id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2011-5149
|
Multiple cross-site scripting (XSS) vulnerabilities in SpamTitan 5.08 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) testaddr or (2) testpass parameter to auth-settings.php; (3) hostname, (4) domainname, or (5) mailserver parameter to setup-relay.php; or (6) subnetmask or (7) defaultroute parameter to setup-network.php.
|
[
"cpe:2.3:a:spamtitan:spamtitan:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2005-4486
|
SQL injection vulnerability in Quantum Art QP7.Enterprise (formerly Q-Publishing) allows remote attackers to execute arbitrary SQL commands via the p_news_id parameter to (1) news_and_events_new.asp and (2) news.asp. NOTE: on 20060227, the vendor disputed the accuracy of this report, saying that the p_news_id, news_and_events_new.asp, and news.asp are not specifically part of their product, although they could be dynamically generated through use of the product. Some investigation by CVE suggests evidence that the news_and_events_new.asp page has at least a forced invalid SQL syntax error, but this could not be repeated for news.asp
|
[
"cpe:2.3:a:quantum_art:qp7_enterprise:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xpfq-7j72-x4px
|
Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.
|
[] | null | 4 | null | null |
|
GHSA-693h-v7jp-h34f
|
Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null |
|
GHSA-8255-6mr6-q2p6
|
The Remote Desktop Protocol (RDP) server service in Microsoft Windows 7 SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a series of crafted packets, aka "Remote Desktop Protocol (RDP) Remote Code Execution Vulnerability."
|
[] | null | null | null | null |
|
GHSA-5prq-xj94-2jrc
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is prior to 5.2.22. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.2 | null |
|
CVE-2014-2279
|
Multiple directory traversal vulnerabilities in SeedDMS (formerly LetoDMS and MyDMS) before 4.3.4 allow (1) remote authenticated users with access to the LogManagement functionality to read arbitrary files via a .. (dot dot) in the logname parameter to out/out.LogManagement.php or (2) remote attackers to write to arbitrary files via a .. (dot dot) in the fileId parameter to op/op.AddFile2.php. NOTE: vector 2 can be leveraged to execute arbitrary code by using CVE-2014-2278.
|
[
"cpe:2.3:a:seeddms:seeddms:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2021-1468
|
Cisco SD-WAN vManage Software Vulnerabilities
|
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-mgxr-46rv-3m86
|
Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.
|
[] | null | null | null | null |
|
GHSA-xqm3-rc5r-j547
|
The com.video.downloader.all (aka All Video Downloader) application through 11.28 for Android allows an attacker to execute arbitrary JavaScript code via the com.video.downloader.all.StartActivity component.
|
[] | null | 8.1 | null | null |
|
GHSA-7gxv-3j97-m24j
|
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Connections 4.x through 4.5 CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string, a different vulnerability than CVE-2016-3001 and CVE-2016-3006.
|
[] | null | null | 5.4 | null |
|
CVE-2018-20136
|
XSS exists in FUEL CMS 1.4.3 via the Header or Body in the Layout Variables during new-page creation, as demonstrated by the pages/edit/1?lang=english URI.
|
[
"cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.3:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2024-35873
|
riscv: Fix vector state restore in rt_sigreturn()
|
In the Linux kernel, the following vulnerability has been resolved:
riscv: Fix vector state restore in rt_sigreturn()
The RISC-V Vector specification states in "Appendix D: Calling
Convention for Vector State" [1] that "Executing a system call causes
all caller-saved vector registers (v0-v31, vl, vtype) and vstart to
become unspecified.". In the RISC-V kernel this is called "discarding
the vstate".
Returning from a signal handler via the rt_sigreturn() syscall, vector
discard is also performed. However, this is not an issue since the
vector state should be restored from the sigcontext, and therefore not
care about the vector discard.
The "live state" is the actual vector register in the running context,
and the "vstate" is the vector state of the task. A dirty live state,
means that the vstate and live state are not in synch.
When vectorized user_from_copy() was introduced, an bug sneaked in at
the restoration code, related to the discard of the live state.
An example when this go wrong:
1. A userland application is executing vector code
2. The application receives a signal, and the signal handler is
entered.
3. The application returns from the signal handler, using the
rt_sigreturn() syscall.
4. The live vector state is discarded upon entering the
rt_sigreturn(), and the live state is marked as "dirty", indicating
that the live state need to be synchronized with the current
vstate.
5. rt_sigreturn() restores the vstate, except the Vector registers,
from the sigcontext
6. rt_sigreturn() restores the Vector registers, from the sigcontext,
and now the vectorized user_from_copy() is used. The dirty live
state from the discard is saved to the vstate, making the vstate
corrupt.
7. rt_sigreturn() returns to the application, which crashes due to
corrupted vstate.
Note that the vectorized user_from_copy() is invoked depending on the
value of CONFIG_RISCV_ISA_V_UCOPY_THRESHOLD. Default is 768, which
means that vlen has to be larger than 128b for this bug to trigger.
The fix is simply to mark the live state as non-dirty/clean prior
performing the vstate restore.
|
[] | null | null | null | null |
CVE-2025-22262
|
WordPress Bonjour Bar plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bonjour Bar allows Stored XSS. This issue affects Bonjour Bar: from n/a through 1.0.0.
|
[] | null | 5.9 | null | null |
CVE-2024-55980
|
WordPress Wr Age Verification plugin <= 2.0.0 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Webriderz Wr Age Verification allows SQL Injection.This issue affects Wr Age Verification: from n/a through 2.0.0.
|
[] | null | 9.3 | null | null |
CVE-2018-15182
|
PHP Scripts Mall Car Rental Script 2.0.8 has XSS via the FirstName and LastName fields.
|
[
"cpe:2.3:a:car_rental_script_project:car_rental_script:2.0.8:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-gwf5-4jv2-9667
|
Novell Access Management 3 SSLVPN Server allows remote authenticated users to bypass VPN restrictions by making policy.txt read-only, disconnecting, then manually modifying policy.txt.
|
[] | null | null | null | null |
|
GHSA-mr2g-23mq-vj3h
|
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product’s login authentication by falsifying request parameters on affected installations.
|
[] | null | 9.8 | null | null |
|
CVE-2020-15693
|
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values.
|
[
"cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 |
|
GHSA-3j5q-94qj-cf33
|
A vulnerability, which was classified as critical, has been found in code-projects Simple Forum 1.0. This issue affects some unknown processing of the file /forum1.php. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 6.3 | null | null |
|
GHSA-hv53-vf5m-8q94
|
personnummer/go vulnerable to Improper Input Validation
|
This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.The vulnerability is determined to be low severity.ImpactThis vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.PatchesThe issue have been patched in all repositories. The following versions should be updated to as soon as possible:[C#](https://github.com/advisories/GHSA-qv8q-v995-72gr) 3.0.2
D 3.0.1
[Dart](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm) 3.0.3
Elixir 3.0.0
[Go](https://github.com/advisories/GHSA-hv53-vf5m-8q94) 3.0.1
[Java](https://github.com/advisories/GHSA-q3vw-4jx3-rrr2) 3.3.0
[JavaScript](https://github.com/advisories/GHSA-vpgc-7h78-gx8f) 3.1.0
Kotlin 1.1.0
Lua 3.0.1
[PHP](https://github.com/advisories/GHSA-2p6g-gjp8-ggg9) 3.0.2
Perl 3.0.0
[Python](https://github.com/advisories/GHSA-rxq3-5249-8hgg) 3.0.2
[Ruby](https://github.com/advisories/GHSA-vp9c-fpxx-744v) 3.0.1
[Rust](https://github.com/advisories/GHSA-28r9-pq4c-wp3c) 3.0.0
Scala 3.0.1
Swift 1.0.1If you are using any of the earlier packages, please update to latest.WorkaroundsThe issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.For more informationIf you have any questions or comments about this advisory:Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)Email us at [Personnummer Email](mailto:[email protected])
|
[] | null | null | null | null |
GHSA-9cv6-r3hh-f79w
|
The asset discovery scanner in AlienVault OSSIM before 5.0.1 allows remote authenticated users to execute arbitrary commands via the assets array parameter to netscan/do_scan.php.
|
[] | null | null | 7.2 | null |
|
GHSA-4g9w-6f9w-cjc7
|
MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function OTExtensionWithMatrix::extend in /OT/OTExtensionWithMatrix.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message.
|
[] | null | 7.5 | null | null |
|
GHSA-mf9j-2973-hww3
|
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254.
|
[] | null | null | 9.8 | null |
|
GHSA-ffgw-jxv7-9vp7
|
Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null |
|
GHSA-8p5x-59f8-f4c8
|
The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
|
[] | null | null | 5.5 | null |
|
GHSA-7457-jp56-wxrq
|
In the Linux kernel, the following vulnerability has been resolved:powerpc/64s: fix program check interrupt emergency stack pathEmergency stack path was jumping into a 3: label inside the
__GEN_COMMON_BODY macro for the normal path after it had finished,
rather than jumping over it. By a small miracle this is the correct
place to build up a new interrupt frame with the existing stack
pointer, so things basically worked okay with an added weird looking
700 trap frame on top (which had the wrong ->nip so it didn't decode
bug messages either).Fix this by avoiding using numeric labels when jumping over non-trivial
macros.Before:LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in:
CPU: 0 PID: 88 Comm: sh Not tainted 5.15.0-rc2-00034-ge057cdade6e5 #2637
NIP: 7265677368657265 LR: c00000000006c0c8 CTR: c0000000000097f0
REGS: c0000000fffb3a50 TRAP: 0700 Not tainted
MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 00000700 XER: 20040000
CFAR: c0000000000098b0 IRQMASK: 0
GPR00: c00000000006c964 c0000000fffb3cf0 c000000001513800 0000000000000000
GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
NIP [7265677368657265] 0x7265677368657265
LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
Call Trace:
[c0000000fffb3cf0] [c00000000000bdac] soft_nmi_common+0x13c/0x1d0 (unreliable)
--- interrupt: 700 at decrementer_common_virt+0xb8/0x230
NIP: c0000000000098b8 LR: c00000000006c0c8 CTR: c0000000000097f0
REGS: c0000000fffb3d60 TRAP: 0700 Not tainted
MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 22424282 XER: 20040000
CFAR: c0000000000098b0 IRQMASK: 0
GPR00: c00000000006c964 0000000000002400 c000000001513800 0000000000000000
GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
NIP [c0000000000098b8] decrementer_common_virt+0xb8/0x230
LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
--- interrupt: 700
Instruction dump:
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
---[ end trace 6d28218e0cc3c949 ]---After:------------[ cut here ]------------
kernel BUG at arch/powerpc/kernel/exceptions-64s.S:491!
Oops: Exception in kernel mode, sig: 5 [#1]
LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in:
CPU: 0 PID: 88 Comm: login Not tainted 5.15.0-rc2-00034-ge057cdade6e5-dirty #2638
NIP: c0000000000098b8 LR: c00000000006bf04 CTR: c0000000000097f0
REGS: c0000000fffb3d60 TRAP: 0700 Not tainted
MSR: 9000000000021031 <SF,HV,ME,IR,DR,LE> CR: 24482227 XER: 00040000
CFAR: c0000000000098b0 IRQMASK: 0
GPR00: c00000000006bf04 0000000000002400 c000000001513800 c000000001271868
GPR04: 00000000100f0d29 0000000042000000 0000000000000007 0000000000000009
GPR08: 00000000100f0d29 0000000024482227 0000000000002710 c000000000181b3c
GPR12: 9000000000009033 c0000000016b0000 00000000100f0d29 c000000005b22f00
GPR16: 00000000ffff0000 0000000000000001 0000000000000009 00000000100eed90
GPR20: 00000000100eed90 00000
---truncated---
|
[] | null | null | null | null |
|
CVE-2014-4560
|
Cross-site scripting (XSS) vulnerability in includes/getTipo.php in the ToolPage plugin 1.6.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the t parameter.
|
[
"cpe:2.3:a:toolpage_project:toolpage:*:-:-:*:-:wordpress:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-24411
|
Adobe Illustrator PDF File Parsing Out-Of-Bounds Write Vulnerability
|
Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds write vulnerability when handling crafted PDF files. This could result in a write past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
|
[
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2021-24822
|
Stylish Cost Calculator < 7.04 - Subscriber+ Unauthorised AJAX Calls to Stored XSS
|
The Stylish Cost Calculator WordPress plugin before 7.0.4 does not have any authorisation and CSRF checks on some of its AJAX actions (available to authenticated users), which could allow any authenticated users, such as subscriber to call them, and perform Stored Cross-Site Scripting attacks against logged in admin, as well as frontend users due to the lack of sanitisation and escaping in some parameters
|
[
"cpe:2.3:a:stylishcostcalculator:stylish_cost_calculator:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
GHSA-82p7-64v9-fpv5
|
Incorrect Privilege Assignment vulnerability in Jauhari Xelion Xelion Webchat allows Privilege Escalation. This issue affects Xelion Webchat: from n/a through 9.1.0.
|
[] | null | 8.8 | null | null |
|
CVE-2023-35382
|
Windows Kernel Elevation of Privilege Vulnerability
|
Windows Kernel Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-72vv-fghx-58jc
|
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious application may be able to modify protected parts of the file system.
|
[] | null | 5.5 | null | null |
|
CVE-2024-13727
|
MemberSpace – Membership Plugin and Paid Subscriptions < 2.1.14 - Reflected XSS
|
The MemberSpace WordPress plugin before 2.1.14 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users.
|
[] | null | 6.1 | null | null |
CVE-2024-2629
|
Incorrect security UI in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-gq32-8f5q-75g2
|
An elevation of privilege vulnerability exists when the Windows Profile Service improperly handles file operations, aka 'Windows Profile Service Elevation of Privilege Vulnerability'.
|
[] | null | null | null | null |
|
GHSA-cvjm-jx7m-3jqc
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Stark CRM 1.0 allow remote attackers to hijack the authentication of administrators for requests that add (1) an administrator via a crafted request to the admin page, (2) an agent via a crafted request to the agent page, (3) a sub-agent via a crafted request to the sub_agent page, (4) a partner via a crafted request to the partner page, or (5) a client via a crafted request to the client page.
|
[] | null | null | null | null |
|
GHSA-58pq-gm76-v728
|
** DISPUTED ** PHP remote file inclusion vulnerability in index.php in PBLang (PBL) 4.60 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the dbpath parameter, a different vector than CVE-2006-5062. NOTE: this issue has been disputed by a reliable third party for 4.65, stating that the dbpath variable is initialized in an included file that is created upon installation.
|
[] | null | null | null | null |
|
GHSA-3h52-vv68-p6m9
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Joost de Valk Enhanced WP Contact Form plugin <= 2.2.3 versions.
|
[] | null | 5.9 | null | null |
|
GHSA-p62h-hghf-j328
|
Multiple cross-site scripting (XSS) vulnerabilities in SpringSource tc Server 6.0.20.B and earlier, Application Management Suite (AMS) before 2.0.0.SR4, Hyperic HQ Open Source before 4.2.x, Hyperic HQ 4.0 Enterprise before 4.0.3.2, and Hyperic HQ 4.1 Enterprise before 4.1.2.1 allow remote attackers to inject arbitrary web script or HTML via the description field and unspecified "input fields."
|
[] | null | null | null | null |
|
CVE-2015-8808
|
The DecodeImage function in coders/gif.c in GraphicsMagick 1.3.18 allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted GIF file.
|
[
"cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-ph7c-w6m3-q8rv
|
PDFdirectory before 1.0 stores sensitive data in plaintext, which allows remote attackers to obtain arbitrary users' passwords by direct queries to the database, possibly via one of the SQL injection vulnerabilities.
|
[] | null | null | null | null |
|
GHSA-jvh2-r8jp-5mg5
|
Missing Authorization vulnerability in softpulseinfotech SP Blog Designer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SP Blog Designer: from n/a through 1.0.0.
|
[] | null | 4.8 | null | null |
|
GHSA-c369-gmg5-w8pw
|
An improper neutralization of input during web page generation in the SSL VPN portal of FortiProxy version 2.0.0, version 1.2.9 and below and FortiOS version 6.2.1 and below, version 6.0.8 and below, version 5.6.12 may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS).
|
[] | null | 4.1 | null | null |
|
GHSA-858j-c6fv-3gv7
|
Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
|
[] | null | null | 9.8 | null |
|
GHSA-m526-2mp7-c7gx
|
The LTL Freight Quotes – Estes Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 7.5 | null | null |
|
CVE-2017-3798
|
A cross-site scripting (XSS) filter bypass vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to mount XSS attacks against a user of an affected device. More Information: CSCvb97237. Known Affected Releases: 11.0(1.10000.10) 11.5(1.10000.6). Known Fixed Releases: 11.5(1.12029.1) 11.5(1.12900.11) 12.0(0.98000.369) 12.0(0.98000.370) 12.0(0.98000.398) 12.0(0.98000.457).
|
[
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.12000.1\\):*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-rrrm-qjm4-v8hf
|
Inefficient Regular Expression Complexity in marked
|
Impact_What kind of vulnerability is it?_Denial of service.The regular expression `block.def` may cause catastrophic backtracking against some strings.
PoC is the following._Who is impacted?_Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.Patches_Has the problem been patched?_Yes_What versions should users upgrade to?_4.0.10Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources.References_Are there any links users can visit to find out more?_https://marked.js.org/using_advanced#workershttps://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoSFor more informationIf you have any questions or comments about this advisory:Open an issue in [marked](https://github.com/markedjs/marked)
|
[] | null | 7.5 | null | null |
CVE-2020-2318
|
Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
|
[
"cpe:2.3:a:jenkins:mail_commander:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2007-2532
|
Multiple cross-site scripting (XSS) vulnerabilities in Minh Nguyen Duong Obie Website Mini Web Shop 2 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO (query string) to (1) sendmail.php or (2) order_form.php, different vectors than CVE-2006-6734.
|
[
"cpe:2.3:a:obie_website:mini_web_shop:2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gjjh-hh7r-99cv
|
Buffer overflow in Chinput 3.0 allows local users to execute arbitrary code via a long HOME environment variable.
|
[] | null | null | null | null |
|
CVE-2002-0540
|
Nortel CVX 1800 is installed with a default "public" community string, which allows remote attackers to read usernames and passwords and modify the CVX configuration.
|
[
"cpe:2.3:h:nortel:cvx_1800_multi-service_access_switch:3.6.3:patch24:*:*:*:*:*:*",
"cpe:2.3:h:nortel:cvx_1800_multi-service_access_switch:3.6.3:patch25:*:*:*:*:*:*",
"cpe:2.3:h:nortel:cvx_1800_multi-service_access_switch:3.6.3:patch5:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7j5c-w63j-h48p
|
In the Linux kernel, the following vulnerability has been resolved:net/ipv6: avoid possible UAF in ip6_route_mpath_notify()syzbot found another use-after-free in ip6_route_mpath_notify() [1]Commit f7225172f25a ("net/ipv6: prevent use after free in
ip6_route_mpath_notify") was not able to fix the root cause.We need to defer the fib6_info_release() calls after
ip6_route_mpath_notify(), in the cleanup phase.[1]
BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0
Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:377 [inline]
print_report+0x167/0x540 mm/kasan/report.c:488
kasan_report+0x142/0x180 mm/kasan/report.c:601
rt6_fill_node+0x1460/0x1ac0
inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184
ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]
ip6_route_multipath_add net/ipv6/route.c:5404 [inline]
inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517
rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:745
____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
___sys_sendmsg net/socket.c:2638 [inline]
__sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
do_syscall_64+0xf9/0x240
entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f73dd87dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005
RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858
</TASK>Allocated by task 23037:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
__kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
kasan_kmalloc include/linux/kasan.h:211 [inline]
__do_kmalloc_node mm/slub.c:3981 [inline]
__kmalloc+0x22e/0x490 mm/slub.c:3994
kmalloc include/linux/slab.h:594 [inline]
kzalloc include/linux/slab.h:711 [inline]
fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155
ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758
ip6_route_multipath_add net/ipv6/route.c:5298 [inline]
inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517
rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:745
____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
___sys_sendmsg net/socket.c:2638 [inline]
__sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
do_syscall_64+0xf9/0x240
entry_SYSCALL_64_after_hwframe+0x6f/0x77Freed by task 16:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
poison_slab_object+0xa6/0xe0 m
---truncated---
|
[] | null | 7.8 | null | null |
|
CVE-2023-50290
|
Apache Solr: Host environment variables are published via the Metrics API
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.
The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess.
The Solr Metrics API is protected by the "metrics-read" permission.
Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission.
This issue affects Apache Solr: from 9.0.0 before 9.3.0.
Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
|
[
"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2012-4097
|
The BGP implementation in Cisco NX-OS does not properly filter segment types in AS paths, which allows remote attackers to cause a denial of service (BGP service reset) via a malformed UPDATE message, aka Bug ID CSCtn13043.
|
[
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-wq6m-fwgx-fx9f
|
The Membership & Content Restriction – Paid Member Subscriptions WordPress plugin before 2.4.2 did not sanitise, validate or escape its order and orderby parameters before using them in SQL statement, leading to Authenticated SQL Injections in the Members and Payments pages.
|
[] | null | 8.8 | null | null |
|
GHSA-h6gq-c3rh-ppvj
|
D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20559.
|
[] | null | null | 6.8 | null |
|
CVE-2024-4885
|
WhatsUp Gold GetFileWithoutZip Directory Traversal Remote Code Execution Vulnerability
|
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The
WhatsUp.ExportUtilities.Export.GetFileWithoutZip
allows execution of commands with iisapppool\nmconsole privileges.
|
[
"cpe:2.3:a:progress:whatsup_gold:2023.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-pj36-9rxw-2h2x
|
In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
|
[] | null | 9.8 | null | null |
|
CVE-2000-1219
|
The -ftrapv compiler option in gcc and g++ 3.3.3 and earlier does not handle all types of integer overflows, which may leave applications vulnerable to vulnerabilities related to overflows.
|
[
"cpe:2.3:a:gnu:g\\+\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gcc:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-f3fq-q8w4-w2rr
|
Rejected reason: Not used
|
[] | null | null | null | null |
|
RHSA-2008:0812
|
Red Hat Security Advisory: RealPlayer security update
|
RealPlayer: SWF Frame Handling Buffer Overflow
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
CVE-2006-4278
|
PHP remote file inclusion vulnerability in includes/layout/plain.footer.php in SportsPHool 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the mainnav parameter.
|
[
"cpe:2.3:a:sportsphool:sportsphool:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xqp7-9f97-535f
|
When a non-existent resource is requested, the LCDS LAquis SCADA application (version 4.3.1.1011 and prior) returns error messages which may allow reflected cross-site scripting.
|
[] | null | 6.1 | null | null |
|
GHSA-hmjj-c274-5v4r
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Additional Custom Product Tabs for WooCommerce allows Stored XSS. This issue affects Additional Custom Product Tabs for WooCommerce: from n/a through 1.7.0.
|
[] | null | 6.5 | null | null |
|
CVE-2023-51404
|
WordPress My Agile Privacy Plugin <= 2.1.7 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MyAgilePrivacy My Agile Privacy – The only GDPR solution for WordPress that you can truly trust allows Stored XSS.This issue affects My Agile Privacy – The only GDPR solution for WordPress that you can truly trust: from n/a through 2.1.7.
|
[
"cpe:2.3:a:myagileprivacy:my_agile_privacy:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2018-3942
|
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8 | null |
|
CVE-2013-6834
|
The ql_eioctl function in sys/dev/qlxgbe/ql_ioctl.c in the kernel in FreeBSD 10 and earlier does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
|
[
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:0.4_1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.2:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2008-6852
|
SQL injection vulnerability in the Ice Gallery (com_ice) component 0.5 beta 2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"cpe:2.3:a:markus_donhauser:ice_gallery_component_for_joomla:0.5:beta2:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2025:9149
|
Red Hat Security Advisory: skopeo security update
|
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
|
[
"cpe:/o:redhat:enterprise_linux:10.0"
] | null | 5.4 | null | null |
PYSEC-2021-521
| null |
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null |
CVE-2024-53821
|
WordPress Pie Register Premium plugin < 3.8.3.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Genetech Pie Register Premium allows Reflected XSS.This issue affects Pie Register Premium: from n/a before 3.8.3.3.
|
[] | null | 7.1 | null | null |
GHSA-gw9f-frr6-h3c2
|
NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
|
[] | null | 6.5 | null | null |
|
GHSA-cgff-4xfm-p3wr
|
The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
|
[] | null | null | 5.5 | null |
|
GHSA-7p7j-x9w2-xpj5
|
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard.
|
[] | null | null | null | null |
|
RHSA-2024:2062
|
Red Hat Security Advisory: Service Telemetry Framework 1.5.4 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:stf:1.5::el8"
] | null | 7.5 | null | null |
GHSA-wx6x-cx9j-ghxj
|
(1) caloggerd.exe (camt70.dll) and (2) mediasvr.exe (catirpc.dll and rwxdr.dll) in CA BrightStor Backup 11.5.2.0 SP2 allow remote attackers to cause a denial of service (NULL dereference and application crash) via a crafted RPC packet.
|
[] | null | null | null | null |
|
CVE-2006-5010
|
Untrusted search path vulnerability in acctctl in IBM AIX 5.3.0 allows local users to execute arbitrary commands by modifying the path to point to a malicious mkdir program.
|
[
"cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2022-1226
|
Cross-site Scripting (XSS) in phpipam/phpipam
|
A Cross-Site Scripting (XSS) vulnerability in phpipam/phpipam versions prior to 1.4.7 allows attackers to execute arbitrary JavaScript code in the browser of a victim. This vulnerability affects the import Data set feature via a spreadsheet file upload. The affected endpoints include import-vlan-preview.php, import-subnets-preview.php, import-vrf-preview.php, import-ipaddr-preview.php, import-devtype-preview.php, import-devices-preview.php, and import-l2dom-preview.php. The vulnerability can be exploited by uploading a specially crafted spreadsheet file containing malicious JavaScript payloads, which are then executed in the context of the victim's browser. This can lead to defacement of websites, execution of malicious JavaScript code, stealing of user cookies, and unauthorized access to user accounts.
|
[
"cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*"
] | null | null | 3.5 | null |
CVE-2025-21951
|
bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
|
In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
There are multiple places from where the recovery work gets scheduled
asynchronously. Also, there are multiple places where the caller waits
synchronously for the recovery to be completed. One such place is during
the PM shutdown() callback.
If the device is not alive during recovery_work, it will try to reset the
device using pci_reset_function(). This function internally will take the
device_lock() first before resetting the device. By this time, if the lock
has already been acquired, then recovery_work will get stalled while
waiting for the lock. And if the lock was already acquired by the caller
which waits for the recovery_work to be completed, it will lead to
deadlock.
This is what happened on the X1E80100 CRD device when the device died
before shutdown() callback. Driver core calls the driver's shutdown()
callback while holding the device_lock() leading to deadlock.
And this deadlock scenario can occur on other paths as well, like during
the PM suspend() callback, where the driver core would hold the
device_lock() before calling driver's suspend() callback. And if the
recovery_work was already started, it could lead to deadlock. This is also
observed on the X1E80100 CRD.
So to fix both issues, use pci_try_reset_function() in recovery_work. This
function first checks for the availability of the device_lock() before
trying to reset the device. If the lock is available, it will acquire it
and reset the device. Otherwise, it will return -EAGAIN. If that happens,
recovery_work will fail with the error message "Recovery failed" as not
much could be done.
|
[] | null | 5.5 | null | null |
CVE-2022-31680
|
The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.
|
[
"cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3d:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3f:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3k:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3n:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3p:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3q:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3r:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3s:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3t:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:update3u:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
GHSA-w399-9p4f-cg3q
|
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership.
|
[] | null | 7.8 | null | null |
|
CVE-2024-41692
|
Incorrect Access Control Vulnerability
|
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the root shell on the vulnerable system.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary commands with root privileges on the targeted system.
|
[
"cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*"
] | 8.6 | null | null | null |
GHSA-rrm6-wvj7-cwh2
|
sqlparse contains a regular expression that is vulnerable to Regular Expression Denial of Service
|
ImpactThe SQL parser contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The vulnerability may lead to Denial of Service (DoS).PatchesThis issues has been fixed in sqlparse 0.4.4.WorkaroundsNone.ReferencesThis issue was discovered and reported by GHSL team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).Commit that introduced the vulnerability: e75e35869473832a1eb67772b1adfee2db11b85a
|
[] | 6.9 | 5.5 | null | null |
RHSA-2014:1882
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2021-4171
|
Business Logic Errors in janeczku/calibre-web
|
calibre-web is vulnerable to Business Logic Errors
|
[
"cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*"
] | null | null | 7.7 | null |
GHSA-6wjh-6xpp-x5j3
|
Microsoft Internet Explorer 6 on Windows XP SP2 and SP3, and Internet Explorer 7 on Vista, allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls createElement to create an instance of the LI element, and then calls setAttribute to set the value attribute.
|
[] | null | null | null | null |
|
GHSA-rjxr-qvqf-h58w
|
There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.
|
[] | null | 8.4 | null | null |
|
CVE-2021-43481
|
An SQL Injection vulnerability exists in Webtareas 2.4p3 and earlier via the $uq HTTP POST parameter in editapprovalstage.php.
|
[
"cpe:2.3:a:webtareas_project:webtareas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webtareas_project:webtareas:2.4:-:*:*:*:*:*:*",
"cpe:2.3:a:webtareas_project:webtareas:2.4:p3:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-88gf-qqgm-77w7
|
Unrestricted Upload of File with Dangerous Type vulnerability in TMT Lockcell allows Command Injection.This issue affects Lockcell: before 15.
|
[] | null | 10 | null | null |
|
GHSA-99hp-8rpj-7hmj
|
An issue in OneFlow-Inc. Oneflow v0.9.1 allows attackers to cause a Denial of Service (DoS) when an empty array is processed with oneflow.tensordot.
|
[] | null | 7.5 | null | null |
|
CVE-2022-38429
|
Adobe Photoshop SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2022-29417
|
WordPress ShortPixel Adaptive Images plugin <= 3.3.1 - Subscriber+ Plugin Settings Update vulnerability
|
Plugin Settings Update vulnerability in ShortPixel's ShortPixel Adaptive Images plugin <= 3.3.1 at WordPress allows an attacker with a low user role like a subscriber or higher to change the plugin settings.
|
[
"cpe:2.3:a:shortpixel:shortpixel_adaptive_images:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-j94p-gv3v-cg5q
|
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device
|
[] | null | 3.1 | null | null |
|
CVE-2020-3954
|
Open Redirect vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation.
|
[
"cpe:2.3:a:vmware:vrealize_log_insight:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
CVE-2024-26236
|
Windows Update Stack Elevation of Privilege Vulnerability
|
Windows Update Stack Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7 | null | null |
CVE-2023-29741
|
An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause an escalation of privileges attack by manipulating the database.
|
[
"cpe:2.3:a:bestweather_project:bestweather:7.3.1:*:*:*:*:android:*:*"
] | null | 9.8 | null | null |
|
GHSA-559v-r8mm-v2r5
|
In audio DSP, there is a possible memory corruption due to improper casting. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06558822; Issue ID: ALPS06558822.
|
[] | null | 6.7 | null | null |
|
RHSA-2020:0078
|
Red Hat Security Advisory: rabbitmq-server security update
|
rabbitmq-server: improper sanitization of vhost limits and federation management UI pages rabbitmq-server: "X-Reason" HTTP Header can be leveraged to insert a malicious string leading to DoS
|
[
"cpe:/a:redhat:openstack:15::el8"
] | null | 7.5 | 4.9 | null |
CVE-2001-0832
|
Vulnerability in Oracle 8.0.x through 9.0.1 on Unix allows local users to overwrite arbitrary files, possibly via a symlink attack or incorrect file permissions in (1) the ORACLE_HOME/rdbms/log directory or (2) an alternate directory as specified in the ORACLE_HOME environmental variable, aka the "Oracle File Overwrite Security Vulnerability."
|
[
"cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:8.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.