id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-p8qw-2q25-j7x7
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory.We have already fixed the vulnerability in the following versions: QTS 5.2.1.2930 build 20241025 and later QuTS hero h5.2.1.2929 build 20241025 and later
[]
2.1
null
null
null
CVE-2020-27291
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.
[ "cpe:2.3:a:deltaww:cncsoft-b:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2002-0049
Microsoft Exchange Server 2000 System Attendant gives "Everyone" group privileges to the WinReg key, which could allow remote attackers to read or modify registry keys.
[ "cpe:2.3:a:microsoft:exchange_server:2000:-:*:*:*:*:*:*" ]
null
null
null
6.4
CVE-2005-2720
Stack-based buffer overflow in the ACE archive decompression library (vrAZace.dll) in HAURI Anti-Virus products including ViRobot Expert 4.0, Advanced Server, Linux Server 2.0, and LiveCall, when compressed file scanning is enabled, allows remote attackers to execute arbitrary code via an ACE archive that contains a file with a long filename.
[ "cpe:2.3:a:hauri:livecall:*:*:*:*:*:*:*:*", "cpe:2.3:a:hauri:virobot_advanced_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:hauri:virobot_expert:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:hauri:virobot_linux_server:2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-25371
Unauth Path Traversal with file corruption affecting the Birt plugin of Apache OFBiz
Apache OFBiz uses the Birt project plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. By leveraging a bug in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) it is possible to perform a remote code execution (RCE) attack in Apache OFBiz, release 18.12.05 and earlier.
[ "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-995j-4q8r-wq8h
In FreeBSD 11.3-PRERELEASE before r345378, 12.0-STABLE before r345377, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in pf does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet allowing a maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable.
[]
null
null
7.5
null
GHSA-fhc9-mwwq-6p67
Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2024-49678
WordPress js paper theme <= 2.5.7 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jinwen js allows Reflected XSS.This issue affects js paper: from n/a through 2.5.7.
[]
null
7.1
null
null
CVE-2014-3757
SQL injection vulnerability in sorter.php in the phpManufaktur kitForm extension 0.43 and earlier for the KeepInTouch (KIT) module allows remote attackers to execute arbitrary SQL commands via the sorter_value parameter.
[ "cpe:2.3:a:phpmanufaktur:kitform:*:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.10:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.11:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.12:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.13:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.14:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.15:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.16:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.17:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.18:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.19:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.20:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.21:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.22:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.23:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.24:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.25:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.26:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.27:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.28:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.29:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.30:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.31:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.32:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.33:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.34:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.35:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.36:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.37:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.38:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.39:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.40:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.41:*:*:*:*:keepintouch:*:*", "cpe:2.3:a:phpmanufaktur:kitform:0.42:*:*:*:*:keepintouch:*:*" ]
null
null
null
7.5
CVE-2018-20780
Traq 3.7.1 allows admin/users/new CSRF to create an admin account (aka group_id=1).
[ "cpe:2.3:a:traq:traq:3.7.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2010-2082
The web interface on the Cisco Scientific Atlanta WebSTAR DPC2100R2 cable modem with firmware 2.0.2r1256-060303 has a default administrative password (aka SAPassword) of W2402, which makes it easier for remote attackers to obtain privileged access.
[ "cpe:2.3:h:cisco:scientific_atlanta_webstar_dpc2100r2:2.0.2r1256-060303:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2022:6996
Red Hat Security Advisory: thunderbird security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
GHSA-988p-x9r4-85ff
Multiple buffer overflows in LScube libnemesi 0.6.4-rc1 and earlier allow remote attackers to execute arbitrary code via (1) a reply that begins with a long version string, which triggers an overflow in handle_rtsp_pkt in rtsp_handlers.c; long headers that trigger overflows in (2) send_pause_request, (3) send_play_request, (4) send_setup_request, or (5) send_teardown_request in rtsp_send.c, as demonstrated by the Content-Base header; or a long Transport header, which triggers an overflow in (6) get_transport_str_sctp, (7) get_transport_str_tcp, or (8) get_transport_str_udp in rtsp_transport.c.
[]
null
null
null
null
GHSA-fqqf-x789-rf7j
Cross-site request forgery (CSRF) vulnerability in Serendipity 0.8.4 and earlier allows remote attackers to perform unauthorized actions as a logged in user via a link or IMG tag to serendipity_admin.php.
[]
null
null
null
null
CVE-2018-7939
Huawei smart phones G9 Lite, Honor 5A, Honor 6X, Honor 8 with the versions before VNS-L53C605B120CUSTC605D103, the versions before CAM-L03C605B143CUSTC605D008, the versions before CAM-L21C10B145, the versions before CAM-L21C185B156, the versions before CAM-L21C223B133, the versions before CAM-L21C432B210, the versions before CAM-L21C464B170, the versions before CAM-L21C636B245, the versions before Berlin-L21C10B372, the versions before Berlin-L21C185B363, the versions before Berlin-L21C464B137, the versions before Berlin-L23C605B161, the versions before FRD-L09C10B387, the versions before FRD-L09C185B387, the versions before FRD-L09C432B398, the versions before FRD-L09C636B387, the versions before FRD-L19C10B387, the versions before FRD-L19C432B399, the versions before FRD-L19C636B387 have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can disable the boot wizard by enable the talkback function. As a result, the FRP function is bypassed.
[ "cpe:2.3:o:huawei:g9_lite_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:g9_lite:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_5a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_5a:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_5a:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_6x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_6x:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_8:-:*:*:*:*:*:*:*" ]
null
null
4.6
4.9
GHSA-vm3c-9mrc-6h7c
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
[]
null
8.8
null
null
GHSA-vpgr-3phg-xpw7
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
[]
null
7.8
null
null
GHSA-35cq-g3fr-gm2p
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
[]
null
9.9
null
null
CVE-2019-1703
Cisco Firepower Threat Defense Software Packet Processing Denial of Service Vulnerability
A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for the Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error, which may prevent ingress buffers from being replenished under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to consume all input buffers, which are shared between all interfaces, leading to a queue wedge condition in all active interfaces. This situation would cause an affected device to stop processing any incoming traffic and result in a DoS condition until the device is reloaded manually.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*" ]
null
null
8.6
null
CVE-2004-1559
Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php.
[ "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-w4h8-48x8-2gv2
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
[]
null
null
null
null
GHSA-4m34-xhpq-w89v
Multiple insecure method vulnerabilities in the DeployRun.DeploymentSetup.1 (DeployRun.dll) ActiveX control 10.0.0.44 in Hummingbird Deployment Wizard 2008 allow remote attackers to execute arbitrary programs via the (1) Run and (2) PerformUpdateAsync methods, and (3) modify arbitrary registry values via the SetRegistryValueAsString method. NOTE: the SetRegistryValueAsString method could be leveraged for code execution by specifying executable file values to Startup folders.
[]
null
null
null
null
CVE-2019-19370
A cross-site scripting (XSS) vulnerability in the web conferencing component of the Mitel MiCollab application before 9.0.15 for Android could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation in the file upload interface. A successful exploit could allow an attacker to execute arbitrary scripts.
[ "cpe:2.3:a:mitel:micollab:*:*:*:*:*:android:*:*" ]
null
6.1
null
4.3
GHSA-v2g3-rgxm-49f9
GDI+ in Microsoft Windows XP SP3 allows remote attackers to cause a denial of service (infinite loop) via a PNG file that contains a certain large btChunkLen value.
[]
null
null
null
null
GHSA-qc3q-9h28-r994
VMware Tools (10.x and prior before 10.3.0) contains an out-of-bounds read vulnerability in HGFS. Successful exploitation of this issue may lead to information disclosure or may allow attackers to escalate their privileges on the guest VMs. In order to be able to exploit this issue, file sharing must be enabled.
[]
null
null
7
null
CVE-2024-29110
WordPress Tablesome plugin <= 1.0.27 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pauple Table & Contact Form 7 Database – Tablesome allows Reflected XSS.This issue affects Table & Contact Form 7 Database – Tablesome: from n/a through 1.0.27.
[]
null
7.1
null
null
CVE-2006-3077
Cross-site scripting (XSS) vulnerability in guestbook.cfm in aXentGuestbook 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the startrow parameter.
[ "cpe:2.3:a:axent:axentguestbook:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-42087
Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot.
[ "cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1_2994_cn_zgyd01_4:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ax1803:v2:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2005-1520
Buffer overflow in the header_get_field_name function in header.c for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a crafted e-mail.
[ "cpe:2.3:a:gnu:mailutils:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:mailutils:0.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2018-7866
A NULL pointer dereference was discovered in newVar3 in util/decompile.c in libming 0.4.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
[ "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2021-42364
Stetic <= 1.0.6 Cross-Site Request Forgery to Stored Cross-Site Scripting
The Stetic WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the stats_page function found in the ~/stetic.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.0.6.
[ "cpe:2.3:a:stetic:stetic:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-vmqm-g3vh-847m
Denial of service in Apache Xerces2
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
[]
null
null
7.5
null
CVE-2022-26118
A privilege chaining vulnerability [CWE-268] in FortiManager and FortiAnalyzer 6.0.x, 6.2.x, 6.4.0 through 6.4.7, 7.0.0 through 7.0.3 may allow a local and authenticated attacker with a restricted shell to escalate their privileges to root due to incorrect permissions of some folders and executable files on the system.
[ "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2024-32873
evmos allows transferring unvested tokens after delegations
Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. The spendable balance is not updated properly when delegating vested tokens. The issue allows a clawback vesting account to anticipate the release of unvested tokens. This vulnerability is fixed in 18.0.0.
[ "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*" ]
null
3.5
null
null
CVE-2019-19535
In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*" ]
null
4.6
null
2.1
GHSA-2vgj-3pvg-xh4w
Duplicate Advisory: Gogs allows deletion of internal files
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-ccqv-43vm-4f3w. This link is maintained to preserve external references.Original DescriptionGogs through 0.13.0 allows deletion of internal files.
[]
9.4
9.9
null
null
GHSA-6qwc-rqw2-f772
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
[]
null
7.8
null
null
CVE-2025-5128
ScriptAndTools Real-Estate-website-in-PHP Admin Login Panel admin sql injection
A vulnerability, which was classified as critical, was found in ScriptAndTools Real-Estate-website-in-PHP 1.0. Affected is an unknown function of the file /admin/ of the component Admin Login Panel. The manipulation of the argument Password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.9
7.3
7.3
7.5
CVE-2024-12751
Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability
Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25344.
[]
null
null
7.8
null
RHSA-2020:0215
Red Hat Security Advisory: Ansible security and bug fix update (2.9.4)
Ansible: vulnerability in solaris_zone module via crafted solaris zone Ansible: malicious code could craft filename in nxos_file_copy module
[ "cpe:/a:redhat:ansible_engine:2.9::el7", "cpe:/a:redhat:ansible_engine:2.9::el8" ]
null
5.6
7.3
null
CVE-2014-9569
Multiple cross-site scripting (XSS) vulnerabilities in SAP NetWeaver Business Client (NWBC) for HTML 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) roundtrips parameter, aka SAP Security Note 2051285.
[ "cpe:2.3:a:sap:netweaver_business_client_for_html:3.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-fvrj-qh22-gh9g
Barco ClickShare Huddle CS-100 devices before 1.9.0 and CSE-200 devices before 1.9.0 have incorrect Credentials Management. The ClickShare Base Unit implements encryption at rest using encryption keys which are shared across all ClickShare Base Units of models CS-100 & CSE-200.
[]
null
null
null
null
CVE-2006-3822
SQL injection vulnerability in index.php in GeodesicSolutions GeoAuctions Enterprise 1.0.6 allows remote attackers to execute arbitrary SQL commands via the d parameter.
[ "cpe:2.3:a:geodesicsolutions:geoauctions_enterprise:1.0.6:*:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-f7gp-8jp4-wwj5
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter at ip/goform/DhcpListClient.
[]
null
6.5
null
null
CVE-2012-5526
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
[ "cpe:2.3:a:andy_armstrong:cgi.pm:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-44140
Arbitrary file deletion on logout
Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.
[ "cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
CVE-2020-25491
6Kare Emakin 5.0.341.0 is affected by Cross Site Scripting (XSS) via the /rpc/membership/setProfile DisplayName field, which is mishandled when rendering the Activity Stream page.
[ "cpe:2.3:a:6kare:emakin:5.0.341.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
ICSA-23-012-07
Hitachi Energy Lumada APM
Hitachi Energy Lumada APM has a flaw in the access control mechanism implementation on the “Limited Engineer” role, granting access to the embedded Power BI reports feature. This could allow an unauthorized user to access information by gaining unauthorized access to any installed Power BI reports, then manipulating asset issue comments on assets that should not be available to that user.-CVE-2022-2155 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).
[]
null
null
5.7
null
GHSA-9g4h-h3jx-fcjh
A buffer overflow vulnerability in the parameter of web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to cause denial-of-service (DoS) conditions by sending a crafted authorization request.
[]
null
6.5
null
null
GHSA-84m7-68fc-v7c9
ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.
[]
null
null
null
null
GHSA-6fxv-38xc-h866
Apache Jackrabbit contains Cross-site Scripting
Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp.
[]
null
null
null
null
CVE-2022-32630
In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405966; Issue ID: ALPS07405966.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2023-51422
WordPress WebinarIgnition Plugin <= 3.05.0 is vulnerable to PHP Object Injection
Deserialization of Untrusted Data vulnerability in Saleswonder Team Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition.This issue affects Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition: from n/a through 3.05.0.
[ "cpe:2.3:a:saleswonder:webinarignition:*:*:*:*:*:wordpress:*:*" ]
null
9.9
null
null
CVE-2015-7527
lib/core.php in the Cool Video Gallery plugin 1.9 for WordPress allows remote attackers to execute arbitrary code via shell metacharacters in the "Width of preview image" and possibly other input fields in the "Video Gallery Settings" page.
[ "cpe:2.3:a:cool_video_gallery_project:cool_video_gallery:1.9:*:*:*:*:wordpress:*:*" ]
null
null
null
7.5
GHSA-99qq-fm4c-vcf7
Out-of-bounds write in parsing jpeg image in Samsung Notes prior to version 4.4.26.71 allows local attackers to execute arbitrary code.
[]
null
7.3
null
null
GHSA-5h87-5cj8-gq98
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system.
[]
null
7
null
null
GHSA-pqg6-7xfp-mj84
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4261, and CVE-2016-4262.
[]
null
null
9.8
null
CVE-2025-27607
Python JSON Logger has a Potential RCE via missing `msgspec-python313-pre` dependency
Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0.
[]
null
8.8
null
null
CVE-2024-39328
Insecure Permissions in Atos Eviden IDRA and IDCA before 2.7.0. A highly trusted role (Config Admin) could exceed their configuration privileges in a multi-partition environment and access some confidential data. Data integrity and availability is not at risk.
[]
null
6.8
null
null
GHSA-c85g-628v-q46j
The Web application of Brocade Fabric OS before versions Brocade Fabric OS v9.0.1a and v8.2.3a contains debug statements that expose sensitive information to the program's standard output device. An attacker who has compromised the FOS system may utilize this weakness to capture sensitive information, such as user credentials.
[]
null
6.5
null
null
GHSA-qxc2-px87-chfw
A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting
[]
null
null
7.8
null
GHSA-wj5v-7qmm-hqcg
Huawei FusionSphere OpenStack V100R006C000SPC102 (NFV) has an information leak vulnerability due to the use of a low version transmission protocol by default. An attacker could intercept packets transferred by a target device. Successful exploit could cause an information leak.
[]
null
null
3.7
null
CVE-2024-31274
WordPress EmbedPress plugin <= 3.9.11 - Broken Access Control vulnerability
Missing Authorization vulnerability in WPDeveloper EmbedPress.This issue affects EmbedPress: from n/a through 3.9.11.
[ "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:*:*:*", "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
GHSA-3vg9-6vwr-fh6q
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sduFix the race condition between the following two flows that run in parallel:l2cap_reassemble_sdu -> chan->ops->recv (l2cap_sock_recv_cb) -> __sock_queue_rcv_skb.bt_sock_recvmsg -> skb_recv_datagram, skb_free_datagram.An SKB can be queued by the first flow and immediately dequeued and freed by the second flow, therefore the callers of l2cap_reassemble_sdu can't use the SKB after that function returns. However, some places continue accessing struct l2cap_ctrl that resides in the SKB's CB for a short time after l2cap_reassemble_sdu returns, leading to a use-after-free condition (the stack trace is below, line numbers for kernel 5.19.8).Fix it by keeping a local copy of struct l2cap_ctrl.BUG: KASAN: use-after-free in l2cap_rx_state_recv (net/bluetooth/l2cap_core.c:6906) bluetooth Read of size 1 at addr ffff88812025f2f0 by task kworker/u17:3/43169Workqueue: hci0 hci_rx_work [bluetooth] Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:107 (discriminator 4)) print_report.cold (mm/kasan/report.c:314 mm/kasan/report.c:429) ? l2cap_rx_state_recv (net/bluetooth/l2cap_core.c:6906) bluetooth kasan_report (mm/kasan/report.c:162 mm/kasan/report.c:493) ? l2cap_rx_state_recv (net/bluetooth/l2cap_core.c:6906) bluetooth l2cap_rx_state_recv (net/bluetooth/l2cap_core.c:6906) bluetooth l2cap_rx (net/bluetooth/l2cap_core.c:7236 net/bluetooth/l2cap_core.c:7271) bluetooth ret_from_fork (arch/x86/entry/entry_64.S:306) </TASK>Allocated by task 43169: kasan_save_stack (mm/kasan/common.c:39) __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) kmem_cache_alloc_node (mm/slab.h:750 mm/slub.c:3243 mm/slub.c:3293) __alloc_skb (net/core/skbuff.c:414) l2cap_recv_frag (./include/net/bluetooth/bluetooth.h:425 net/bluetooth/l2cap_core.c:8329) bluetooth l2cap_recv_acldata (net/bluetooth/l2cap_core.c:8442) bluetooth hci_rx_work (net/bluetooth/hci_core.c:3642 net/bluetooth/hci_core.c:3832) bluetooth process_one_work (kernel/workqueue.c:2289) worker_thread (./include/linux/list.h:292 kernel/workqueue.c:2437) kthread (kernel/kthread.c:376) ret_from_fork (arch/x86/entry/entry_64.S:306)Freed by task 27920: kasan_save_stack (mm/kasan/common.c:39) kasan_set_track (mm/kasan/common.c:45) kasan_set_free_info (mm/kasan/generic.c:372) ____kasan_slab_free (mm/kasan/common.c:368 mm/kasan/common.c:328) slab_free_freelist_hook (mm/slub.c:1780) kmem_cache_free (mm/slub.c:3536 mm/slub.c:3553) skb_free_datagram (./include/net/sock.h:1578 ./include/net/sock.h:1639 net/core/datagram.c:323) bt_sock_recvmsg (net/bluetooth/af_bluetooth.c:295) bluetooth l2cap_sock_recvmsg (net/bluetooth/l2cap_sock.c:1212) bluetooth sock_read_iter (net/socket.c:1087) new_sync_read (./include/linux/fs.h:2052 fs/read_write.c:401) vfs_read (fs/read_write.c:482) ksys_read (fs/read_write.c:620) do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
[]
null
null
null
null
CVE-2008-3722
SQL injection vulnerability in forum/neu.asp in fipsCMS 2.1 allows remote attackers to execute arbitrary SQL commands via the kat parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:fipsasp:fipscms:2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
PYSEC-2020-18
null
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
[]
null
null
null
null
CVE-2010-2618
PHP remote file inclusion vulnerability in inc/smarty/libs/init.php in AdaptCMS 2.0.0 Beta, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the sitepath parameter. NOTE: it was later reported that 2.0.1 is also affected.
[ "cpe:2.3:a:insanevisions:adapcms:2.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:insanevisions:adapcms:2.0.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-7jh2-q7fg-ph6h
An improper update of the WebAssembly dispatch table in WebAssembly in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
[]
null
null
8.8
null
RHSA-2016:2118
Red Hat Security Advisory: kernel security update
kernel: mm: privilege escalation via MAP_PRIVATE COW breakage
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
7.8
null
GHSA-359q-vfg7-7chr
Electron Inc. Advanced Electron Forum before 1.0.7 allows remote attackers to execute arbitrary PHP code via PHP code embedded in bbcode in the email parameter, which is processed by the preg_replace function with the eval switch.
[]
null
null
null
null
GHSA-5558-3h54-4jfj
Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to "context data."
[]
null
null
null
null
CVE-2025-26676
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
[]
null
6.5
null
null
GHSA-j86f-g83j-qw65
Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 through SP3, 7.0 through SP6, and 6.1 through SP7, when SSL is intended to be used, causes an unencrypted protocol to be used in certain unspecified circumstances, which causes user credentials to be sent across the network in cleartext and allows remote attackers to gain privileges.
[]
null
null
null
null
CVE-2015-1280
SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-gxcr-rf4j-phx3
RIOT RIOT-OS version after commit 7af03ab624db0412c727eed9ab7630a5282e2fd3 contains a Buffer Overflow vulnerability in sock_dns, an implementation of the DNS protocol utilizing the RIOT sock API that can result in Remote code executing. This attack appears to be exploitable via network connectivity.
[]
null
9.8
null
null
RHSA-2023:5436
Red Hat Security Advisory: firefox security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
CVE-2007-0414
BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, and 9.0 allows remote attackers to cause a denial of service (server hang) via certain requests that cause muxer threads to block when processing error pages.
[ "cpe:2.3:a:bea:weblogic_server:*:sp7:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:*:sp6:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:*:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2016-2849
Botan before 1.10.13 and 1.11.x before 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote attackers to obtain ECDSA secret keys via a timing side-channel attack.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.6:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.7:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.8:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.9:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.10:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.11:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.12:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.13:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.14:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.15:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.16:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.17:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.18:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.19:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.20:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.21:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.22:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.23:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.24:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.25:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.26:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.27:*:*:*:*:*:*:*", "cpe:2.3:a:botan_project:botan:1.11.28:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2024-20131
In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873.
[ "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt2739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6878t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6988:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2021-21890
A stack-based buffer overflow vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution in the vulnerable portion of the branch (deletedir). An attacker can make an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:*", "cpe:2.3:h:lantronix:premierwave_2050:-:*:*:*:*:*:*:*" ]
null
null
9.1
null
CVE-2021-43409
WPO365 | LOGIN - Wordpress Plugin Persistent Cross-Site Scripting
The “WPO365 | LOGIN” WordPress plugin (up to and including version 15.3) by wpo365.com is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data. In this case, the XSS payload can be submitted by any anonymous user, the payload then renders and executes when a WordPress administrator authenticates and accesses the WordPress Dashboard. The injected payload can carry out actions on behalf of the administrator including adding other administrative users and changing application settings. This flaw could be exploited to ultimately provide full control of the affected system to the attacker.
[ "cpe:2.3:a:wpo365:wordpress_\\+_azure_ad_\\/_microsoft_office_365:*:*:*:*:*:wordpress:*:*" ]
null
9.3
null
null
GHSA-vqrw-6c7v-3ccc
Multiple unspecified vulnerabilities in Driverse before 0.56b have unknown impact and attack vectors, related to (1) a "ptrace exploit" and (2) "some other potential security problems."
[]
null
null
null
null
GHSA-jj3w-68r8-9c3g
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
null
null
GHSA-fxwr-68rr-mp8h
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.5. An app may be able to determine a user’s current location.
[]
null
5.5
null
null
CVE-2012-3422
The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web page, which causes an uninitialized memory location to be read.
[ "cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-5w7w-x467-8495
The WP-Strava plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.12.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
6.1
null
null
CVE-2024-8736
Denial of Service (DoS) via Multipart Boundary in parisneo/lollms-webui
A Denial of Service (DoS) vulnerability exists in multiple file upload endpoints of parisneo/lollms-webui version V12 (Strawberry). The vulnerability can be exploited remotely via Cross-Site Request Forgery (CSRF). Despite CSRF protection preventing file uploads, the application still processes multipart boundaries, leading to resource exhaustion. By appending additional characters to the multipart boundary, an attacker can cause the server to parse each byte of the boundary, ultimately leading to service unavailability. This vulnerability is present in the `/upload_avatar`, `/upload_app`, and `/upload_logo` endpoints.
[]
null
null
7.1
null
GHSA-jrgg-hhpw-m93w
NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in which an input length is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 12.x (prior to 12.2) and version 11.x (prior to 11.4).
[]
null
null
null
null
RHSA-2024:0121
Red Hat Security Advisory: container-tools:4.0 security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
CVE-2020-15372
A vulnerability in the command-line interface in Brocade Fabric OS before Brocade Fabric OS v8.2.2a1, 8.2.2c, v7.4.2g, v8.2.0_CBN3, v8.2.1e, v8.1.2k, v9.0.0, could allow a local authenticated attacker to modify shell variables, which may lead to an escalation of privileges or bypassing the logging.
[ "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2020-10445
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article.php by adding a question mark (?) followed by the payload.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
ICSA-17-262-01
PHOENIX CONTACT mGuard Device Manager
Improper Access Control vulnerabilities have been reported for Oracle Java SE, which is provided with PHOENIX CONTACT FL MGUARD DM. According to Oracle, the supported Java versions affected by these vulnerabilities are Java SE: 8u131, 7u141 and 6u151, Java SE Embedded: 8u131, and JRockit: R28.3.14. PHOENIX CONTACT provided FL MGUARD DM 1.8.0 for Windows with Java SE 8u131.CVE-2017-10102, CVE-2017-10116, CVE-2017-10078, CVE-2017-10115, CVE-2017-10118, CVE-2017-10176, CVE-2017-10198, CVE-2017-10135, CVE-2017-10053, CVE-2017-10108 have been assigned to these vulnerabilities. A CVSS v3 base score of 9.0 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
9
null
CVE-2020-1892
Insufficient boundary checks when decoding JSON in JSON_parser allows read access to out of bounds memory, potentially leading to information leak and DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
[ "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.40.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.41.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.43.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.44.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.45.0:*:*:*:*:*:*:*" ]
null
8.1
null
6.4
GHSA-c34r-238x-f7qx
Remote Code Execution Vulnerability via SSTI in Fides Webserver Jinja Email Templating Engine
SummaryThe Email Templating feature uses Jinja2 without proper input sanitization or rendering environment restrictions, allowing for Server-Side Template Injection that grants Remote Code Execution to privileged users. A privileged user refers to an Admin UI user with the default `Owner` or `Contributor` role, who can escalate their access and execute code on the underlying Fides Webserver container where the Jinja template rendering function is executed.DetailsThe application enables the creation of message templates that are sent via email to Fides Privacy Center users (data subjects) who raise privacy requests such as data subject access requests or consent management requests via the Privacy Center. These emails are triggered at various points in the request processing flow, for example when a request is denied or approved. The messages are defined using Jinja2 templates, allowing the use of statement and expression directives to craft more complex messages that include dynamic variables.It was discovered that the Jinja2 environment used to render the templates does not restrict the usage of common Python methods and objects, which permits an attacker to execute arbitrary code via Server-Side Template Injection. An attacker with the ability to modify email templates can inject malicious code, which is then executed when an email message is rendered and sent to the user.Admin UI users assigned the following default roles are permitted to modify email templates and are therefore able to exploit this vulnerability:OwnerContributorOAuth clients with the `messaging-template:update` scope are also authorized to use the `PUT /api/v1/messaging/templates/` Fides Webserver API endpoint and may also exploit this vulnerability.ImpactThis vulnerability allows an attacker with sufficient privileges (`Owner`, `Contributor`, `messaging-template:update`) to execute arbitrary code remotely (Remote Code Execution) and escalate their privileges to those of a user on the Fides Webserver container. This escalated access grants the attacker control of the Fides Webserver application, including unauthorized access to integrated resources such as the hosted database, hosted cache, integrated data stores, and integrated SaaS applications. Potential impacts range from denial of service to the exfiltration of sensitive data unavailable to the user prior to the escalation of access.PatchesThe vulnerability has been patched in Fides version `2.44.0`. Users are advised to upgrade to this version or later to secure their systems against this threat.WorkaroundsThere are no workarounds.PoCThe following payload, when injected into the email template, enables the execution of a command on the underlying system, revealing the content of environment variables:The following HTTP request to the Fides Webserver API can be used to update a privacy request denial email template:As a result, when a Privacy Center user submits a privacy request, such as to access their own data, and the request is rejected by a user of the privacy request management dashboard, the malicious template will be rendered, the code will be executed, and the content of the underlying container's environment variables will be included in the email the end-user receives.
[]
8.6
9.1
null
null
GHSA-vpf5-33pc-335g
A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "success" parameter which is inserted into the document with insufficient sanitization.
[]
null
6.1
null
null
CVE-2024-4326
Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui
A vulnerability in parisneo/lollms-webui versions up to 9.3 allows remote attackers to execute arbitrary code. The vulnerability stems from insufficient protection of the `/apply_settings` and `/execute_code` endpoints. Attackers can bypass protections by setting the host to localhost, enabling code execution, and disabling code validation through the `/apply_settings` endpoint. Subsequently, arbitrary commands can be executed remotely via the `/execute_code` endpoint, exploiting the delay in settings enforcement. This issue was addressed in version 9.5.
[ "cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:*" ]
null
null
9.8
null
CVE-2014-9301
Server-side request forgery (SSRF) vulnerability in the proxy servlet in Alfresco Community Edition before 5.0.a allows remote attackers to trigger outbound requests to intranet servers, conduct port scans, and read arbitrary files via a crafted URI in the endpoint parameter.
[ "cpe:2.3:a:alfresco:alfresco:*:*:*:*:community:*:*:*" ]
null
null
null
6.4
GHSA-wwwq-67r3-g4qj
In the video_ioctl2() function in the camera driver in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-09-16, an untrusted pointer dereference may potentially occur.
[]
null
null
7.8
null
GHSA-w9jg-gvgr-354m
Resource Exhaustion in Spring Security
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
[]
null
7.5
null
null
RHSA-2016:0085
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: nvram: OOB r/w access in processing firmware configurations
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null