id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-9789-3997-xv2g
|
IBM Sterling Order Management 8.0 before HF127, 8.5 before HF89, 9.0 before HF69, 9.1.0 before FP41, and 9.2.0 before FP13 allows remote authenticated users to conduct XPath injection attacks, and read arbitrary XML files, via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-mm42-r25h-g74g
|
Unspecified vulnerability in Check Point Multi-Domain Management / Provider-1 NGX R65, R70, R71, and R75, and SmartCenter during installation on non-Windows machines, allows local users on the MDS system to overwrite arbitrary files via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-1000083
|
backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.
|
[
"cpe:2.3:a:gnome:evince:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-wpjm-p3jv-8c5m
|
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a CSRF issue (with resultant SSRF) in the com_mb24proxy module, allowing attackers to steal session information from logged-in users with a crafted link.
|
[] | null | null | null | null | null |
|
GHSA-5pvv-f8h3-gw96
|
phpMyAdmin Cross-site Scripting In MySQL Table Name
|
Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.11.x before 2.11.9.6 and 3.x before 3.2.2.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name for a MySQL table.
|
[] | null | null | null | null | null |
GHSA-742j-rfqh-7886
|
Remote command injection vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows a remote, authenticated attacker to execute arbitrary commands on the target device by adding an access control rule for a network object with a crafted hostname.
|
[] | null | null | 7.2 | null | null |
|
RHSA-2011:0369
|
Red Hat Security Advisory: wireshark security update
|
wireshark: buffer overflow in MAC-LTE disector (upstream bug #5530) Wireshark: memory corruption when reading a malformed pcap file (upstream bug #5652) Wireshark: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces Wireshark: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field Wireshark: Multiple stack consumption vulnerabilities caused DoS via crafted SMB or CLDAP packet Wireshark: Malformed LDAP filter string causes Denial of Service via excessive memory consumption
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-4pvx-p59r-j47h
|
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
|
[] | null | 7.8 | null | null | null |
|
CVE-2016-10798
|
cPanel before 58.0.4 allows a file-ownership change (to nobody) via rearrangeacct (SEC-134).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.9 | null |
|
CVE-2018-12481
|
The Olive Tree Ftp Server application 1.32 for Android has a "Sensitive Data on the Clipboard" vulnerability, as demonstrated by reading the "User password" field with the Drozer post.capture.clipboard module.
|
[
"cpe:2.3:a:the_olive_tree_ftp_server_project:the_olive_tree_ftp_server:1.32:*:*:*:*:android:*:*"
] | null | null | 9.8 | 5 | null |
|
CVE-2019-0894
|
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0889, CVE-2019-0890, CVE-2019-0891, CVE-2019-0893, CVE-2019-0895, CVE-2019-0896, CVE-2019-0897, CVE-2019-0898, CVE-2019-0899, CVE-2019-0900, CVE-2019-0901, CVE-2019-0902.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-f2q5-wfpv-jc4m
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Asmedia Tuaug4 allows Reflected XSS.This issue affects Tuaug4: from n/a through 1.4.
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-25031
|
WordPress Arigato Autoresponder and Newsletter Plugin <= 2.7.1 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1 versions.
|
[
"cpe:2.3:a:kibokolabs:arigato_autoresponder_and_newsletter:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-wqq7-m9hm-p4xw
|
The PZ Frontend Manager WordPress plugin before 1.0.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
|
[] | null | 8.8 | null | null | null |
|
GHSA-356g-gr7f-c28h
|
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | 8.2 | null | null | null |
|
CVE-2024-32963
|
Parameter Tampering vulnerability in Navidrome
|
Navidrome is an open source web-based music collection server and streamer. In affected versions of Navidrome are subject to a parameter tampering vulnerability where an attacker has the ability to manipulate parameter values in the HTTP requests. The attacker is able to change the parameter values in the body and successfully impersonate another user. In this case, the attacker created a playlist, added song, posted arbitrary comment, set the playlist to be public, and put the admin as the owner of the playlist. The attacker must be able to intercept http traffic for this attack. Each known user is impacted. An attacker can obtain the ownerId from shared playlist information, meaning every user who has shared a playlist is also impacted, as they can be impersonated. This issue has been addressed in version 0.52.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:navidrome:navidrome:-:*:*:*:*:*:*:*"
] | null | 4.2 | null | null | null |
RHSA-2025:7435
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Information Disclosure of /tmp directory listing thunderbird: Leak of hashed Window credentials via crafted attachment URL thunderbird: User Interface (UI) Misrepresentation of attachment URL
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.4 | null | null | null |
CVE-2019-16763
|
XSS in Pannellum from 2.5.0 through 2.5.4
|
In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if pannellum.htm was hosted on a domain that shared cookies with the targeted site's user authentication; an <iframe> could then be embedded on the attacker's site using pannellum.htm from the targeted site, which would allow the attacker to potentially access information from the targeted site as the authenticated user (or worse if the targeted site did not have adequate CSRF protections) if the user clicked on a hot spot in the attacker's embedded panorama viewer. This was patched in version 2.5.5.
|
[
"cpe:2.3:a:pannellum:pannellum:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
CVE-2025-31632
|
WordPress La Boom <= 2.7 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in SpyroPress La Boom allows PHP Local File Inclusion. This issue affects La Boom: from n/a through 2.7.
|
[] | null | 8.1 | null | null | null |
GHSA-h66g-j8m6-ppxf
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: clear optc underflow before turn off odm clock[Why]
After ODM clock off, optc underflow bit will be kept there always and clear not work.
We need to clear that before clock off.[How]
Clear that if have when clock off.
|
[] | null | null | null | null | null |
|
CVE-2022-30784
|
A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value in NTFS-3G through 2021.8.22.
|
[
"cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-75jm-2xrg-5wpf
|
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
|
[] | null | null | null | null | null |
|
CVE-2018-9841
|
The export function in libavfilter/vf_signature.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a long filename.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2022-37811
|
Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the startIp parameter in the function formSetPPTPServer.
|
[
"cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-7j6v-f9wh-fxh8
|
Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
|
[] | null | null | null | null | null |
|
GHSA-8f8r-5c27-46fh
|
Command Injection vulnerability in McAfee Enterprise Security Manager (ESM) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to execute arbitrary code via specially crafted parameters.
|
[] | null | 7.2 | null | null | null |
|
GHSA-p7wg-mqfq-7vvc
|
In the Linux kernel, the following vulnerability has been resolved:net/sched: Restrict conditions for adding duplicating netems to qdisc treenetem_enqueue's duplication prevention logic breaks when a netem
resides in a qdisc tree with other netems - this can lead to a
soft lockup and OOM loop in netem_dequeue, as seen in [1].
Ensure that a duplicating netem cannot exist in a tree with other
netems.Previous approaches suggested in discussions in chronological order:Track duplication status or ttl in the sk_buff struct. Considered
too specific a use case to extend such a struct, though this would
be a resilient fix and address other previous and potential future
DOS bugs like the one described in loopy fun [2].Restrict netem_enqueue recursion depth like in act_mirred with a
per cpu variable. However, netem_dequeue can call enqueue on its
child, and the depth restriction could be bypassed if the child is a
netem.Use the same approach as in 2, but add metadata in netem_skb_cb
to handle the netem_dequeue case and track a packet's involvement
in duplication. This is an overly complex approach, and Jamal
notes that the skb cb can be overwritten to circumvent this
safeguard.Prevent the addition of a netem to a qdisc tree if its ancestral
path contains a netem. However, filters and actions can cause a
packet to change paths when re-enqueued to the root from netem
duplication, leading us to the current solution: prevent a
duplicating netem from inhabiting the same tree as other netems.[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/
[2] https://lwn.net/Articles/719297/
|
[] | null | null | null | null | null |
|
CVE-2021-44202
|
Stored cross-site scripting (XSS) was possible in activity details
|
Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
|
[
"cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
GHSA-j87v-9jp4-gw6c
|
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to bypass Privacy preferences.
|
[] | null | 7.8 | null | null | null |
|
GHSA-6f7m-qfq2-4rxm
|
Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 11.1.1.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 6.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | 6.9 | null | null |
|
CVE-2023-35870
|
Improper Access Control in SAP S/4HANA (Manage Journal Entry Template)
|
When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.
|
[
"cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:106:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
GHSA-g8hg-35m6-52vg
|
Multiple SQL injection vulnerabilities in NexusPHP before 1.7.33 allow remote attackers to execute arbitrary SQL commands via the conuser[] parameter in takeconfirm.php; the delcheater parameter in cheaterbox.php; or the usernw parameter in nowarn.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-599m-qcrx-5wf3
|
SQL injection vulnerability in product_desc.php in MyPhpAuction 2010 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
CVE-2019-10928
|
A vulnerability has been identified in SCALANCE SC-600 (V2.0). An authenticated attacker with access to port 22/tcp as well as physical access to an affected device may trigger the device to allow execution of arbitrary commands. The security vulnerability could be exploited by an authenticated attacker with physical access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the confidentiality, integrity and availability of the affected device.
|
[
"cpe:2.3:o:siemens:scalance_sc-600_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*"
] | null | 6.6 | null | 4.6 | null |
|
GHSA-388v-hgcc-fmvm
|
IBM FileNet WorkPlace XT could allow a remote attacker to upload arbitrary files, which could allow the attacker to execute arbitrary code on the vulnerable server.
|
[] | null | null | 8.8 | null | null |
|
CVE-2013-3005
|
The TFTP client in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, when RBAC is enabled, allows remote authenticated users to bypass intended file-ownership restrictions, and read or overwrite arbitrary files, via unspecified vectors.
|
[
"cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:vios:2.2.2.2:fp-26_sp-02:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
CVE-2022-34549
|
Sims v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /uploadServlet. This vulnerability allows attackers to escalate privileges and execute arbitrary commands via a crafted file.
|
[
"cpe:2.3:a:sims_project:sims:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2021-31795
|
The PowerVR GPU kernel driver in pvrsrvkm.ko through 2021-04-24 for the Linux kernel, as used on Alcatel 1S phones, allows attackers to overwrite heap memory via PhysmemNewRamBackedPMR.
|
[
"cpe:2.3:a:pvrsrvkm.ko_project:pvrsrvkm.ko:*:*:*:*:*:*:*:*"
] | null | 7 | null | 6.9 | null |
|
GHSA-f96g-5rmj-pfhf
|
PivotX 2.3.11 allows remote authenticated users to execute arbitrary PHP code via vectors involving an upload of a .htaccess file.
|
[] | null | null | 8.8 | null | null |
|
GHSA-7497-r7g9-h259
|
An authenticated user without user-management permissions could view other users' account information.
|
[] | null | 6.5 | null | null | null |
|
GHSA-9hvp-8c63-f499
|
The Post Connector plugin before 1.0.4 for WordPress has XSS via add_query_arg() and remove_query_arg().
|
[] | null | null | 6.1 | null | null |
|
GHSA-xp5g-v8fx-97mv
|
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).
|
[] | null | 7.5 | null | null | null |
|
CVE-2025-30531
|
WordPress WP Ride Booking plugin <= 2.4 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in GBS Developer WP Ride Booking allows Cross Site Request Forgery. This issue affects WP Ride Booking: from n/a through 2.4.
|
[] | null | 4.3 | null | null | null |
CVE-2024-2753
|
Concrete CMS version 9 below 9.2.8 and below 8.5.16 is vulnerable to stored XSS on the calendar color settings screen
|
Concrete CMS version 9 before 9.2.8 and previous versions prior to 8.5.16 is vulnerable to Stored XSS on the calendar color settings screen since Information input by the user is output without escaping. A rogue administrator could inject malicious javascript into the Calendar Color Settings screen which might be executed when users visit the affected page. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 2.0 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N&version=3.1 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
Thank you Rikuto Tauchi for reporting
|
[
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 2 | null | null | null |
CVE-2022-48070
|
Phicomm K2 v22.6.534.263 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.
|
[
"cpe:2.3:o:phicomm:k2_firmware:22.6.534.263:*:*:*:*:*:*:*",
"cpe:2.3:h:phicomm:k2:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2025-31606
|
WordPress SP Blog Designer plugin <= 1.0.0 - Arbitrary Shortcode Execution vulnerability
|
Missing Authorization vulnerability in softpulseinfotech SP Blog Designer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SP Blog Designer: from n/a through 1.0.0.
|
[] | null | 4.8 | null | null | null |
GHSA-h53q-wm32-jhmq
|
Microsoft Excel Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
|
RHSA-2008:0389
|
Red Hat Security Advisory: nss_ldap security and bug fix update
|
nss_ldap randomly replying with wrong user's data
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
RHSA-2023:4063
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null | null |
GHSA-936f-xp4r-7g6w
|
webTareas through 2.1 allows upload of the dangerous .exe and .shtml file types.
|
[] | null | null | null | null | null |
|
GHSA-4xch-3w57-6pj7
|
In the module extratabspro before version 2.2.8 from MyPresta.eu for PrestaShop, a guest can perform SQL injection via `extratabspro::searchcategory()`, `extratabspro::searchproduct()` and `extratabspro::searchmanufacturer().'
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-31515
|
The Delor4/CarceresBE repository through 1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
|
[
"cpe:2.3:a:carceresbe_project:carceresbe:1.0:*:*:*:*:*:*:*"
] | null | 9.3 | null | 6.4 | null |
|
CVE-2006-0044
|
Unspecified vulnerability in context.py in Albatross web application toolkit before 1.33 allows remote attackers to execute arbitrary commands via unspecified vectors involving template files and the "handling of submitted form fields".
|
[
"cpe:2.3:a:albatross:albatross:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:albatross:albatross:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:albatross:albatross:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:albatross:albatross:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:albatross:albatross:1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:albatross:albatross:1.32:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-38729
|
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Plist.php.
|
[
"cpe:2.3:a:sem-cms:semcms:1.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-cjm2-6jxj-2465
|
In the Linux kernel, the following vulnerability has been resolved:thermal: intel: int340x: processor: Fix warning during module unloadThe processor_thermal driver uses pcim_device_enable() to enable a PCI
device, which means the device will be automatically disabled on driver
detach. Thus there is no need to call pci_disable_device() again on it.With recent PCI device resource management improvements, e.g. commit
f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is
exposed and triggers the warining below.[ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device
[ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100
...
[ 224.010844] Call Trace:
[ 224.010845] <TASK>
[ 224.010847] ? show_regs+0x6d/0x80
[ 224.010851] ? __warn+0x8c/0x140
[ 224.010854] ? pci_disable_device+0xe5/0x100
[ 224.010856] ? report_bug+0x1c9/0x1e0
[ 224.010859] ? handle_bug+0x46/0x80
[ 224.010862] ? exc_invalid_op+0x1d/0x80
[ 224.010863] ? asm_exc_invalid_op+0x1f/0x30
[ 224.010867] ? pci_disable_device+0xe5/0x100
[ 224.010869] ? pci_disable_device+0xe5/0x100
[ 224.010871] ? kfree+0x21a/0x2b0
[ 224.010873] pcim_disable_device+0x20/0x30
[ 224.010875] devm_action_release+0x16/0x20
[ 224.010878] release_nodes+0x47/0xc0
[ 224.010880] devres_release_all+0x9f/0xe0
[ 224.010883] device_unbind_cleanup+0x12/0x80
[ 224.010885] device_release_driver_internal+0x1ca/0x210
[ 224.010887] driver_detach+0x4e/0xa0
[ 224.010889] bus_remove_driver+0x6f/0xf0
[ 224.010890] driver_unregister+0x35/0x60
[ 224.010892] pci_unregister_driver+0x44/0x90
[ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci]
...
[ 224.010921] ---[ end trace 0000000000000000 ]---Remove the excess pci_disable_device() calls.[ rjw: Subject and changelog edits ]
|
[] | null | 5.5 | null | null | null |
|
CVE-2008-1831
|
Multiple unspecified vulnerabilities in the Siebel SimBuilder component in Oracle Siebel Enterprise 7.8.2 and 7.8.5 have unknown impact and remote or local attack vectors, aka (1) SEBL01, (2) SEBL02, (3) SEBL03, (4) SEBL04, (5) SEBL05, and (6) SEBL06.
|
[
"cpe:2.3:a:oracle:siebel_enterprise:7.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_enterprise:7.8.5:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-30348
|
Foxit PDF Reader U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Foxit PDF Reader U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22911.
|
[
"cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:2023.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2022-50220
|
usbnet: Fix linkwatch use-after-free on disconnect
|
In the Linux kernel, the following vulnerability has been resolved:
usbnet: Fix linkwatch use-after-free on disconnect
usbnet uses the work usbnet_deferred_kevent() to perform tasks which may
sleep. On disconnect, completion of the work was originally awaited in
->ndo_stop(). But in 2003, that was moved to ->disconnect() by historic
commit "[PATCH] USB: usbnet, prevent exotic rtnl deadlock":
https://git.kernel.org/tglx/history/c/0f138bbfd83c
The change was made because back then, the kernel's workqueue
implementation did not allow waiting for a single work. One had to wait
for completion of *all* work by calling flush_scheduled_work(), and that
could deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex
held in ->ndo_stop().
The commit solved one problem but created another: It causes a
use-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,
ax88179_178a.c, ch9200.c and smsc75xx.c:
* If the drivers receive a link change interrupt immediately before
disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)
->status() callback and schedule usbnet_deferred_kevent().
* usbnet_deferred_kevent() invokes the driver's ->link_reset() callback,
which calls netif_carrier_{on,off}().
* That in turn schedules the work linkwatch_event().
Because usbnet_deferred_kevent() is awaited after unregister_netdev(),
netif_carrier_{on,off}() may operate on an unregistered netdev and
linkwatch_event() may run after free_netdev(), causing a use-after-free.
In 2010, usbnet was changed to only wait for a single instance of
usbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf
("drivers/net: don't use flush_scheduled_work()").
Unfortunately the commit neglected to move the wait back to
->ndo_stop(). Rectify that omission at long last.
|
[] | null | null | null | null | null |
CVE-2024-12274
|
BookingPress < 1.1.23 - Unauthenticated Export File Download
|
The Appointment Booking Calendar Plugin and Scheduling Plugin WordPress plugin before 1.1.23 export settings functionality exports data to a public folder, with an easily guessable file name, allowing unauthenticated attackers to access the exported files (if they exist).
|
[] | null | 7.5 | null | null | null |
GHSA-5fcg-g7jg-hx9p
|
Cross-Site Request Forgery (CSRF) vulnerability in hosting.io, campaigns.io WP Controller allows Stored XSS.This issue affects WP Controller: from n/a through 3.2.0.
|
[] | null | 7.1 | null | null | null |
|
RHSA-2021:4614
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update
|
httpd: mod_proxy_wstunnel tunneling of non Upgraded connection pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 httpd: mod_proxy NULL pointer dereference pcre: Integer overflow when parsing callout numeric arguments httpd: Single zero byte stack overflow in mod_auth_digest JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: Unexpected URL matching with 'MergeSlashes OFF' httpd: NULL pointer dereference via malformed requests
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 7.5 | null | null | null |
CVE-2017-2240
|
Directory traversal vulnerability in AssetView for MacOS Ver.9.2.0 and earlier versions allows remote attackers to read arbitrary files via "File Transfer Web Service".
|
[
"cpe:2.3:a:hammock:assetview:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-89px-ww3j-g2mm
|
2FA bypass in Wagtail through new device path
|
2FA bypass through new device pathImpactIf someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.PatchesThis problem has been patched in version 1.3.0.WorkaroundsThere is no workaround at the moment.For more informationIf you have any questions or comments about this advisory:Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa)Email us at [[email protected]](mailto:[email protected])
|
[] | 6.3 | 8.7 | null | null | null |
CVE-2014-7828
|
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.
|
[
"cpe:2.3:a:freeipa:freeipa:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeipa:freeipa:4.1.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2019-18228
|
Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service.
|
[
"cpe:2.3:o:honeywell:h2w2pc1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h2w2pc1m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h2w2per3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h2w2per3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h2w4per3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h2w4per3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h4w2per2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h4w2per2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h4w2per3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h4w2per3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h4w4per2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h4w4per2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h4w4per3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h4w4per3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h4w8pr2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h4w8pr2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hbd2per1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hbd2per1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hbw2per1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hbw2per2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hbw2per2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hbw4per1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hbw4per1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hbw4per2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hbw4per2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hbw4pgr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hbw4pgr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hbw8pr2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hbw8pr2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hed2per3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hed2per3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hew2per2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hew2per2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hew2per3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hew2per3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hew4per3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hew4per3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hew4per3b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hew4per3b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hdzp252di_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hdzp304di_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hpw2p1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:h2w2gr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-j99w-349h-39gr
|
ajax.functions.php in the MailUp plugin before 1.3.3 for WordPress does not properly restrict access to unspecified Ajax functions, which allows remote attackers to modify plugin settings and conduct cross-site scripting (XSS) attacks by setting the wordpress_logged_in cookie. NOTE: this is due to an incomplete fix for a similar issue that was fixed in 1.3.2.
|
[] | null | null | null | null | null |
|
CVE-2014-0669
|
The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.
|
[
"cpe:2.3:a:cisco:asr_5000_series_software:-:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2017:2797
|
Red Hat Security Advisory: kernel security update
|
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.8 | null | null |
CVE-2025-22841
|
Arkcompiler Ets Runtime has an out-of-bounds read vulnerability
|
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
|
[] | null | 3.3 | null | null | null |
GHSA-3m2w-jxjv-4wfv
|
Command Injection vulnerability discovered in 4ipnet EAP-767 device v3.42.00 within the web interface of the device allows attackers with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges.
|
[] | null | 8.8 | null | null | null |
|
GHSA-h9cj-5pxp-v3gc
|
A remote code execution vulnerability in libavc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34097672.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2009:1484
|
Red Hat Security Advisory: postgresql security update
|
postgresql: potential DoS due to conversion functions postgresql: SQL privilege escalation, incomplete fix for CVE-2007-6600
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-2xfx-cg6v-cwqv
|
A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.
|
[] | null | 6.7 | null | null | null |
|
GHSA-fg8c-5jfr-hgj7
|
In loadMediaDataInBgForResumption of MediaDataManager.kt, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5 | null | null | null |
|
CVE-2025-27721
|
INFINITT Healthcare INFINITT PACS Exposure of Sensitive System Information to an Unauthorized Control Sphere
|
Unauthorized users can access INFINITT PACS System Manager without proper authorization,
which could lead to unauthorized access to system resources.
|
[] | 8.7 | 7.5 | null | null | null |
GHSA-g3j5-jrc2-9mhp
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin <= 7.1 versions.
|
[] | null | 5.9 | null | null | null |
|
CVE-2016-4945
|
Cross-site scripting (XSS) vulnerability in vpn/js/gateway_login_form_view.js in Citrix NetScaler Gateway 11.0 before Build 66.11 allows remote attackers to inject arbitrary web script or HTML via the NSC_TMAC cookie.
|
[
"cpe:2.3:h:citrix:netscaler_gateway_11.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_11.0_firmware:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2014-3453
|
Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import. NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page.
|
[
"cpe:2.3:a:flag_module_project:flag:*:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:-:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha1:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha2:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha3:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha4:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:beta1:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:rc1:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.3:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.4:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.x:dev:*:*:*:drupal:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2025-25064
|
SQL injection vulnerability in the ZimbraSync Service SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4 due to insufficient sanitization of a user-supplied parameter. Authenticated attackers can exploit this vulnerability by manipulating a specific parameter in the request, allowing them to inject arbitrary SQL queries that could retrieve email metadata.
|
[] | null | 8.8 | null | null | null |
|
CVE-2002-2032
|
sql_layer.php in PHP-Nuke 5.4 and earlier does not restrict access to debugging features, which allows remote attackers to gain SQL query information by setting the sql_debug parameter to (1) index.php and (2) modules.php.
|
[
"cpe:2.3:a:francisco_burzi:php-nuke:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:4.4.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-6510
|
Multiple cross-site scripting (XSS) vulnerabilities in NetArt Media Car Portal 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) PWRS or (2) Description field when posting a new vehicle; (3) news title when creating news; (4) Name when creating a sub user; (5) group name when creating a group; or (6) dealer name, (7) first name, or (8) last name when changing a profile.
|
[
"cpe:2.3:a:netartmedia:car_portal:3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-8570
|
itsourcecode Tailoring Management System inccatadd.php sql injection
|
A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /inccatadd.php. The manipulation of the argument title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:itsourcecode:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2012-6357
|
IBM Maximo Asset Management 7.5, Maximo Asset Management Essentials 7.5, and SmartCloud Control Desk 7.5 allow remote authenticated users to gain privileges and bypass intended restrictions on asset-lookup operations via unspecified vectors.
|
[
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2017-16105
|
serverwzl is a simple http server. serverwzl is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
|
[
"cpe:2.3:a:serverwzl_project:serverwzl:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-8phh-ch6h-hm63
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Felipe Peixoto Powerful Auto Chat allows Stored XSS. This issue affects Powerful Auto Chat: from n/a through 1.9.8.
|
[] | null | 6.5 | null | null | null |
|
GHSA-rrqx-xr4w-7wpj
|
An issue in the relPath parameter of WebFileSys version 2.31.0 allows attackers to perform directory traversal via a crafted HTTP request. By injecting traversal payloads into the parameter, attackers can manipulate file paths and gain unauthorized access to sensitive files, potentially exposing data outside the intended directory.
|
[] | null | 7.3 | null | null | null |
|
CVE-2024-22261
|
SQL Injection in Harbor scan log API
|
SQL-Injection in Harbor allows priviledge users to leak the task IDs
|
[] | null | 2.7 | null | null | null |
GHSA-63gp-3rq7-g7h2
|
Windows iSCSI Target Service Information Disclosure Vulnerability.
|
[] | null | 6.5 | null | null | null |
|
CVE-2017-8541
|
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8540.
|
[
"cpe:2.3:a:microsoft:forefront_security:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:malware_protection_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-h4fj-8h2w-pj8r
|
Apple iOS before 9 allows attackers to obtain sensitive information about inter-app communication via a crafted app that conducts an interception attack involving an unspecified URL scheme.
|
[] | null | null | null | null | null |
|
CVE-2020-36628
|
Calsign APDE ZIP File CopyBuildTask.java handleExtract path traversal
|
A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747.
|
[
"cpe:2.3:a:android_processing_development_environment_project:android_processing_development_environment:*:*:*:*:*:android:*:*",
"cpe:2.3:a:android_processing_development_environment_project:android_processing_development_environment:0.5.2:pre1_alpha:*:*:*:android:*:*"
] | null | 5.5 | 5.5 | null | null |
CVE-2024-2311
|
The Avada theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 7.11.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2024-28944
|
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
|
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
CVE-2020-5140
|
A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service by sending a malicious HTTP request that leads to memory addresses leak. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
|
[
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicos:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicosv:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-12585
|
PropertyHive < 2.1.1 - Reflected XSS
|
The Property Hive WordPress plugin before 2.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
[] | null | 6.1 | null | null | null |
RHSA-2021:1030
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4.3 | null | null | null |
CVE-2023-24097
|
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formPasswordAuth. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[
"cpe:2.3:o:trendnet:tew-820ap_firmware:1.01.b01:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-820ap:1.0r:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2025-25069
|
Apache Kvrocks: Cross-Protocol Scripting Vulnerability
|
A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks.
Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests,
a valid HTTP request can also be sent to Kvrocks as a valid RESP request
and trigger some database operations, which can be dangerous when
it is chained with SSRF.
It is similiar to CVE-2016-10517 in Redis.
This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0.
Users are recommended to upgrade to version 2.11.1, which fixes the issue.
|
[] | null | 6.5 | null | null | null |
CVE-2024-3794
|
Cross-site Scripting vulnerability in WBSAirback
|
Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XSS) through /admin/AdvancedSystem, description field, all parameters. Exploitation of this vulnerability could allow a remote user to send a specially crafted URL to the victim and steal their session data.
|
[] | null | 4.8 | null | null | null |
CVE-2024-29851
|
Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account.
|
[
"cpe:2.3:a:veeam:backup_enterprise_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.