id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-j86j-7j5h-86x2
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2019-4619
|
IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace. IBM X-Force ID: 168862.
|
[
"cpe:2.3:a:ibm:mq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:*:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
] | null | null | 5.1 | null | null |
|
CVE-2021-0342
|
In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
CVE-2023-25715
|
WordPress GamiPress Plugin <= 2.5.6 is vulnerable to Broken Access Control
|
Missing Authorization vulnerability in GamiPress GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress.This issue affects GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress: from n/a through 2.5.6.
|
[
"cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-gq7v-xxv7-97xr
|
A vulnerability classified as problematic has been found in SourceCodester Insurance Management System 1.0. This affects an unknown part of the file /Script/admin/core/update_sub_category. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272349 was assigned to this vulnerability.
|
[] | 5.3 | 3.5 | null | null | null |
|
GHSA-6v7j-89fv-g4f7
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files. Crafted data in a EMF can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18790.
|
[] | null | null | 7.8 | null | null |
|
GHSA-4w4w-jrgw-jr5h
|
The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2022:6460
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) kernel: KVM: x86/mmu: make apf token non-zero to fix bug kernel: x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave)
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.5 | null | null | null |
CVE-2024-52469
|
WordPress WooCommerce Price Alert plugin <= 1.0.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dhrubok Infotech WooCommerce Price Alert allows Reflected XSS.This issue affects WooCommerce Price Alert: from n/a through 1.0.4.
|
[] | null | 7.1 | null | null | null |
GHSA-wmcc-9vch-jmx4
|
Apache Cassandra: User with MODIFY permission on ALL KEYSPACES can escalate privileges to superuser via unsafe actions
|
Privilege Defined With Unsafe Actions vulnerability in Apache Cassandra. An user with MODIFY permission ON ALL KEYSPACES can escalate privileges to superuser within a targeted Cassandra cluster via unsafe actions to a system resource. Operators granting data MODIFY permission on all keyspaces on affected versions should review data access rules for potential breaches.This issue affects Apache Cassandra through 3.0.30, 3.11.17, 4.0.15, 4.1.7, 5.0.2.Users are recommended to upgrade to versions 3.0.31, 3.11.18, 4.0.16, 4.1.8, 5.0.3, which fixes the issue.
|
[] | null | 8.8 | null | null | null |
CVE-2013-3801
|
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-vc4x-q9p4-gcmm
|
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 7.8 | null | null |
|
GHSA-whhc-qmvw-65jq
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Master slider Master Slider Pro allows SQL Injection.This issue affects Master Slider Pro: from n/a through 3.6.5.
|
[] | null | 7.6 | null | null | null |
|
CVE-2014-6751
|
The Grasshopper Beta (aka com.grasshopper.dialer) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:grasshopper:grasshopper_beta:2.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-6522-m749-xgvf
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, a vulnerability exists where an array out of bounds access can occur during a CA call.
|
[] | null | null | 9.8 | null | null |
|
RHSA-2013:1090
|
Red Hat Security Advisory: ruby security update
|
ruby: hostname check bypassing vulnerability in SSL client
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2025-23616
|
WordPress Canalplan plugin <= 5.31 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Canalplan allows Reflected XSS. This issue affects Canalplan: from n/a through 5.31.
|
[] | null | 7.1 | null | null | null |
GHSA-j2r9-4mmp-765h
|
Cross-Site Request Forgery (CSRF) vulnerability in Mahdi Khaksar mybb Last Topics allows Stored XSS.This issue affects mybb Last Topics: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
|
GHSA-cg43-2wf7-3645
|
An external control of file name or path vulnerability in the delete file function of Soar Cloud HRD Human Resource Management System through version 7.3.2025.0408 allows remote attackers to delete partial files by specifying arbitrary file paths.
|
[] | 8.8 | null | null | null | null |
|
CVE-2009-3014
|
Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location HTTP response header or (2) specifying the content of a Location HTTP response header.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:a1_pre:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.7:a1_pre:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-v8rv-4qvw-rgmx
|
Buffer overflow in a certain ActiveX control in the EDraw Office Viewer Component (edrawofficeviewer.ocx) 4.0.5.20, and other versions before 5.0, allows remote attackers to cause a denial of service (Internet Explorer 7 crash) or execute arbitrary code via a long first argument to the HttpDownloadFile method.
|
[] | null | null | null | null | null |
|
CVE-2022-29038
|
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the name and description of Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
|
[
"cpe:2.3:a:jenkins:extended_choice_parameter:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-3r39-xhjj-cwp2
|
dbeaver is vulnerable to Improper Restriction of XML External Entity Reference
|
[] | null | null | null | null | null |
|
CVE-2012-2206
|
The Web Gateway component in IBM WebSphere MQ File Transfer Edition 7.0.4 and earlier allows remote authenticated users to read files of arbitrary users via vectors involving a username in a URI, as demonstrated by a modified metadata=fteSamplesUser field to the /transfer URI.
|
[
"cpe:2.3:a:ibm:websphere_mq:7.0:*:file_transfer:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.0.0.1:*:file_transfer:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.0.1.0:*:file_transfer:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.0.2.0:*:file_transfer:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.0.2.2:*:file_transfer:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.0.4:*:file_transfer:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:7.0.4.0:*:file_transfer:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-fgm5-jgr7-5rfv
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1.
|
[] | null | 5.9 | null | null | null |
|
GHSA-jxvj-5w26-hpx9
|
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
|
[] | null | 7.2 | null | null | null |
|
GHSA-6959-w52r-48h6
|
PHP remote file inclusion vulnerability in AES/modules/auth/phpsecurityadmin/include/logout.php in AlberT-EasySite (AES) 1.0a5 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PSA_PATH parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-35223
|
EasyUse MailHunter Ultimate - Deserialization of Untrusted Data
|
EasyUse MailHunter Ultimate’s cookie deserialization function has an inadequate validation vulnerability. Deserializing a cookie containing malicious payload will trigger this insecure deserialization vulnerability, allowing an unauthenticated remote attacker to execute arbitrary code, manipulate system command or interrupt service.
|
[
"cpe:2.3:a:easyuse:mailhunter_ultimate:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
ICSA-22-242-10
|
PTC Kepware KEPServerEX (Update A)
|
Specifically crafted OPC UA messages transmitted to the server could allow an attacker to crash the server and leak data. CVE-2022-2848 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H). Specifically crafted OPC UA messages transmitted to the server could allow an attacker to crash the server and remotely execute code. CVE-2022-2825 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
CVE-2017-9198
|
libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in input-tga.c:508:18.
|
[
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2019-12426
|
an unauthenticated user could get access to information of some backend screens by invoking setSessionLocale in Apache OFBiz 16.11.01 to 16.11.06
|
[
"cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2024-1710
|
The Addon Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the onAjaxAction function action in all versions up to, and including, 1.3.76. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform several unauthorized actions including uploading arbitrary files.
|
[
"cpe:2.3:a:unitecms:addon_library:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-3r8x-5vg6-c44w
|
Command Injection vulnerability in the web interface in McAfee Advanced Threat Defense (ATD) 3.10, 3.8, 3.6, 3.4 allows remote authenticated users to execute a command of their choice via a crafted HTTP request parameter.
|
[] | null | null | 8.8 | null | null |
|
CVE-2025-21535
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-9fcr-9vq3-v9fx
|
An issue was discovered on D-Link DIR-809 A1 through 1.09, A2 through 1.11, and Guest Zone through 1.09 devices. One can bypass authentication mechanisms to download the configuration file.
|
[] | null | null | 7.5 | null | null |
|
GHSA-8r2w-vfrm-hwhc
|
Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite before 7.2.2-rev31, 7.4.0 before 7.4.0-rev27, and 7.4.1 before 7.4.1-rev17 allows remote attackers to inject arbitrary web script or HTML via the header in an attached SVG file.
|
[] | null | null | null | null | null |
|
CVE-2022-2191
|
In Eclipse Jetty versions 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, SslConnection does not release ByteBuffers from configured ByteBufferPool in case of error code paths.
|
[
"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2025-4198
|
Alink Tap <= 1.3.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting
|
The Alink Tap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.1. This is due to missing or incorrect nonce validation on the 'alink-tap' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2022-29330
|
Missing access control in the backup system of Telesoft VitalPBX before 3.2.1 allows attackers to access the PJSIP and SIP extension credentials, cryptographic keys and voicemails files via unspecified vectors.
|
[
"cpe:2.3:a:vitalpbx:vitalpbx:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
GHSA-2hmg-j5gm-vm6q
|
CoreTelephony in Apple iOS before 8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and device restart) via a Class 0 SMS message.
|
[] | null | null | null | null | null |
|
CVE-2023-41236
|
WordPress Happy Elementor Addons Pro Plugin <= 2.8.0 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Happy addons Happy Elementor Addons Pro plugin <= 2.8.0 versions.
|
[
"cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:pro:wordpress:*:*"
] | null | 7.1 | null | null | null |
CVE-2015-0683
|
Cisco Unified Communications Domain Manager 8.1(4) allows remote authenticated users to obtain sensitive information via a file-inclusion attack, aka Bug ID CSCup94744.
|
[
"cpe:2.3:a:cisco:unified_communications_domain_manager:8.1\\(.4\\):*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2007-3548
|
Stack-based buffer overflow in W3Filer 2.1.3 allows remote FTP servers to cause a denial of service (application hang or crash) and possibly execute arbitrary code by sending a large banner to a client that is sending a file.
|
[
"cpe:2.3:a:w3filer:w3filer:2.1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
ICSA-17-353-03
|
Ecava IntegraXor
|
The SQL Injection vulnerability has been identified, which attacker can leverage to disclose sensitive information from the database.CVE-2017-16733 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The SQL Injection vulnerability has been identified, which generates an error in the database log.CVE-2017-16735 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | null | 5.3 | null | null |
CVE-2023-48906
|
Stack Overflow vulnerability in Btstack 1.6 and earlier allows attackers to cause a denial of service via crafted input to the char_for_nibble function.
|
[] | null | 4.3 | null | null | null |
|
GHSA-857w-w5qw-hx3x
|
The CRC32C feature in the Btrfs implementation in the Linux kernel before 3.8-rc1 allows local users to cause a denial of service (prevention of file creation) by leveraging the ability to write to a directory important to the victim, and creating a file with a crafted name that is associated with a specific CRC32C hash value.
|
[] | null | null | null | null | null |
|
GHSA-54x4-w275-fh47
|
The RMI interface in Cisco Secure Access Control System (ACS) does not properly enforce authorization requirements, which allows remote authenticated users to read arbitrary files via a request to this interface, aka Bug ID CSCud75169.
|
[] | null | null | null | null | null |
|
CVE-2016-1349
|
The Smart Install client implementation in Cisco IOS 12.2, 15.0, and 15.2 and IOS XE 3.2 through 3.7 allows remote attackers to cause a denial of service (device reload) via crafted image list parameters in a Smart Install packet, aka Bug ID CSCuv45410.
|
[
"cpe:2.3:o:cisco:ios_xe:3.2ja_3.2.0ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2se_3.2.0se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2se_3.2.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2se_3.2.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2se_3.2.3se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3se_3.3.0se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3se_3.3.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3se_3.3.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3se_3.3.3se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3se_3.3.4se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3se_3.3.5se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.0xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.1xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.2xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg_3.4.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg_3.4.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg_3.4.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg_3.4.3sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg_3.4.4sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg_3.4.5sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4sg_3.4.6sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e_3.5.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e_3.5.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e_3.5.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e_3.5.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6e_3.6.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6e_3.6.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6e_3.6.2ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6e_3.6.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7e_3.7.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7e_3.7.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7e_3.7.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*"
] | null | null | 7.5 | 7.8 | null |
|
GHSA-fxh5-52gm-fgc8
|
Insertion of Sensitive Information into Log File vulnerability in Frédéric GILLES FG Joomla to WordPress.This issue affects FG Joomla to WordPress: from n/a through 4.20.2.
|
[] | null | 5.3 | null | null | null |
|
GHSA-wjjq-gj36-2h2c
|
An issue in the exp_ref component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-30158
|
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-cx8w-r23v-jmjv
|
Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-21215
|
Inappropriate implementation in Autofill in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to spoof security UI via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2015-7570
|
Multiple server-side request forgery (SSRF) vulnerabilities in Yeager CMS 1.2.1 allow remote attackers to trigger outbound requests and enumerate open ports via the dbhost parameter to libs/org/adodb_lite/tests/test_adodb_lite.php, libs/org/adodb_lite/tests/test_datadictionary.php, or libs/org/adodb_lite/tests/test_adodb_lite_sessions.php.
|
[
"cpe:2.3:a:yeager:yeager_cms:1.2.1:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.4 | null |
|
CVE-2007-3464
|
Check Point SofaWare Safe@Office, with firmware before Embedded NGX 7.0.45 GA, does not require entry of the old password when changing the admin password, which might allow attackers to gain privileges by conducting a CSRF attack, making a password change on an unattended workstation, or other vectors.
|
[
"cpe:2.3:h:sofaware:safe_at_office_500_utm:*:*:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
GHSA-rrrf-759h-mc79
|
** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not limit the number of MySQL queries sent to external MySQL database servers, which allows remote attackers to use WordPress as a proxy for brute-force attacks or denial of service attacks via the dbhost parameter, a different vulnerability than CVE-2011-4898. NOTE: the vendor disputes the significance of this issue because an incomplete WordPress installation might be present on the network for only a short time.
|
[] | null | null | null | null | null |
|
CVE-2017-12900
|
Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().
|
[
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2020-17511
|
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.
|
[
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2023-42089
|
Foxit PDF Reader templates Use-After-Free Information Disclosure Vulnerability
|
Foxit PDF Reader templates Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of templates. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21586.
|
[
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:2023.1.0.15510:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor_for_mac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
GHSA-q92j-8jhc-9pm7
|
university compass v2.2.0 and below was discovered to contain a code injection vulnerability in the component org.compass.core.executor.DefaultExecutorManager.configure. This vulnerability is exploited via passing an unchecked argument.
|
[] | null | 9.8 | null | null | null |
|
CVE-2018-6447
|
A Reflective XSS Vulnerability in HTTP Management Interface in Brocade Fabric OS versions before Brocade Fabric OS v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g could allow authenticated attackers with access to the web interface to hijack a user’s session and take over the account.
|
[
"cpe:2.3:o:broadcom:fabric_operating_system:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:5.0.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:5.2.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.2c:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.2d:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.2f:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2d:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.0.2f:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.0c:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2c:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2d:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2f:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.1.2j:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a1:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:8.2.3:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
RHSA-2020:4295
|
Red Hat Security Advisory: rh-postgresql96-postgresql security update
|
postgresql: Selectivity estimators bypass row security policies postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in CREATE EXTENSION
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.1 | 7.5 | null | null |
CVE-2006-0051
|
Buffer overflow in playlistimport.cpp in Kaffeine Player 0.4.2 through 0.7.1 allows user-assisted attackers to execute arbitrary code via long HTTP request headers when Kaffeine is "fetching remote playlists", which triggers the overflow in the http_peek function.
|
[
"cpe:2.3:a:kaffeine:kaffeine_player:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kaffeine:kaffeine_player:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kaffeine:kaffeine_player:0.4.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:kaffeine:kaffeine_player:0.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:kaffeine:kaffeine_player:0.7.1:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
CVE-2019-5059
|
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
|
[
"cpe:2.3:a:libsdl:sdl2_image:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-7pjw-w4q3-2m73
|
An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. An attacker can trigger read operations on an arbitrary file via Path Traversal in the TZ parameter, but cannot retrieve the data that is read. This causes a denial of service if the filename is, for example, /dev/random.
|
[] | null | null | 7.5 | null | null |
|
GHSA-h443-49fc-9w7v
|
The File Manager (gollem) module 3.0.11 in Horde Groupware 5.2.21 allows remote attackers to bypass Horde authentication for file downloads via a crafted fn parameter that corresponds to the exact filename.
|
[] | null | null | 7.5 | null | null |
|
RHSA-2023:0110
|
Red Hat Security Advisory: sqlite security update
|
sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null | null |
CVE-2025-44844
|
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the setUpgradeFW function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-36891
|
WordPress Photo Gallery by Supsystic plugin <= 1.15.5 - Cross-Site Request Forgery (CSRF) leading to Plugin Settings Change
|
Cross-Site Request Forgery (CSRF) vulnerability in Photo Gallery by Supsystic plugin <= 1.15.5 at WordPress allows changing the plugin settings.
|
[
"cpe:2.3:a:supsystic:photo_gallery:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2019-7345
|
Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the view 'options' (options.php) does no input validation for the WEB_TITLE, HOME_URL, HOME_CONTENT, or WEB_CONSOLE_BANNER value, allowing an attacker to execute HTML or JavaScript code. This relates to functions.php.
|
[
"cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-r3jh-qhgj-gvr8
|
Denial of service in neutron
|
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
|
[] | null | 6.5 | null | null | null |
CVE-2023-42728
|
In phasecheckserver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
|
[
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-hm7q-6fv8-j3p6
|
The Janrain Engage (formerly RPX) module for Drupal 6.x-1.x. 6.x-2.x before 6.x-2.2, and 7.x-2.x before 7.x-2.2 stores user profile data from Engage in session tables, which might allow remote attackers to obtain sensitive information by leveraging a separate vulnerability.
|
[] | null | null | null | null | null |
|
GHSA-w3p6-2cc8-h63h
|
SpamAssassin 3.1.x, 3.2.0, and 3.2.1 before 20070611, when running as root in unusual configurations using vpopmail or virtual users, allows local users to cause a denial of service (corrupt arbitrary files) via a symlink attack on a file that is used by spamd.
|
[] | null | null | null | null | null |
|
GHSA-r7cj-2ghq-wj88
|
jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.
|
[] | null | null | null | null | null |
|
cisco-sa-fmc-xpathinj-COrThdMb
|
Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device.
To exploit this vulnerability, the attacker must have valid administrative credentials.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the August 2025 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2025 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75415"].
|
[] | null | 4.9 | null | null | null |
CVE-2023-23306
|
The `Toybox.Ant.BurstPayload.add` API method in CIQ API version 2.2.0 through 4.1.7 suffers from a type confusion vulnreability, which can result in an out-of-bounds write operation. A malicious application could create a specially crafted `Toybox.Ant.BurstPayload` object, call its `add` method, override arbitrary memory and hijack the execution of the device's firmware.
|
[
"cpe:2.3:a:garmin:connect-iq:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2025:4263
|
Red Hat Security Advisory: php:8.1 security update
|
php: Leak partial content of the heap through heap buffer over-read in mysqlnd php: Single byte overread with convert.quoted-printable-decode filter php: Configuring a proxy in a stream context might allow for CRLF injection in URIs php: Header parser of http stream wrapper does not handle folded headers php: libxml streams use wrong content-type header when requesting a redirected resource php: Streams HTTP wrapper does not fail for headers with invalid name and no colon php: Stream HTTP wrapper header check might omit basic auth header php: Stream HTTP wrapper truncates redirect location to 1024 bytes
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null | null |
GHSA-42vq-2prv-qxmf
|
Control characters prepended before "javascript:" URLs pasted in the addressbar can cause the leading characters to be ignored and the pasted JavaScript to be executed instead of being blocked. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks where users are convinced to copy and paste text into the addressbar. This vulnerability affects Firefox < 57.
|
[] | null | null | 6.1 | null | null |
|
CVE-2017-2971
|
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the JPEG decoder routine. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2019-0929
|
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.
|
[
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
RHSA-2022:8860
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (protobuf) security update
|
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null | null |
CVE-2024-4611
|
AppPresser <= 4.3.2 - Improper Missing Encryption Exception Handling to Authentication Bypass
|
The AppPresser plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'decrypt_value' and on the 'doCookieAuth' functions in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they previously used the login via the plugin API. This can only be exploited if the 'openssl' php extension is not loaded on the server.
|
[
"cpe:2.3:a:apppresser:apppresser:-:*:*:*:*:wordpress:*:*"
] | null | 8.1 | null | null | null |
CVE-2022-24424
|
Dell EMC AppSync versions from 3.9 to 4.3 contain a path traversal vulnerability in AppSync server. A remote unauthenticated attacker may potentially exploit this vulnerability to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application.
|
[
"cpe:2.3:a:dell:emc_appsync:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-mw8g-rgqf-rw5h
|
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
|
[] | null | null | 9.8 | null | null |
|
CVE-2020-18723
|
Stored cross-site scripting (XSS) in file attachment field in MDaemon webmail 19.5.5 allows an attacker to execute code on the email recipient side while forwarding an email to perform potentially malicious activities.
|
[
"cpe:2.3:a:altn:mdaemon_webmail:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2016-3708
|
Red Hat OpenShift Enterprise 3.2, when multi-tenant SDN is enabled and a build is run in a namespace that would normally be isolated from pods in other namespaces, allows remote authenticated users to access network resources on restricted pods via an s2i build with a builder image that (1) contains ONBUILD commands or (2) does not contain a tar binary.
|
[
"cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*"
] | null | null | 7.1 | 5.5 | null |
|
GHSA-3h4f-jgvh-wjvm
|
src/condor_schedd.V6/schedd.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the permissions of jobs, which allows remote authenticated users to remove arbitrary idle jobs via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-jv6v-fvvx-4932
|
Arbitrary File Deletion vulnerability in OctoberCMS
|
ImpactAn attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.PatchesIssue has been patched in Build 466 (v1.0.466).WorkaroundsApply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.ReferencesReported by [Sivanesh Ashok](https://stazot.com/)For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])Threat assessment:
|
[] | null | 6.2 | null | null | null |
GHSA-qj4w-3r9c-c7wp
|
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a race condition in the rmnet USB control driver can potentially lead to a Use After Free condition.
|
[] | null | null | 7.8 | null | null |
|
GHSA-c25x-q5gv-wwm3
|
In JetBrains IntelliJ IDEA before 2022.3 the built-in web server leaked information about open projects.
|
[] | null | 3.3 | null | null | null |
|
GHSA-6hch-mpjp-2743
|
An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a `Cargo.toml` containing maliciously crafted input.
|
[] | null | 6.5 | null | null | null |
|
CVE-2015-5374
|
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Specially crafted packets sent to port 50000/UDP could cause a denial-of-service of the affected device. A manual reboot may be required to recover the service of the device.
|
[
"cpe:2.3:o:siemens:siprotec_firmware:4.24:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siprotec_4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siprotec_compact:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-wqhx-32c6-gg95
|
A denial of service vulnerability in the Android media framework (libmediaplayerservice). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-38391487.
|
[] | null | null | 5.5 | null | null |
|
CVE-2015-1319
|
The Unity Settings Daemon before 14.04.0+14.04.20150825-0ubuntu2 and 15.04.x before 15.04.1+15.04.20150408-0ubuntu1.2 does not properly detect if the screen is locked, which allows physically proximate attackers to mount removable media while the screen is locked as demonstrated by inserting a USB thumb drive.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2008-1622
|
Multiple PHP remote file inclusion vulnerabilities in GeeCarts allow remote attackers to execute arbitrary PHP code via a URL in the id parameter to (1) show.php, (2) search.php, and (3) view.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:geertsen_holdings_inc:geecarts:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2016-1413
|
The web interface in Cisco Firepower Management Center 5.4.0 through 6.0.0.1 allows remote authenticated users to modify pages by placing crafted code in a parameter value, aka Bug ID CSCuy76517.
|
[
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:5.4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-8jw9-px85-866f
|
In sdp_server_handle_client_req of sdp_server.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure from the bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.0 Android-8.1 Android-9Android ID: A-169342531
|
[] | null | null | null | null | null |
|
CVE-2009-1528
|
Microsoft Internet Explorer 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 does not properly synchronize AJAX requests, which allows allows remote attackers to execute arbitrary code via a large number of concurrent, asynchronous XMLHttpRequest calls, aka "HTML Object Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:32_bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:gold:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2018-18556
|
A privilege escalation issue was discovered in VyOS 1.1.8. The default configuration also allows operator users to execute the pppd binary with elevated (sudo) permissions. Certain input parameters are not properly validated. A malicious operator user can run the binary with elevated permissions and leverage its improper input validation condition to spawn an attacker-controlled shell with root privileges.
|
[
"cpe:2.3:o:vyos:vyos:1.1.8:*:*:*:*:*:*:*"
] | null | 9.9 | null | 9 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.