id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-6gjc-hfww-q5q8
|
The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_downloads() function in versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to download files from the vulnerable service.
|
[] | null | 7.5 | null | null |
|
RHSA-2011:1240
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 6-Month End Of Life Notice
|
This is the 6-month notification of the End Of Life plans for Red Hat
Enterprise Linux 4.
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-cvw9-82mp-3chf
|
IBM Planning Analytics Local 2.0.0 through 2.0.9.1 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 185716.
|
[] | null | null | null | null |
|
CVE-2023-32500
|
WordPress WoodMart Theme <= 7.1.1 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in xtemos WoodMart - Multipurpose WooCommerce Theme <= 7.1.1 versions.
|
[
"cpe:2.3:a:xtemos:woodmart:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
GHSA-xjq5-7h7q-37wc
|
CallManager Express (CME) on Cisco IOS before 15.0(1)XA allows remote authenticated users to cause a denial of service (device crash) by using an extension mobility (EM) phone to interact with the menu for SNR number changes, aka Bug ID CSCta63555.
|
[] | null | null | null | null |
|
CVE-2024-5428
|
SourceCodester Simple Online Bidding System HTTP POST Request save_product cross-site request forgery
|
A vulnerability classified as problematic was found in SourceCodester Simple Online Bidding System 1.0. Affected by this vulnerability is the function save_product of the file /admin/index.php?page=manage_product of the component HTTP POST Request Handler. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-266383.
|
[
"cpe:2.3:a:sourcecodester:simple_online_bidding_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:simple_online_bidding_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 4.3 | 4.3 | 5 |
GHSA-3pf4-qj7m-gfhw
|
The DNS implementation in Cisco Adaptive Security Appliance (ASA) Software 7.2 before 7.2(5.16), 8.2 before 8.2(5.57), 8.3 before 8.3(2.44), 8.4 before 8.4(7.28), 8.5 before 8.5(1.24), 8.6 before 8.6(1.17), 8.7 before 8.7(1.16), 9.0 before 9.0(4.33), 9.1 before 9.1(6.1), 9.2 before 9.2(3.4), and 9.3 before 9.3(3) allows man-in-the-middle attackers to cause a denial of service (memory consumption or device outage) by triggering outbound DNS queries and then sending crafted responses to these queries, aka Bug ID CSCuq77655.
|
[] | null | null | null | null |
|
GHSA-559v-gq75-3cch
|
Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnRowsInserted Event Remote Code Execution Vulnerability."
|
[] | null | null | null | null |
|
CVE-2015-2186
|
The Ansible edxapp role in the Configuration Repo in edX allows remote websites to spoof edX accounts by leveraging use of the string literal "False" instead of a boolean False for the CORS_ORIGIN_ALLOW_ALL setting. Note: this vulnerability was fixed on 2015-03-06, but the version number was not changed.
|
[
"cpe:2.3:a:edx:configuration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:edx:edx-platform:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-jrcf-gr4j-p9gp
|
In the Linux kernel, the following vulnerability has been resolved:cifs: Fix server re-repick on subrequest retryWhen a subrequest is marked for needing retry, netfs will call
cifs_prepare_write() which will make cifs repick the server for the op
before renegotiating credits; it then calls cifs_issue_write() which
invokes smb2_async_writev() - which re-repicks the server.If a different server is then selected, this causes the increment of
server->in_flight to happen against one record and the decrement to happen
against another, leading to misaccounting.Fix this by just removing the repick code in smb2_async_writev(). As this
is only called from netfslib-driven code, cifs_prepare_write() should
always have been called first, and so server should never be NULL and the
preparatory step is repeated in the event that we do a retry.The problem manifests as a warning looking something like:WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]
...
RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]
...
smb2_writev_callback+0x334/0x560 [cifs]
cifs_demultiplex_thread+0x77a/0x11b0 [cifs]
kthread+0x187/0x1d0
ret_from_fork+0x34/0x60
ret_from_fork_asm+0x1a/0x30Which may be triggered by a number of different xfstests running against an
Azure server in multichannel mode. generic/249 seems the most repeatable,
but generic/215, generic/249 and generic/308 may also show it.
|
[] | null | 9.8 | null | null |
|
CVE-2014-3714
|
The ARM image loading functionality in Xen 4.4.x does not properly validate kernel length, which allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit ARM guest kernel in an image, which triggers a buffer overflow.
|
[
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
GHSA-6f9h-ghqc-cxvm
|
CSRF vulnerability in admin/user/edit in Creatiwity wityCMS 0.6.2 allows an attacker to take over a user account, as demonstrated by modifying the account's email field.
|
[] | null | null | 8.8 | null |
|
RHSA-2024:2090
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
buildah: full container escape at build time
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.6 | null | null |
CVE-2019-12328
|
A command injection (missing input validation) issue in the remote phonebook configuration URI in the web interface of the Atcom A10W VoIP phone with firmware 2.6.1a2421 allows an authenticated remote attacker in the same network to trigger OS commands via shell metacharacters in a POST request.
|
[
"cpe:2.3:o:atcom:a10w_firmware:2.6.1a2421:*:*:*:*:*:*:*",
"cpe:2.3:h:atcom:a10w:-:*:*:*:*:*:*:*"
] | null | null | 9 | null |
|
GHSA-wc45-fppm-cww3
|
A vulnerability was found in SourceCodester Record Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file sort.php. The manipulation of the argument sort leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271932.
|
[] | 5.3 | 3.5 | null | null |
|
GHSA-28cq-wr2x-53v2
|
Cross-site scripting (XSS) vulnerability in HP Insight Management Agents before 9.0.0.0 on Windows Server 2003 and 2008 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null |
|
GHSA-78cj-fvph-782c
|
In Micropoint proactive defense software 2.0.20266.0146, the driver file (mp110005.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80000110.
|
[] | null | null | 7.8 | null |
|
GHSA-43h9-p3j4-39hm
|
Liferay Portal defaults to a low work factor for the default password hashing algorithm
|
The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes.
|
[] | null | 8.1 | null | null |
GHSA-4q62-43v6-g996
|
SQL injection vulnerability in view_photo.php in 2daybiz Network Community Script allows remote attackers to execute arbitrary SQL commands via the alb parameter.
|
[] | null | null | null | null |
|
GHSA-cqv2-qp3h-xq97
|
A vulnerability in the Cisco FXOS CLI feature on specific hardware platforms for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to elevate their administrative privileges to root. The attacker would need valid administrative credentials on the device to exploit this vulnerability. This vulnerability exists because certain system configurations and executable files have insecure storage and permissions. An attacker could exploit this vulnerability by authenticating on the device and then performing a series of steps that includes downloading malicious system files and accessing the Cisco FXOS CLI to configure the attack. A successful exploit could allow the attacker to obtain root access on the device.
|
[] | null | 6 | null | null |
|
GHSA-fcmh-jh65-h8hh
|
Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[] | null | 6.5 | null | null |
|
CVE-2024-26191
|
Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
|
Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sql_2016_azure_connect_feature_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null |
CVE-2009-0467
|
Cross-site scripting (XSS) vulnerability in proxy.html in Profense Web Application Firewall 2.6.2 and 2.6.3 allows remote attackers to inject arbitrary web script or HTML via the proxy parameter in a deny_log manage action.
|
[
"cpe:2.3:a:armorlogic:profense_web_application_firewall:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:armorlogic:profense_web_application_firewall:2.6.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-48463
|
Bruno before 1.29.1 uses Electron shell.openExternal without validation (of http or https) for opening windows within the Markdown docs viewer.
|
[
"cpe:2.3:a:usebruno:bruno:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2020-14316
|
A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
[
"cpe:2.3:a:kubevirt:kubevirt:*:*:*:*:*:kubernetes:*:*",
"cpe:2.3:a:redhat:openshift_virtualization:1:*:*:*:*:*:*:*"
] | null | 9.9 | null | 6.5 |
|
CVE-2025-30842
|
WordPress Christmas Panda plugin <= 1.0.4 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in pixolette Christmas Panda allows Cross Site Request Forgery. This issue affects Christmas Panda: from n/a through 1.0.4.
|
[] | null | 4.3 | null | null |
CVE-2013-1063
|
usb-creator 0.2.47 before 0.2.47.1, 0.2.40 before 0.2.40ubuntu2, and 0.2.38 before 0.2.38.2 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:a:evan_dandrea:usb-creator:0.2.38:*:*:*:*:*:*:*",
"cpe:2.3:a:evan_dandrea:usb-creator:0.2.38.1:*:*:*:*:*:*:*",
"cpe:2.3:a:evan_dandrea:usb-creator:0.2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:evan_dandrea:usb-creator:0.2.47:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-4mm2-hqgc-vvw9
|
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
|
[] | null | null | null | null |
|
CVE-2005-1492
|
Cross-site scripting (XSS) vulnerability in user.cgi in Gossamer Threads Links SQL 2.x and 3.0 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
|
[
"cpe:2.3:a:gossamer_threads:gossamer_threads_links:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gossamer_threads:gossamer_threads_links:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gossamer_threads:gossamer_threads_links-sql:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-41447
|
A stored cross-site scripting (XSS) vulnerability in Alkacon OpenCMS v17.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the author parameter under the Create/Modify article function.
|
[] | null | 5.4 | null | null |
|
GHSA-jwm4-2m8m-jwjc
|
Cross-site scripting (XSS) vulnerability in the User control panel in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | 6.1 | null |
|
GHSA-m932-4pmg-rpmm
|
In libavc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111761624
|
[] | null | 6.5 | null | null |
|
CVE-2022-40985
|
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the '(ddns1|ddns2) hostname WORD' command template.
|
[
"cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
"cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
|
CVE-2014-2379
|
Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not use encryption, which allows remote attackers to interfere with traffic control by replaying transmissions on a wireless network.
|
[
"cpe:2.3:a:sensysnetworks:trafficdot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:trafficdot:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:trafficdot:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:trafficdot:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:h:sensysnetworks:vsn240-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sensysnetworks:vsn240-t:-:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:vds:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:vds:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:vds:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:vds:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sensysnetworks:vds:2.6.4:*:*:*:*:*:*:*"
] | null | null | null | 5.4 |
|
GHSA-v5mr-588j-h899
|
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
|
[] | null | 5.5 | null | null |
|
CVE-2011-1426
|
The OpenURLInDefaultBrowser method in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, launches a default handler for the filename specified in the first argument, which allows remote attackers to execute arbitrary code via a .rnx filename corresponding to a crafted RNX file.
|
[
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2016-8735
|
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
|
[
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_engineering_data_management:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_engineering_data_management:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_relate_crm_software:10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_relate_crm_software:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:micros_retail_xbri_loss_prevention:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_convenience_and_fuel_pos_software:2.1.132:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2017-1508
|
IBM Informix Dynamic Server 12.1 could allow a local user logged in with database administrator user to gain root privileges. IBM X-Force ID: 129620.
|
[
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 6.7 | 6.8 |
|
GHSA-hjhq-5986-7rxw
|
A vulnerability classified as critical was found in SeaCMS up to 13.3. This vulnerability affects unknown code of the file /admin_topic.php?action=delall. The manipulation of the argument e_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 4.7 | null | null |
|
GHSA-7rvr-gh9x-q4mq
|
The Trend Micro scan engine before 8.320 for Windows and before 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote attackers to cause a denial of service (CPU consumption and system hang) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero, which triggers an infinite loop.
|
[] | null | null | null | null |
|
CVE-2007-2956
|
Stack-based buffer overflow in the readRadianceHeader function in (1) src/fileformat/rgbeio.cpp in pfstools 1.6.2 and (2) src/Fileformat/rgbeio.cpp in Qtpfsgui 1.8.11 allows remote attackers to execute arbitrary code via a crafted Radiance RGBE (.hdr) file.
|
[
"cpe:2.3:a:pfstools:pfstools:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qtpfsgui:qtpfsgui:1.8.11:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-x57w-hccr-c6x7
|
Possible buffer overflow due to improper validation of SSID length received from beacon or probe response during an IBSS session in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
|
[] | null | 9.8 | null | null |
|
GHSA-wc5h-vpgx-mqjw
|
u'Lack of check to ensure that the TX read index & RX write index that are read from shared memory are less than the FIFO size results into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[] | null | null | null | null |
|
GHSA-9rrp-vxfg-q78p
|
Huawei PC client software HiSuite 4.0.5.300_OVE uses insecure HTTP for upgrade software package download and does not check the integrity of the software package before installing; an attacker can launch an MITM attack to interrupt or replace the downloaded software package and further compromise the PC.
|
[] | null | null | 7.8 | null |
|
CVE-2018-18274
|
A issue was found in pdfalto 0.2. There is a heap-based buffer overflow in the TextPage::addAttributsNode function in XmlAltoOutputDev.cc.
|
[
"cpe:2.3:a:pdfalto_project:pdfalto:0.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2024-21528
|
All versions of the package node-gettext are vulnerable to Prototype Pollution via the addTranslations() function in gettext.js due to improper user input sanitization.
|
[] | null | 5.9 | null | null |
|
CVE-2025-21577
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 6.5 | null | null |
|
GHSA-c8rc-rxc2-r2r2
|
Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null |
|
GHSA-jxph-j64g-2vgm
|
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: Budget). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | null | null |
|
CVE-2019-5246
|
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack. Successful exploit could cause DOS or malicious code execution.
|
[
"cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.109\\(c00e106r1p21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.113\\(c00e110r1p21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.125\\(c00e120r1p21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.135\\(c00e130r1p21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.153\\(c00e150r1p21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.155\\(c00e150r1p21\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:elle-al00b:-:*:*:*:*:*:*:*"
] | null | 6.2 | null | 4.6 |
|
GHSA-g5w2-92px-9hwf
|
Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.
|
[] | null | 7.8 | null | null |
|
RHSA-2024:5396
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.1 | null | null |
GHSA-j5v5-fpm8-w528
|
Heap-based buffer overflow in atas32.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 (aka T26SP49EP32) for Windows, 27.x before 27.10.x (aka T27SP10) for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted WebEx Recording Format (WRF) file, a different vulnerability than CVE-2009-2876 and CVE-2009-2879.
|
[] | null | null | null | null |
|
CVE-2015-1086
|
The Audio Drivers subsystem in Apple iOS before 8.3 and Apple TV before 7.2 does not properly validate IOKit object metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted app.
|
[
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-qf6g-2vj6-4q65
|
The weblibrarian plugin before 3.4.8.6 for WordPress has XSS via front-end short codes.
|
[] | null | 6.1 | null | null |
|
GHSA-7mph-v368-wmv3
|
Insufficiently protected credentials in the Intel(R) ON Event Series Android application before version 2.0 may allow an authenticated user to potentially enable information disclosure via local access.
|
[] | null | 5.5 | null | null |
|
RHSA-2021:3675
|
Red Hat Security Advisory: shim and fwupd security update
|
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
GHSA-qmp6-mj9r-v7hh
|
Vulnerability in the Oracle HRMS (France) product of Oracle E-Business Suite (component: French HR). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle HRMS (France). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HRMS (France) accessible data as well as unauthorized access to critical data or complete access to all Oracle HRMS (France) accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | null | null | null |
|
CVE-2021-1488
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000 and 2100 Series Appliances Command Injection Vulnerability
|
A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.
|
[
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
CVE-2022-29750
|
Simple Client Management System 1.0 is vulnerable to SQL Injection via /cms/classes/Master.php?f=delete_service.
|
[
"cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2022:5115
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-django20) security update
|
Django: SQL injection in QuerySet.annotate(),aggregate() and extra()
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 9.4 | null | null |
CVE-2008-6383
|
SQL injection vulnerability in SpeedTech Organization and Resource Manager (Storm) 5.x before 5.x-1.14 and 6.x before 6.x-1.18, a module for Drupal, allows remote authenticated users with storm project access to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:drupal:storm:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:5.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:storm:6.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2025-0455
|
NetVision Information airPASS - SQL injection
|
The airPASS from NetVision Information has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
|
[] | null | 9.8 | null | null |
ICSA-23-269-01
|
Suprema BioStar 2
|
Suprema BioStar 2 v2.8.16 was discovered to contain a SQL injection vulnerability via value parameters.
|
[] | null | null | 6.5 | null |
CVE-2018-18357
|
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 |
|
CVE-2020-24407
|
Arbitrary code execution via file import functionality
|
Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an unsafe file upload vulnerability that could result in arbitrary code execution. This vulnerability could be abused by authenticated users with administrative permissions to the System/Data and Transfer/Import components.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:*:*:*:open_source:*:*:*"
] | null | 9.1 | null | null |
GHSA-gpx4-94pg-q9xr
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null |
|
GHSA-q3g6-3m57-6wj6
|
SQL injection vulnerability in i-search.php in Michelle's L2J Dropcalc 4 and earlier allows remote authenticated users to execute arbitrary SQL commands via the itemid parameter.
|
[] | null | null | null | null |
|
CVE-2019-8277
|
UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
|
[
"cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinumerik_access_mymachine\\/p2p:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinumerik_pcu_base_win10_software\\/ipc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinumerik_pcu_base_win7_software\\/ipc:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2006-3579
|
Cross-site scripting (XSS) vulnerability in Fujitsu ServerView 2.50 up to 3.60L98 and 4.10L11 up to 4.11L81 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:fujitsu:serverview:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:serverview:3.60l98:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:serverview:4.10l11:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu:serverview:4.10l81:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-3587-g6j7-969g
|
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
|
[] | null | null | null | null |
|
CVE-2019-20811
|
An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2018-10948
|
Synacor Zimbra Admin UI in Zimbra Collaboration Suite before 8.8.0 beta 2 has Persistent XSS via mail addrs.
|
[
"cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.0:beta1:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2024-53292
|
Dell VxVerify, versions prior to x.40.405, contain a Plain-text Password Storage Vulnerability in the shell wrapper. A local high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable component with privileges of the compromised account.
|
[] | null | 7.2 | null | null |
|
GHSA-7cwq-p8cr-h9qg
|
Buttercup allows attackers to obtain the hash of the master password
|
Buttercup allows attackers to obtain the hash of the master password for the password manager via accessing the file /vaults.json/.This affects the Buttercup app up to version 2.20.3.
|
[] | null | 5.3 | null | null |
CVE-2018-2775
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-3cqp-gxcm-89f4
|
A vulnerability was found in Beijing Baichuo Smart S150 Management Platform V31R02B15. It has been classified as critical. Affected is an unknown function of the file /useratte/inc/userattea.php. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-251538 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 7.3 | null | null |
|
CVE-2025-47030
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null |
CVE-2004-2078
|
Red-M Red-Alert 2.7.5 with software 3.1 build 24 allows remote attackers to cause a denial of service (reboot and loss of logged events) via a long request to TCP port 80, possibly triggering a buffer overflow.
|
[
"cpe:2.3:h:red-m:red-alert:2.7.5_v3.1_build_24:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-hgm6-w6m9-gcfw
|
The ClusterIterator::NextCluster function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2013-2836
|
Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.93 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2016-4108
|
Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2024-20026
|
In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541632.
|
[] | null | 4.2 | null | null |
|
GHSA-fqpw-268r-92f9
|
framework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows remote attackers to obtain sensitive information via a header that ends in \n instead of \r\n, which prevents a null terminator from being added and causes Tntnet to include headers from other requests.
|
[] | null | null | null | null |
|
GHSA-62cx-7w9p-82f5
|
TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 is vulnerable Buffer Overflow via the hostname parameter in binary /bin/boa.
|
[] | null | 7.5 | null | null |
|
CVE-2012-1110
|
Multiple cross-site scripting (XSS) vulnerabilities in Etano 1.22 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user, (2) email, (3) email2, (4) f17_zip, or (5) agree parameter to join.php; (6) PATH_INFO, (7) st, (8) f17_city, (9) f17_country, (10) f17_state, (11) f17_zip, (12) f19, (13) wphoto, (14) search, or (15) v parameter to search.php; (16) PATH_INFO or (17) st parameter to photo_search.php; or (18) return parameter to photo_view.php.
|
[
"cpe:2.3:a:datemill:etano:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-7q5x-7vh4-2297
|
The HTTP API in Prismview System 9 11.10.17.00 and Prismview Player 11 13.09.1100 allows remote code execution by uploading RebootSystem.lnk and requesting /REBOOTSYSTEM or /RESTARTVNC. (Authentication is required but an XML file containing credentials can be downloaded.)
|
[] | null | null | null | null |
|
GHSA-c8vc-vjpf-2fph
|
The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10300 and CVE-2014-10400 were SPLIT from this ID.
|
[] | null | null | null | null |
|
GHSA-vjf8-hc3f-mpw4
|
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
|
[] | null | 7.5 | null | null |
|
CVE-2025-39453
|
WordPress Advanced Dynamic Pricing for WooCommerce plugin <= 4.9.3 - Cross Site Request Forgery (CSRF) to Settings Change vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in algol.plus Advanced Dynamic Pricing for WooCommerce allows Cross Site Request Forgery. This issue affects Advanced Dynamic Pricing for WooCommerce: from n/a through 4.9.3.
|
[] | null | 4.3 | null | null |
CVE-2022-4022
|
The SVG Support plugin for WordPress defaults to insecure settings in version 2.5 and 2.5.1. SVG files containing malicious javascript are not sanitized. While version 2.5 adds the ability to sanitize image as they are uploaded, the plugin defaults to disable sanitization and does not restrict SVG upload to only administrators. This allows authenticated attackers, with author-level privileges and higher, to upload malicious SVG files that can be embedded in posts and pages by higher privileged users. Additionally, the embedded JavaScript is also triggered on visiting the image URL, which allows an attacker to execute malicious code in browsers visiting that URL.
|
[
"cpe:2.3:a:benbodhi:svg_support:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
CVE-2024-47733
|
netfs: Delete subtree of 'fs/netfs' when netfs module exits
|
In the Linux kernel, the following vulnerability has been resolved:
netfs: Delete subtree of 'fs/netfs' when netfs module exits
In netfs_init() or fscache_proc_init(), we create dentry under 'fs/netfs',
but in netfs_exit(), we only delete the proc entry of 'fs/netfs' without
deleting its subtree. This triggers the following WARNING:
==================================================================
remove_proc_entry: removing non-empty directory 'fs/netfs', leaking at least 'requests'
WARNING: CPU: 4 PID: 566 at fs/proc/generic.c:717 remove_proc_entry+0x160/0x1c0
Modules linked in: netfs(-)
CPU: 4 UID: 0 PID: 566 Comm: rmmod Not tainted 6.11.0-rc3 #860
RIP: 0010:remove_proc_entry+0x160/0x1c0
Call Trace:
<TASK>
netfs_exit+0x12/0x620 [netfs]
__do_sys_delete_module.isra.0+0x14c/0x2e0
do_syscall_64+0x4b/0x110
entry_SYSCALL_64_after_hwframe+0x76/0x7e
==================================================================
Therefore use remove_proc_subtree() instead of remove_proc_entry() to
fix the above problem.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-g5pg-66qx-2355
|
Unauth. SQL Injection vulnerability in Cryptocurrency Widgets Pack Plugin <=1.8.1 on WordPress.
|
[] | null | 9.8 | null | null |
|
CVE-2018-21127
|
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects WAC505 before 5.0.0.17 and WAC510 before 5.0.0.17.
|
[
"cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
RHSA-2008:0886
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: billion laughs DoS attack libxml2: long entity name heap buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
GHSA-hp88-hfjw-2hg4
|
Duplicate Advisory: HAL Cross Site Scripting (XSS) vulnerability of user input when storing it in a data store
|
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-f7jh-m6wp-jm7f. This link is maintained to preserve external references.Original DescriptionA flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities.
|
[] | null | 4.6 | null | null |
CVE-2025-2035
|
s-a-zhd Ecommerce-Website-using-PHP customer_register.php unrestricted upload
|
A vulnerability was found in s-a-zhd Ecommerce-Website-using-PHP 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /customer_register.php. The manipulation of the argument name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-f3j2-qmmf-mrrq
|
All StorageGRID Webscale versions are susceptible to a vulnerability which could permit an unauthenticated attacker to communicate with systems on the same network as the StorageGRID Webscale Admin Node via HTTP or to take over services on the Admin Node.
|
[] | null | null | 9.8 | null |
|
CVE-2024-2451
|
Improper fingerprint validation in the TeamViewer Client
|
Improper fingerprint validation in the TeamViewer Client (Full & Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading.
|
[
"cpe:2.3:a:teamviewer:remote:15.48:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:remote:15.51:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
GHSA-cp5v-2hmc-3vjx
|
An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site.By exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions.
|
[] | null | 5.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.