id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-9789-3997-xv2g
IBM Sterling Order Management 8.0 before HF127, 8.5 before HF89, 9.0 before HF69, 9.1.0 before FP41, and 9.2.0 before FP13 allows remote authenticated users to conduct XPath injection attacks, and read arbitrary XML files, via unspecified vectors.
[]
null
null
null
null
null
GHSA-mm42-r25h-g74g
Unspecified vulnerability in Check Point Multi-Domain Management / Provider-1 NGX R65, R70, R71, and R75, and SmartCenter during installation on non-Windows machines, allows local users on the MDS system to overwrite arbitrary files via unknown vectors.
[]
null
null
null
null
null
CVE-2017-1000083
backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.
[ "cpe:2.3:a:gnome:evince:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-wpjm-p3jv-8c5m
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a CSRF issue (with resultant SSRF) in the com_mb24proxy module, allowing attackers to steal session information from logged-in users with a crafted link.
[]
null
null
null
null
null
GHSA-5pvv-f8h3-gw96
phpMyAdmin Cross-site Scripting In MySQL Table Name
Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.11.x before 2.11.9.6 and 3.x before 3.2.2.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name for a MySQL table.
[]
null
null
null
null
null
GHSA-742j-rfqh-7886
Remote command injection vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows a remote, authenticated attacker to execute arbitrary commands on the target device by adding an access control rule for a network object with a crafted hostname.
[]
null
null
7.2
null
null
RHSA-2011:0369
Red Hat Security Advisory: wireshark security update
wireshark: buffer overflow in MAC-LTE disector (upstream bug #5530) Wireshark: memory corruption when reading a malformed pcap file (upstream bug #5652) Wireshark: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces Wireshark: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field Wireshark: Multiple stack consumption vulnerabilities caused DoS via crafted SMB or CLDAP packet Wireshark: Malformed LDAP filter string causes Denial of Service via excessive memory consumption
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
GHSA-4pvx-p59r-j47h
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[]
null
7.8
null
null
null
CVE-2016-10798
cPanel before 58.0.4 allows a file-ownership change (to nobody) via rearrangeacct (SEC-134).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
6.8
4.9
null
CVE-2018-12481
The Olive Tree Ftp Server application 1.32 for Android has a "Sensitive Data on the Clipboard" vulnerability, as demonstrated by reading the "User password" field with the Drozer post.capture.clipboard module.
[ "cpe:2.3:a:the_olive_tree_ftp_server_project:the_olive_tree_ftp_server:1.32:*:*:*:*:android:*:*" ]
null
null
9.8
5
null
CVE-2019-0894
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0889, CVE-2019-0890, CVE-2019-0891, CVE-2019-0893, CVE-2019-0895, CVE-2019-0896, CVE-2019-0897, CVE-2019-0898, CVE-2019-0899, CVE-2019-0900, CVE-2019-0901, CVE-2019-0902.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
GHSA-f2q5-wfpv-jc4m
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Asmedia Tuaug4 allows Reflected XSS.This issue affects Tuaug4: from n/a through 1.4.
[]
null
7.1
null
null
null
CVE-2023-25031
WordPress Arigato Autoresponder and Newsletter Plugin <= 2.7.1 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1 versions.
[ "cpe:2.3:a:kibokolabs:arigato_autoresponder_and_newsletter:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
GHSA-wqq7-m9hm-p4xw
The PZ Frontend Manager WordPress plugin before 1.0.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
[]
null
8.8
null
null
null
GHSA-356g-gr7f-c28h
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
8.2
null
null
null
CVE-2024-32963
Parameter Tampering vulnerability in Navidrome
Navidrome is an open source web-based music collection server and streamer. In affected versions of Navidrome are subject to a parameter tampering vulnerability where an attacker has the ability to manipulate parameter values in the HTTP requests. The attacker is able to change the parameter values in the body and successfully impersonate another user. In this case, the attacker created a playlist, added song, posted arbitrary comment, set the playlist to be public, and put the admin as the owner of the playlist. The attacker must be able to intercept http traffic for this attack. Each known user is impacted. An attacker can obtain the ownerId from shared playlist information, meaning every user who has shared a playlist is also impacted, as they can be impersonated. This issue has been addressed in version 0.52.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:navidrome:navidrome:-:*:*:*:*:*:*:*" ]
null
4.2
null
null
null
RHSA-2025:7435
Red Hat Security Advisory: thunderbird security update
thunderbird: Information Disclosure of /tmp directory listing thunderbird: Leak of hashed Window credentials via crafted attachment URL thunderbird: User Interface (UI) Misrepresentation of attachment URL
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.4
null
null
null
CVE-2019-16763
XSS in Pannellum from 2.5.0 through 2.5.4
In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if pannellum.htm was hosted on a domain that shared cookies with the targeted site's user authentication; an &lt;iframe&gt; could then be embedded on the attacker's site using pannellum.htm from the targeted site, which would allow the attacker to potentially access information from the targeted site as the authenticated user (or worse if the targeted site did not have adequate CSRF protections) if the user clicked on a hot spot in the attacker's embedded panorama viewer. This was patched in version 2.5.5.
[ "cpe:2.3:a:pannellum:pannellum:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
CVE-2025-31632
WordPress La Boom <= 2.7 - Local File Inclusion Vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in SpyroPress La Boom allows PHP Local File Inclusion. This issue affects La Boom: from n/a through 2.7.
[]
null
8.1
null
null
null
GHSA-h66g-j8m6-ppxf
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: clear optc underflow before turn off odm clock[Why] After ODM clock off, optc underflow bit will be kept there always and clear not work. We need to clear that before clock off.[How] Clear that if have when clock off.
[]
null
null
null
null
null
CVE-2022-30784
A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value in NTFS-3G through 2021.8.22.
[ "cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-75jm-2xrg-5wpf
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
[]
null
null
null
null
null
CVE-2018-9841
The export function in libavfilter/vf_signature.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a long filename.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2022-37811
Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the startIp parameter in the function formSetPPTPServer.
[ "cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-7j6v-f9wh-fxh8
Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
[]
null
null
null
null
null
GHSA-8f8r-5c27-46fh
Command Injection vulnerability in McAfee Enterprise Security Manager (ESM) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to execute arbitrary code via specially crafted parameters.
[]
null
7.2
null
null
null
GHSA-p7wg-mqfq-7vvc
In the Linux kernel, the following vulnerability has been resolved:net/sched: Restrict conditions for adding duplicating netems to qdisc treenetem_enqueue's duplication prevention logic breaks when a netem resides in a qdisc tree with other netems - this can lead to a soft lockup and OOM loop in netem_dequeue, as seen in [1]. Ensure that a duplicating netem cannot exist in a tree with other netems.Previous approaches suggested in discussions in chronological order:Track duplication status or ttl in the sk_buff struct. Considered too specific a use case to extend such a struct, though this would be a resilient fix and address other previous and potential future DOS bugs like the one described in loopy fun [2].Restrict netem_enqueue recursion depth like in act_mirred with a per cpu variable. However, netem_dequeue can call enqueue on its child, and the depth restriction could be bypassed if the child is a netem.Use the same approach as in 2, but add metadata in netem_skb_cb to handle the netem_dequeue case and track a packet's involvement in duplication. This is an overly complex approach, and Jamal notes that the skb cb can be overwritten to circumvent this safeguard.Prevent the addition of a netem to a qdisc tree if its ancestral path contains a netem. However, filters and actions can cause a packet to change paths when re-enqueued to the root from netem duplication, leading us to the current solution: prevent a duplicating netem from inhabiting the same tree as other netems.[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/ [2] https://lwn.net/Articles/719297/
[]
null
null
null
null
null
CVE-2021-44202
Stored cross-site scripting (XSS) was possible in activity details
Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
[ "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-j87v-9jp4-gw6c
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to bypass Privacy preferences.
[]
null
7.8
null
null
null
GHSA-6f7m-qfq2-4rxm
Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 11.1.1.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 6.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
6.9
null
null
CVE-2023-35870
Improper Access Control in SAP S/4HANA (Manage Journal Entry Template)
When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.
[ "cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4core:106:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
GHSA-g8hg-35m6-52vg
Multiple SQL injection vulnerabilities in NexusPHP before 1.7.33 allow remote attackers to execute arbitrary SQL commands via the conuser[] parameter in takeconfirm.php; the delcheater parameter in cheaterbox.php; or the usernw parameter in nowarn.php.
[]
null
9.8
null
null
null
GHSA-599m-qcrx-5wf3
SQL injection vulnerability in product_desc.php in MyPhpAuction 2010 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
null
CVE-2019-10928
A vulnerability has been identified in SCALANCE SC-600 (V2.0). An authenticated attacker with access to port 22/tcp as well as physical access to an affected device may trigger the device to allow execution of arbitrary commands. The security vulnerability could be exploited by an authenticated attacker with physical access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the confidentiality, integrity and availability of the affected device.
[ "cpe:2.3:o:siemens:scalance_sc-600_firmware:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*" ]
null
6.6
null
4.6
null
GHSA-388v-hgcc-fmvm
IBM FileNet WorkPlace XT could allow a remote attacker to upload arbitrary files, which could allow the attacker to execute arbitrary code on the vulnerable server.
[]
null
null
8.8
null
null
CVE-2013-3005
The TFTP client in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, when RBAC is enabled, allows remote authenticated users to bypass intended file-ownership restrictions, and read or overwrite arbitrary files, via unspecified vectors.
[ "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:vios:2.2.2.2:fp-26_sp-02:*:*:*:*:*:*" ]
null
null
null
8.5
null
CVE-2022-34549
Sims v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /uploadServlet. This vulnerability allows attackers to escalate privileges and execute arbitrary commands via a crafted file.
[ "cpe:2.3:a:sims_project:sims:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2021-31795
The PowerVR GPU kernel driver in pvrsrvkm.ko through 2021-04-24 for the Linux kernel, as used on Alcatel 1S phones, allows attackers to overwrite heap memory via PhysmemNewRamBackedPMR.
[ "cpe:2.3:a:pvrsrvkm.ko_project:pvrsrvkm.ko:*:*:*:*:*:*:*:*" ]
null
7
null
6.9
null
GHSA-f96g-5rmj-pfhf
PivotX 2.3.11 allows remote authenticated users to execute arbitrary PHP code via vectors involving an upload of a .htaccess file.
[]
null
null
8.8
null
null
GHSA-7497-r7g9-h259
An authenticated user without user-management permissions could view other users' account information.
[]
null
6.5
null
null
null
GHSA-9hvp-8c63-f499
The Post Connector plugin before 1.0.4 for WordPress has XSS via add_query_arg() and remove_query_arg().
[]
null
null
6.1
null
null
GHSA-xp5g-v8fx-97mv
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).
[]
null
7.5
null
null
null
CVE-2025-30531
WordPress WP Ride Booking plugin <= 2.4 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in GBS Developer WP Ride Booking allows Cross Site Request Forgery. This issue affects WP Ride Booking: from n/a through 2.4.
[]
null
4.3
null
null
null
CVE-2024-2753
Concrete CMS version 9 below 9.2.8 and below 8.5.16 is vulnerable to stored XSS on the calendar color settings screen
Concrete CMS version 9 before 9.2.8 and previous versions prior to 8.5.16 is vulnerable to Stored XSS on the calendar color settings screen since Information input by the user is output without escaping. A rogue administrator could inject malicious javascript into the Calendar Color Settings screen which might be executed when users visit the affected page. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 2.0 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N&version=3.1 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator   Thank you Rikuto Tauchi for reporting
[ "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*" ]
null
2
null
null
null
CVE-2022-48070
Phicomm K2 v22.6.534.263 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.
[ "cpe:2.3:o:phicomm:k2_firmware:22.6.534.263:*:*:*:*:*:*:*", "cpe:2.3:h:phicomm:k2:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2025-31606
WordPress SP Blog Designer plugin <= 1.0.0 - Arbitrary Shortcode Execution vulnerability
Missing Authorization vulnerability in softpulseinfotech SP Blog Designer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SP Blog Designer: from n/a through 1.0.0.
[]
null
4.8
null
null
null
GHSA-h53q-wm32-jhmq
Microsoft Excel Remote Code Execution Vulnerability
[]
null
7.8
null
null
null
RHSA-2008:0389
Red Hat Security Advisory: nss_ldap security and bug fix update
nss_ldap randomly replying with wrong user's data
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
RHSA-2023:4063
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
null
GHSA-936f-xp4r-7g6w
webTareas through 2.1 allows upload of the dangerous .exe and .shtml file types.
[]
null
null
null
null
null
GHSA-4xch-3w57-6pj7
In the module extratabspro before version 2.2.8 from MyPresta.eu for PrestaShop, a guest can perform SQL injection via `extratabspro::searchcategory()`, `extratabspro::searchproduct()` and `extratabspro::searchmanufacturer().'
[]
null
9.8
null
null
null
CVE-2022-31515
The Delor4/CarceresBE repository through 1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[ "cpe:2.3:a:carceresbe_project:carceresbe:1.0:*:*:*:*:*:*:*" ]
null
9.3
null
6.4
null
CVE-2006-0044
Unspecified vulnerability in context.py in Albatross web application toolkit before 1.33 allows remote attackers to execute arbitrary commands via unspecified vectors involving template files and the "handling of submitted form fields".
[ "cpe:2.3:a:albatross:albatross:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:albatross:albatross:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:albatross:albatross:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:albatross:albatross:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:albatross:albatross:1.30:*:*:*:*:*:*:*", "cpe:2.3:a:albatross:albatross:1.32:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-38729
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Plist.php.
[ "cpe:2.3:a:sem-cms:semcms:1.1:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-cjm2-6jxj-2465
In the Linux kernel, the following vulnerability has been resolved:thermal: intel: int340x: processor: Fix warning during module unloadThe processor_thermal driver uses pcim_device_enable() to enable a PCI device, which means the device will be automatically disabled on driver detach. Thus there is no need to call pci_disable_device() again on it.With recent PCI device resource management improvements, e.g. commit f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is exposed and triggers the warining below.[ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device [ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100 ... [ 224.010844] Call Trace: [ 224.010845] <TASK> [ 224.010847] ? show_regs+0x6d/0x80 [ 224.010851] ? __warn+0x8c/0x140 [ 224.010854] ? pci_disable_device+0xe5/0x100 [ 224.010856] ? report_bug+0x1c9/0x1e0 [ 224.010859] ? handle_bug+0x46/0x80 [ 224.010862] ? exc_invalid_op+0x1d/0x80 [ 224.010863] ? asm_exc_invalid_op+0x1f/0x30 [ 224.010867] ? pci_disable_device+0xe5/0x100 [ 224.010869] ? pci_disable_device+0xe5/0x100 [ 224.010871] ? kfree+0x21a/0x2b0 [ 224.010873] pcim_disable_device+0x20/0x30 [ 224.010875] devm_action_release+0x16/0x20 [ 224.010878] release_nodes+0x47/0xc0 [ 224.010880] devres_release_all+0x9f/0xe0 [ 224.010883] device_unbind_cleanup+0x12/0x80 [ 224.010885] device_release_driver_internal+0x1ca/0x210 [ 224.010887] driver_detach+0x4e/0xa0 [ 224.010889] bus_remove_driver+0x6f/0xf0 [ 224.010890] driver_unregister+0x35/0x60 [ 224.010892] pci_unregister_driver+0x44/0x90 [ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci] ... [ 224.010921] ---[ end trace 0000000000000000 ]---Remove the excess pci_disable_device() calls.[ rjw: Subject and changelog edits ]
[]
null
5.5
null
null
null
CVE-2008-1831
Multiple unspecified vulnerabilities in the Siebel SimBuilder component in Oracle Siebel Enterprise 7.8.2 and 7.8.5 have unknown impact and remote or local attack vectors, aka (1) SEBL01, (2) SEBL02, (3) SEBL03, (4) SEBL04, (5) SEBL05, and (6) SEBL06.
[ "cpe:2.3:a:oracle:siebel_enterprise:7.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_enterprise:7.8.5:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2024-30348
Foxit PDF Reader U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Foxit PDF Reader U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22911.
[ "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:13.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:2023.0:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2022-50220
usbnet: Fix linkwatch use-after-free on disconnect
In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix linkwatch use-after-free on disconnect usbnet uses the work usbnet_deferred_kevent() to perform tasks which may sleep. On disconnect, completion of the work was originally awaited in ->ndo_stop(). But in 2003, that was moved to ->disconnect() by historic commit "[PATCH] USB: usbnet, prevent exotic rtnl deadlock": https://git.kernel.org/tglx/history/c/0f138bbfd83c The change was made because back then, the kernel's workqueue implementation did not allow waiting for a single work. One had to wait for completion of *all* work by calling flush_scheduled_work(), and that could deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex held in ->ndo_stop(). The commit solved one problem but created another: It causes a use-after-free in USB Ethernet drivers aqc111.c, asix_devices.c, ax88179_178a.c, ch9200.c and smsc75xx.c: * If the drivers receive a link change interrupt immediately before disconnect, they raise EVENT_LINK_RESET in their (non-sleepable) ->status() callback and schedule usbnet_deferred_kevent(). * usbnet_deferred_kevent() invokes the driver's ->link_reset() callback, which calls netif_carrier_{on,off}(). * That in turn schedules the work linkwatch_event(). Because usbnet_deferred_kevent() is awaited after unregister_netdev(), netif_carrier_{on,off}() may operate on an unregistered netdev and linkwatch_event() may run after free_netdev(), causing a use-after-free. In 2010, usbnet was changed to only wait for a single instance of usbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf ("drivers/net: don't use flush_scheduled_work()"). Unfortunately the commit neglected to move the wait back to ->ndo_stop(). Rectify that omission at long last.
[]
null
null
null
null
null
CVE-2024-12274
BookingPress < 1.1.23 - Unauthenticated Export File Download
The Appointment Booking Calendar Plugin and Scheduling Plugin WordPress plugin before 1.1.23 export settings functionality exports data to a public folder, with an easily guessable file name, allowing unauthenticated attackers to access the exported files (if they exist).
[]
null
7.5
null
null
null
GHSA-5fcg-g7jg-hx9p
Cross-Site Request Forgery (CSRF) vulnerability in hosting.io, campaigns.io WP Controller allows Stored XSS.This issue affects WP Controller: from n/a through 3.2.0.
[]
null
7.1
null
null
null
RHSA-2021:4614
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update
httpd: mod_proxy_wstunnel tunneling of non Upgraded connection pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 httpd: mod_proxy NULL pointer dereference pcre: Integer overflow when parsing callout numeric arguments httpd: Single zero byte stack overflow in mod_auth_digest JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: Unexpected URL matching with 'MergeSlashes OFF' httpd: NULL pointer dereference via malformed requests
[ "cpe:/a:redhat:jboss_core_services:1::el7", "cpe:/a:redhat:jboss_core_services:1::el8" ]
null
7.5
null
null
null
CVE-2017-2240
Directory traversal vulnerability in AssetView for MacOS Ver.9.2.0 and earlier versions allows remote attackers to read arbitrary files via "File Transfer Web Service".
[ "cpe:2.3:a:hammock:assetview:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
GHSA-89px-ww3j-g2mm
2FA bypass in Wagtail through new device path
2FA bypass through new device pathImpactIf someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.PatchesThis problem has been patched in version 1.3.0.WorkaroundsThere is no workaround at the moment.For more informationIf you have any questions or comments about this advisory:Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa)Email us at [[email protected]](mailto:[email protected])
[]
6.3
8.7
null
null
null
CVE-2014-7828
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.
[ "cpe:2.3:a:freeipa:freeipa:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:freeipa:freeipa:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeipa:freeipa:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeipa:freeipa:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeipa:freeipa:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:freeipa:freeipa:4.1.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2019-18228
Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service.
[ "cpe:2.3:o:honeywell:h2w2pc1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w2pc1m:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h2w2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h2w4per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w4per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w2per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w2per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w4per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w4per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w4per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w4per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w8pr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w8pr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbd2per1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbd2per1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw2per1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw2per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw2per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw4per1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw4per1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw4per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw4per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw4pgr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw4pgr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw8pr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw8pr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hed2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hed2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew2per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew2per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew4per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew4per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew4per3b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew4per3b:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdzp252di_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdzp304di_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hpw2p1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h2w2gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-j99w-349h-39gr
ajax.functions.php in the MailUp plugin before 1.3.3 for WordPress does not properly restrict access to unspecified Ajax functions, which allows remote attackers to modify plugin settings and conduct cross-site scripting (XSS) attacks by setting the wordpress_logged_in cookie. NOTE: this is due to an incomplete fix for a similar issue that was fixed in 1.3.2.
[]
null
null
null
null
null
CVE-2014-0669
The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.
[ "cpe:2.3:a:cisco:asr_5000_series_software:-:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2017:2797
Red Hat Security Advisory: kernel security update
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.8
null
null
CVE-2025-22841
Arkcompiler Ets Runtime has an out-of-bounds read vulnerability
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
[]
null
3.3
null
null
null
GHSA-3m2w-jxjv-4wfv
Command Injection vulnerability discovered in 4ipnet EAP-767 device v3.42.00 within the web interface of the device allows attackers with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges.
[]
null
8.8
null
null
null
GHSA-h9cj-5pxp-v3gc
A remote code execution vulnerability in libavc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34097672.
[]
null
null
7.8
null
null
RHSA-2009:1484
Red Hat Security Advisory: postgresql security update
postgresql: potential DoS due to conversion functions postgresql: SQL privilege escalation, incomplete fix for CVE-2007-6600
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-2xfx-cg6v-cwqv
A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.
[]
null
6.7
null
null
null
GHSA-fg8c-5jfr-hgj7
In loadMediaDataInBgForResumption of MediaDataManager.kt, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
5.5
null
null
null
CVE-2025-27721
INFINITT Healthcare INFINITT PACS Exposure of Sensitive System Information to an Unauthorized Control Sphere
Unauthorized users can access INFINITT PACS System Manager without proper authorization, which could lead to unauthorized access to system resources.
[]
8.7
7.5
null
null
null
GHSA-g3j5-jrc2-9mhp
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin <= 7.1 versions.
[]
null
5.9
null
null
null
CVE-2016-4945
Cross-site scripting (XSS) vulnerability in vpn/js/gateway_login_form_view.js in Citrix NetScaler Gateway 11.0 before Build 66.11 allows remote attackers to inject arbitrary web script or HTML via the NSC_TMAC cookie.
[ "cpe:2.3:h:citrix:netscaler_gateway_11.0:-:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_gateway_11.0_firmware:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2014-3453
Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import. NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page.
[ "cpe:2.3:a:flag_module_project:flag:*:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:-:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha1:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha2:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha3:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha4:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:beta1:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.0:rc1:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.4:*:*:*:*:drupal:*:*", "cpe:2.3:a:flag_module_project:flag:7.x-3.x:dev:*:*:*:drupal:*:*" ]
null
null
null
6.5
null
CVE-2025-25064
SQL injection vulnerability in the ZimbraSync Service SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4 due to insufficient sanitization of a user-supplied parameter. Authenticated attackers can exploit this vulnerability by manipulating a specific parameter in the request, allowing them to inject arbitrary SQL queries that could retrieve email metadata.
[]
null
8.8
null
null
null
CVE-2002-2032
sql_layer.php in PHP-Nuke 5.4 and earlier does not restrict access to debugging features, which allows remote attackers to gain SQL query information by setting the sql_debug parameter to (1) index.php and (2) modules.php.
[ "cpe:2.3:a:francisco_burzi:php-nuke:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:4.4.1a:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2012-6510
Multiple cross-site scripting (XSS) vulnerabilities in NetArt Media Car Portal 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) PWRS or (2) Description field when posting a new vehicle; (3) news title when creating news; (4) Name when creating a sub user; (5) group name when creating a group; or (6) dealer name, (7) first name, or (8) last name when changing a profile.
[ "cpe:2.3:a:netartmedia:car_portal:3.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-8570
itsourcecode Tailoring Management System inccatadd.php sql injection
A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /inccatadd.php. The manipulation of the argument title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:itsourcecode:tailoring_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
CVE-2012-6357
IBM Maximo Asset Management 7.5, Maximo Asset Management Essentials 7.5, and SmartCloud Control Desk 7.5 allow remote authenticated users to gain privileges and bypass intended restrictions on asset-lookup operations via unspecified vectors.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.0:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2017-16105
serverwzl is a simple http server. serverwzl is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
[ "cpe:2.3:a:serverwzl_project:serverwzl:*:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
null
GHSA-8phh-ch6h-hm63
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Felipe Peixoto Powerful Auto Chat allows Stored XSS. This issue affects Powerful Auto Chat: from n/a through 1.9.8.
[]
null
6.5
null
null
null
GHSA-rrqx-xr4w-7wpj
An issue in the relPath parameter of WebFileSys version 2.31.0 allows attackers to perform directory traversal via a crafted HTTP request. By injecting traversal payloads into the parameter, attackers can manipulate file paths and gain unauthorized access to sensitive files, potentially exposing data outside the intended directory.
[]
null
7.3
null
null
null
CVE-2024-22261
SQL Injection in Harbor scan log API
SQL-Injection in Harbor allows priviledge users to leak the task IDs
[]
null
2.7
null
null
null
GHSA-63gp-3rq7-g7h2
Windows iSCSI Target Service Information Disclosure Vulnerability.
[]
null
6.5
null
null
null
CVE-2017-8541
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8540.
[ "cpe:2.3:a:microsoft:forefront_security:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:malware_protection_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
GHSA-h4fj-8h2w-pj8r
Apple iOS before 9 allows attackers to obtain sensitive information about inter-app communication via a crafted app that conducts an interception attack involving an unspecified URL scheme.
[]
null
null
null
null
null
CVE-2020-36628
Calsign APDE ZIP File CopyBuildTask.java handleExtract path traversal
A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747.
[ "cpe:2.3:a:android_processing_development_environment_project:android_processing_development_environment:*:*:*:*:*:android:*:*", "cpe:2.3:a:android_processing_development_environment_project:android_processing_development_environment:0.5.2:pre1_alpha:*:*:*:android:*:*" ]
null
5.5
5.5
null
null
CVE-2024-2311
The Avada theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 7.11.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2024-28944
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
CVE-2020-5140
A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service by sending a malicious HTTP request that leads to memory addresses leak. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
[ "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sonicos:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sonicosv:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2024-12585
PropertyHive < 2.1.1 - Reflected XSS
The Property Hive WordPress plugin before 2.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
null
6.1
null
null
null
RHSA-2021:1030
Red Hat Security Advisory: tomcat security update
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
4.3
null
null
null
CVE-2023-24097
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formPasswordAuth. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ "cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-820ap:1.0r:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2025-25069
Apache Kvrocks: Cross-Protocol Scripting Vulnerability
A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks. Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests, a valid HTTP request can also be sent to Kvrocks as a valid RESP request and trigger some database operations, which can be dangerous when it is chained with SSRF. It is similiar to CVE-2016-10517 in Redis. This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0. Users are recommended to upgrade to version 2.11.1, which fixes the issue.
[]
null
6.5
null
null
null
CVE-2024-3794
Cross-site Scripting vulnerability in WBSAirback
Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XSS) through /admin/AdvancedSystem, description field, all parameters. Exploitation of this vulnerability could allow a remote user to send a specially crafted URL to the victim and steal their session data.
[]
null
4.8
null
null
null
CVE-2024-29851
Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account.
[ "cpe:2.3:a:veeam:backup_enterprise_manager:*:*:*:*:*:*:*:*" ]
null
null
7.2
null
null