]
null
null
null
null
GHSA-958w-v5jh-m736
Cross-Site Request Forgery (CSRF) vulnerability in Rajeev Chauhan Load More Posts allows Stored XSS.This issue affects Load More Posts: from n/a through 1.4.0.
[]
null
7.1
null
null
GHSA-w4xx-xxh4-422c
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WPFactory EU/UK VAT Manager for WooCommerce allows Cross-Site Scripting (XSS).This issue affects EU/UK VAT Manager for WooCommerce: from n/a through 2.12.14.
[]
null
7.1
null
null
CVE-2024-10434
Tenda AC1206 ate ate_Tenda_mfg_check_usb3 stack-based overflow
A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:ac1206_firmware:*:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
CVE-2024-8276
WPZOOM Portfolio Lite – Filterable Portfolio Plugin <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via align Attribute
The WPZOOM Portfolio Lite – Filterable Portfolio Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ attribute within the 'wp:wpzoom-blocks' Gutenberg block in all versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:wpzoom:wpzoom_portfolio:-:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpzoom:wpzoom_portfolio:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
GHSA-qw5m-vmp3-f553
Magento Open Source allows Incorrect Authorization
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass a minor functionality. Exploitation of this issue does not require user interaction.
[]
6.9
5.3
null
null
GHSA-3fmh-frpw-xcrq
webctrl.cgi.elf on Christie Digital DWU850-GS V06.46 devices allows attackers to perform any desired action via a crafted query containing an unspecified Cookie header. Authentication bypass can be achieved by including an administrative cookie that the device does not validate.
[]
null
null
null
null
GHSA-xg2h-3f4g-42hc
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form.
[]
null
null
null
null
GHSA-353r-3v84-9pjj
Malicious Package in nothing-js
`nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run.RecommendationThis module has been unpublished from the npm Registry. If you find this module in your environment remove it.
[]
null
9.8
null
null
GHSA-cwrc-hc6x-63r7
Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
null
6.1
null
null
GHSA-qrr6-fpf4-x3v4
In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
[]
null
null
null
null
CVE-2021-46203
Taocms v3.0.2 was discovered to contain an arbitrary file read vulnerability via the path parameter.
[ "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-x4mr-7jcx-v2x6
The ECT Provider component in OutSystems Platform Server 10 before 10.0.1104.0 and 11 before 11.9.0 (and LifeTime management console before 11.7.0) allows SSRF for arbitrary outbound HTTP requests.
[]
null
null
null
null
GHSA-7664-jhg9-7j9c
The Lifeline Donation plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2.6. This is due to insufficient verification on the user being supplied during the checkout through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
[]
null
9.8
null
null
CVE-2008-3424
Condor before 7.0.4 does not properly handle wildcards in the ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, or HOSTDENY_WRITE configuration variables in authorization policy lists, which might allow remote attackers to bypass intended access restrictions.
[ "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2018-13420
Google gperftools 2.7 has a memory leak in malloc_extension.cc, related to MallocExtension::Register and InitModule. NOTE: the software maintainer indicates that this is not a bug; it is only a false-positive report from the LeakSanitizer program
[ "cpe:2.3:a:gperftools_project:gperftools:2.7:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2016-4805
Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
[ "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:-:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_workstation_extension:12.0:-:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_module_for_public_cloud:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:opensuse_leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:-:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_live_patching:12.0:-:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2017-7888
Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which makes brute-force attacks easier.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:4.0.4:*:*:*:*:*:*:*" ]
null
null
9.8
5
GHSA-6pcr-45mv-9gp3
Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine.
[]
null
8.4
null
null
GHSA-jr84-3q6c-4x89
Win32 File Enumeration Remote Code Execution Vulnerability.
[]
null
7.5
null
null
CVE-2000-0361
The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information.
[ "cpe:2.3:o:suse:suse_linux:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-m3mh-8r5f-q9v7
TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the port parameter in the setting/setOpenVpnClientCfg function.
[]
null
null
null
null
GHSA-5c8f-8f5q-mw49
The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
[]
null
null
null
null
GHSA-hgw8-98j5-vg4c
Themify Portfolio Post WordPress plugin before 1.1.7 does not sanitise and escape the num_of_pages parameter before outputting it back the response of the themify_create_popup_page_pagination AJAX action (available to any authenticated user), leading to a Reflected Cross-Site Scripting
[]
null
null
null
null
GHSA-32fp-mqg5-24wv
PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP Code Snippets via WordPress metaboxes, which could be used by any user able to edit posts.
[]
null
null
null
null
CVE-2021-34817
A Cross-Site Scripting (XSS) issue in the chat component of Etherpad 1.8.13 allows remote attackers to inject arbitrary JavaScript or HTML by importing a crafted pad.
[ "cpe:2.3:a:etherpad:etherpad:1.8.13:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-qf3v-hhp7-rfh5
The SumaHo application 3.0.0 and earlier for Android and the SumaHo "driving capability" diagnosis result transmission application 1.2.2 and earlier for Android allow man-in-the-middle attackers to spoof servers and obtain sensitive information by leveraging failure to verify SSL/TLS server certificates.
[]
null
null
5.9
null
CVE-2021-45229
Apache Airflow: Reflected XSS via Origin Query Argument in URL
It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below.
[ "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2023-27212
A cross-site scripting (XSS) vulnerability in /php-opos/signup.php of Online Pizza Ordering System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the redirect parameter.
[ "cpe:2.3:a:online_pizza_ordering_system_project:online_pizza_ordering_system:1.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2023-5529
Advanced Page Visit Counter <= 8.0.6 - Admin+ Stored XSS
The Advanced Page Visit Counter WordPress plugin before 8.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
4.8
null
null
CVE-2016-7862
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:x64:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
CVE-2025-30933
WordPress LogisticsHub <= 1.1.6 - Arbitrary File Upload Vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in LiquidThemes LogisticsHub allows Upload a Web Shell to a Web Server. This issue affects LogisticsHub: from n/a through 1.1.6.
[]
null
10
null
null
CVE-2021-4319
Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-4946-85pr-fvxh
vantage6's CORS settings overly permissive
ImpactThe vantage6 server has no restrictions on CORS settings. It should be possible for people to set the allowed origins of the server.The impact is limited because v6 does not use session cookiesPatchesNoWorkaroundsNo
[]
null
4.2
null
null
cisco-sa-20180516-fnd
Cisco IoT Field Network Director Cross-Site Request Forgery Vulnerability
A vulnerability in the web-based management interface of Cisco IoT Field Network Director (IoT-FND) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and alter the data of existing users and groups on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the user has administrative privileges, the attacker could create a new, privileged account to obtain full control over the device interface. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-fnd ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-fnd"]
[]
null
null
8.1
null