id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2023-28695 | WordPress VigilanTor Plugin <= 1.3.10 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Drew Phillips VigilanTor plugin <= 1.3.10 versions. | [
"cpe:2.3:a:vigilantor_project:vigilantor:*:*:*:*:*:wordpress:*:*"
] |
GHSA-mh66-jhcg-vhgm | Unspecified vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to bypass the pop-up blocker via unknown vectors. | [] |
|
GHSA-p44r-rrvj-56v9 | VideoLAN VLC Media Player 2.0.8 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a URL in a m3u file. | [] |
|
GHSA-h438-86cm-g2q6 | The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.8.23 via the esc_dir function. This makes it possible for authenticated attackers to cut and paste (copy) the contents of arbitrary files on the server, which can contain sensitive information, and to cut (delete) arbitrary directories, including the root WordPress directory. By default this can be exploited by administrators only. In the premium version of the plugin, administrators can give gallery edit permissions to lower level users, which might make this exploitable by users as low as contributors. | [] |
|
CVE-2024-38123 | Windows Bluetooth Driver Information Disclosure Vulnerability | Windows Bluetooth Driver Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*"
] |
CVE-2025-28146 | Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a command injection vulnerability via fota_url in /boafrm/formLtefotaUpgradeQuectel | [] |
|
GHSA-5hj6-f5r9-5v2p | If a local user has been configured and logged in, an unauthenticated attacker with physical access may be able to extract sensitive information onto a local drive. | [] |
|
CVE-2013-4057 | Cross-site request forgery (CSRF) vulnerability in the XML Pack in IBM InfoSphere Information Server 8.5.x through 8.5 FP3, 8.7.x through 8.7 FP2, and 9.1.x through 9.1.2.0 allows remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2018-0699 | Cross-site scripting vulnerability in YukiWiki 2.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:hyuki:yukiwiki:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-37282 | An out-of-bounds write vulnerability exists in the VZT LZMA_Read dmem extraction functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] |
|
GHSA-564c-h2vx-x449 | The Easy Mega Menu Plugin for WordPress – ThemeHunk plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions hooked via AJAX in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform actions like updating plugin settings. | [] |
|
GHSA-9hpc-rhq4-hv5w | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LA-Studio LA-Studio Element Kit for Elementor allows Stored XSS.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.3.9.2. | [] |
|
GHSA-q7gc-j674-5xp7 | A potential security vulnerability has been reported in the system BIOS of certain HP PC products, which might allow memory tampering. HP is releasing mitigation for the potential vulnerability. | [] |
|
GHSA-6j67-4cmx-rgw8 | Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno group manager allows PHP Local File Inclusion.This issue affects Opigno group manager: from 0.0.0 before 3.1.1. | [] |
|
CVE-2019-11444 | An issue was discovered in Liferay Portal CE 7.1.2 GA3. An attacker can use Liferay's Groovy script console to execute OS commands. Commands can be executed via a [command].execute() call, as demonstrated by "def cmd =" in the ServerAdminPortlet_script value to group/control_panel/manage. Valid credentials for an application administrator user account are required. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to run groovy scripts and therefore not a design flaw | [
"cpe:2.3:a:liferay:liferay_portal:7.1.2:ga3:*:*:*:*:*:*"
] |
|
GHSA-h26v-qgm2-w7j4 | A floating point exception (divide-by-zero) vulnerability was discovered in mupdf 1.23.4 in functon pnm_binary_read_image() of load-pnm.c line 527. | [] |
|
GHSA-27j4-63ww-f83g | Wolfram Research webMathematica allows remote attackers to obtain sensitive information via a direct request to the MSP script, which reveals the installation path in an error message. | [] |
|
CVE-2005-0086 | Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale. | [
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-xvjf-ppxc-mvvq | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-hxxh-jpvq-vr5x | Windows Telephony Service Remote Code Execution Vulnerability | [] |
|
CVE-2010-10003 | gesellix titlelink plugin_content_title.php sql injection | A vulnerability classified as critical was found in gesellix titlelink on Joomla. Affected by this vulnerability is an unknown functionality of the file plugin_content_title.php. The manipulation of the argument phrase leads to sql injection. The patch is named b4604e523853965fa981a4e79aef4b554a535db0. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217351. | [
"cpe:2.3:a:titlelink_project:titlelink:*:*:*:*:*:joomla\\!:*:*"
] |
GHSA-6r52-jcm4-48gv | IBM Cognos Analytics 11.2.0 through 11.2.4 and 12.0.0 through 12.0.2 is vulnerable to injection attacks in application logging by not sanitizing user provided data. This could lead to further attacks against the system. IBM X-Force ID: 282956. | [] |
|
GHSA-qj3q-j2r8-6xc6 | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
GHSA-pxqg-3p4m-pvq9 | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeUrlFilter. | [] |
|
CVE-2022-22003 | Microsoft Office Graphics Remote Code Execution Vulnerability | Microsoft Office Graphics Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2013_rt:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:x64:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:x86:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*"
] |
CVE-2015-5052 | SQL injection vulnerability in Sefrengo before 1.6.5 beta2. | [
"cpe:2.3:a:sefrengo:sefrengo:*:beta:*:*:*:*:*:*"
] |
|
GHSA-3gv4-m5g2-h4xj | A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2020-35924 | An issue was discovered in the try-mutex crate before 0.3.0 for Rust. TryMutex<T> allows cross-thread sending of a non-Send type. | [
"cpe:2.3:a:try-mutex_project:try-mutex:*:*:*:*:*:rust:*:*"
] |
|
GHSA-6q4h-qfmx-rq72 | The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure. | [] |
|
GHSA-f44r-g94r-2hx6 | Windows Kernel Elevation of Privilege Vulnerability | [] |
|
CVE-2019-5680 | In NVIDIA Jetson TX1 L4T R32 version branch prior to R32.2, Tegra bootloader contains a vulnerability in nvtboot in which the nvtboot-cpu image is loaded without the load address first being validated, which may lead to code execution, denial of service, or escalation of privileges. | [
"cpe:2.3:o:nvidia:jetson_tx1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*"
] |
|
GHSA-q2x2-4cf5-f275 | Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta | [] |
|
CVE-2022-29418 | WordPress Night Mode plugin <= 1.0.0 - Authenticated Persistent Cross-Site Scripting (XSS) vulnerability | Authenticated (admin user role) Persistent Cross-Site Scripting (XSS) in Mark Daniels Night Mode plugin <= 1.0.0 on WordPress via vulnerable parameters: &ntmode_page_setting[enable-me], &ntmode_page_setting[bg-color], &ntmode_page_setting[txt-color], &ntmode_page_setting[anc_color]. | [
"cpe:2.3:a:night_mode_project:night_mode:*:*:*:*:*:wordpress:*:*"
] |
GHSA-wmh5-53p6-5c7v | IBM Cognos Express 9.0 before IFIX 2, 9.5 before IFIX 2, 10.1 before IFIX 2, and 10.2.1 before FP1 allows local users to obtain sensitive cleartext information by leveraging knowledge of a static decryption key. | [] |
|
GHSA-x4m7-2vvr-rq2h | The Martial Arts Battle Card (aka com.tapenjoy.zjh.tw) application 1.0.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2012-6577 | SQL injection vulnerability in the Formhandler extension before 1.4.1 for TYPO3 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:typoheads:formhandler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:0.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typoheads:formhandler:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*"
] |
|
GHSA-wxr6-29pv-ch68 | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | [] |
GHSA-4984-4888-7xjr | Unspecified vulnerability in the Oracle Portal component in Oracle Fusion Middleware 11.1.1.6 allows remote attackers to affect integrity via unknown vectors related to Page Parameters and Events. | [] |
|
CVE-2021-36179 | A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution | [
"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*"
] |
|
GHSA-3qrc-v6jf-mqm6 | Kofax Power PDF PNG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PNG files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20397. | [] |
|
CVE-2024-5969 | AIomatic - Automatic AI Content Writer <= 2.0.5 - Unauthenticated Arbitrary Email Sending | The AIomatic - Automatic AI Content Writer for WordPress is vulnerable to arbitrary email sending vulnerability in versions up to, and including, 2.0.5. This is due to insufficient limitations on the email recipient and the content in the 'aiomatic_send_email' function which are reachable via AJAX. This makes it possible for unauthenticated attackers to send emails with any content to any recipient. | [
"cpe:2.3:a:coderevolution:aiomatic-automatic_ai_content_writer_\\&_editor:*:*:*:*:*:*:*:*"
] |
GHSA-3hvx-pxjp-5p5j | Buffer overflow in filecpnt.exe in FileCOPA 1.01 allows remote attackers to cause a denial of service (application crash) via a username with a large number of newline characters. | [] |
|
GHSA-c35c-j3vp-h457 | A vulnerability classified as problematic was found in DedeCMS 5.7. This vulnerability affects unknown code of the file /src/dede/sys_group_edit.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263314 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2008-1903 | PHP remote file inclusion vulnerability in news_show.php in Newanz NewsOffice 1.0 and 1.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the newsoffice_directory parameter. | [
"cpe:2.3:a:newanz:newsoffice:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:newanz:newsoffice:1.1:*:*:*:*:*:*:*"
] |
|
GHSA-w3c5-8x57-2gwg | Telesquare SDT-CS3B1 and SDT-CW3B1 devices through 1.2.0 have a default factory account. Remote attackers can obtain access to the device via TELNET using a hardcoded account. | [] |
|
GHSA-w82x-xjjr-cjr5 | Snipe-IT 6.0.2 vulnerable to Cross-site Scripting via arbitrary file upload in Update Branding Settings | An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file. | [] |
CVE-2018-15873 | A SQL Injection issue was discovered in Sentrifugo 3.2 via the deptid parameter. | [
"cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*"
] |
|
GHSA-wfch-pm8w-hchp | Cross-site scripting (XSS) vulnerability in the Ephox (formerly Moxiecode) plupload.flash.swf shim 2.1.2 in Plupload, as used in WordPress 3.9.x, 4.0.x, and 4.1.x before 4.1.2 and other products, allows remote attackers to execute same-origin JavaScript functions via the target parameter, as demonstrated by executing a certain click function, related to _init.as and _fireEvent.as. | [] |
|
CVE-2019-6798 | An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*"
] |
|
GHSA-4q25-jrjf-pqr4 | PHPGurukul Hospital Management System in PHP v4.0 has a Persistent Cross-Site Scripting vulnerability in \hms\admin\appointment-history.php. Remote registered users can exploit the vulnerability to obtain user cookie data. | [] |
|
GHSA-r3vh-cpmh-5vhc | Improper conditions check in voltage settings for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure via local access. | [] |
|
CVE-2019-12666 | Cisco IOS XE Software Path Traversal Vulnerability | A vulnerability in the Guest Shell of Cisco IOS XE Software could allow an authenticated, local attacker to perform directory traversal on the base Linux operating system of Cisco IOS XE Software. The vulnerability is due to incomplete validation of certain commands. An attacker could exploit this vulnerability by first accessing the Guest Shell and then entering specific commands. A successful exploit could allow the attacker to execute arbitrary code on the base Linux operating system. | [
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*"
] |
GHSA-g98v-vmx4-2gqc | Unspecified vulnerability in GoAhead WebServer before 2.1.4 allows remote attackers to cause "incorrect behavior" via unknown "malicious code," related to incorrect use of the socketInputBuffered function by sockGen.c. | [] |
|
CVE-2024-30554 | WordPress DD Rating plugin <= 1.7.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wouter Dijkstra DD Rating allows Stored XSS.This issue affects DD Rating: from n/a through 1.7.1.
| [] |
GHSA-mx8m-37wj-g2r4 | Unknown vulnerability in LDAP on Sun Solaris 8 and 9, when using Role Based Access Control (RBAC), allows local users to execute certain commands with additional privileges. | [] |
|
GHSA-fwv7-jrxj-q9qv | A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.17.3 < V1.18.0), Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.3.0 < V2.4.0), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.3.1 < V3.6.1), Mendix SAML (Mendix 9 compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.6.0), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0). The affected versions of the module insufficiently verifies the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.This CVE entry describes the incomplete fix for CVE-2023-25957 in a specific non default configuration. | [] |
|
CVE-2016-8784 | Huawei CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00 have a memory leak vulnerability. An unauthenticated attacker may send specific Label Distribution Protocol (LDP) packets to the devices. When the values of some parameters in the packet are abnormal, the LDP processing module does not release the memory to handle the packet, resulting in memory leak. | [
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*"
] |
|
GHSA-fjc9-59hf-f4qr | BEA Weblogic Server 8.1 through 8.1 SP4 does not properly validate client certificates when reusing cached connections, which allows remote attackers to obtain access via an untrusted X.509 certificate. | [] |
|
CVE-2022-32938 | A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. A shortcut may be able to check the existence of an arbitrary path on the file system. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-4q2r-xgxr-vvqm | Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet. | [] |
|
CVE-2023-2835 | The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search' parameter in versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:wpdirectorykit:wp_directory_kit:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-ghm5-2w98-w493 | TorrentFlux 2.4 allows remote authenticated users to obtain other users' cookies via the cid parameter in an editCookies action to profile.php. | [] |
|
CVE-2014-125055 | agnivade easy-scrypt scrypt.go VerifyPassphrase timing discrepancy | A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function VerifyPassphrase of the file scrypt.go. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596. | [
"cpe:2.3:a:easy-script_project:easy-script:*:*:*:*:*:*:*:*"
] |
CVE-2017-15775 | XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at CADImage+0x0000000000259aa4." | [
"cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-26688 | An issue in the handling of symlinks was addressed with improved validation. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. A malicious app with root privileges may be able to modify the contents of system files. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-39185 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2023:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack5:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack6:*:*:*:*:*:*"
] |
|
CVE-2021-44053 | Reflected XSS | A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running QTS, QuTS hero and QuTScloud. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of QTS, QuTS hero and QuTScloud: QTS 4.5.4.1991 build 20220329 and later QTS 5.0.0.1986 build 20220324 and later QuTS hero h5.0.0.1986 build 20220324 and later QuTS hero h4.5.4.1971 build 20220310 and later QuTScloud c5.0.1.1949 and later | [
"cpe:2.3:a:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200109:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200421:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200611:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200821:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20210327:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20211215:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*"
] |
CVE-2020-9753 | Whale Browser Installer before 1.2.0.5 versions don't support signature verification for Flash installer. | [
"cpe:2.3:a:naver:whale_browser_installer:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-30307 | Adobe Substance 3D Painter BMP File Parsing Out Of Bounds Write Vulnerability | Substance3D - Painter versions 9.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*"
] |
GHSA-x3h8-3mf2-v794 | libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances. | [] |
|
GHSA-c3qh-mgp7-qp4w | Stack-based buffer overflow in the PTZCamPanelCtrl ActiveX control (CamPanel.dll) in RTS Sentry 2.1.0.2 allows remote attackers to execute arbitrary code via a long second argument to the ConnectServer method. | [] |
|
CVE-2024-41959 | Cross-site Scripting (XSS) via API Logs in mailcow: dockerized | mailcow: dockerized is an open source groupware/email suite based on docker. An unauthenticated attacker can inject a JavaScript payload into the API logs. This payload is executed whenever the API logs page is viewed, potentially allowing an attacker to run malicious scripts in the context of the user's browser. This could lead to unauthorized actions, data theft, or further exploitation of the affected system. This issue has been addressed in the `2024-07` release. All users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:mailcow:mailcow\\:_dockerized:*:*:*:*:*:*:*:*"
] |
CVE-2018-3659 | A vulnerability in Intel PTT module in Intel CSME firmware before version 12.0.5 and Intel TXE firmware before version 4.0 may allow an unauthenticated user to potentially disclose information via physical access. | [
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-2wvw-h8hc-x343 | Memory access in virtual memory mapping for some microprocessors may allow an authenticated user to potentially enable information disclosure via local access. | [] |
|
CVE-2013-10025 | Exit Strategy Plugin exitpage.php exitpageadmin cross-site request forgery | A vulnerability was found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this issue is the function exitpageadmin of the file exitpage.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 1.59 is able to address this issue. The patch is identified as d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. VDB-225266 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:exit_strategy_project:exit_strategy:1.55:*:*:*:*:wordpress:*:*"
] |
GHSA-7mqj-h5x5-v4fc | Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id. | [] |
|
GHSA-4x5h-3h53-prh7 | Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning. | [] |
|
CVE-2025-46842 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
CVE-2023-31007 | Apache Pulsar: Broker does not always disconnect client when authentication data expires | Improper Authentication vulnerability in Apache Software Foundation Apache Pulsar Broker allows a client to stay connected to a broker after authentication data expires if the client connected through the Pulsar Proxy when the broker is configured with authenticateOriginalAuthData=false or if a client connects directly to a broker with a specially crafted connect command when the broker is configured with authenticateOriginalAuthData=false.
This issue affects Apache Pulsar: through 2.9.4, from 2.10.0 through 2.10.3, 2.11.0.
2.9 Pulsar Broker users should upgrade to at least 2.9.5.
2.10 Pulsar Broker users should upgrade to at least 2.10.4.
2.11 Pulsar Broker users should upgrade to at least 2.11.1.
3.0 Pulsar Broker users are unaffected.
Any users running the Pulsar Broker for 2.8.* and earlier should upgrade to one of the above patched versions.
| [
"cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:pulsar:2.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apache:pulsar:2.11.0:candidate_1:*:*:*:*:*:*",
"cpe:2.3:a:apache:pulsar:2.11.0:candidate_5:*:*:*:*:*:*"
] |
GHSA-xpj8-3q42-mc9j | A vulnerability was found in Tongda OA 2017. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/hr/recruit/requirements/delete.php. The manipulation of the argument REQUIREMENTS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240938 is the identifier assigned to this vulnerability. | [] |
|
GHSA-ggvm-22m2-mc5h | Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to register the client to a server in order to view sensitive information. | [] |
|
CVE-2024-5440 | If-So Dynamic Content Personalization < 1.8.0.3 - Contributor+ Shortcode Stored XSS | The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] |
CVE-2024-12945 | code-projects Simple Car Rental System account.php sql injection | A vulnerability classified as critical was found in code-projects Simple Car Rental System 1.0. This vulnerability affects unknown code of the file /account.php. The manipulation of the argument email/pass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2019-4219 | IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-Force ID: 159228. | [
"cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*"
] |
|
CVE-2025-23935 | WordPress Magic Google Maps plugin <= 1.0.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magic Plugin Factory Magic Google Maps allows Stored XSS.
This issue affects Magic Google Maps: from n/a through 1.0.4. | [] |
GHSA-fxx6-22cm-3977 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24475, CVE-2022-26894, CVE-2022-26895, CVE-2022-26900, CVE-2022-26908, CVE-2022-26909, CVE-2022-26912. | [] |
|
CVE-2013-1515 | Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Sun Middleware Products 3.0.1 and 3.1.2 allows remote attackers to affect integrity via vectors related to ADMIN Interface. | [
"cpe:2.3:a:oracle:sun_middleware_products:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sun_middleware_products:3.1.2:*:*:*:*:*:*:*"
] |
|
GHSA-xrgw-2g7f-5735 | Buffer overflow in mDNSResponder in Apple Mac OS X 10.4 up to 10.4.9 allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted UPnP Internet Gateway Device (IGD) packet. | [] |
|
CVE-2023-6867 | The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2013-3164 | Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*"
] |
|
CVE-2020-5274 | Exceptions displayed in non-debug configurations in Symfony | In Symfony before versions 5.0.5 and 4.4.5, some properties of the Exception were not properly escaped when the `ErrorHandler` rendered it stacktrace. In addition, the stacktrace were displayed even in a non-debug configuration. The ErrorHandler now escape alls properties of the exception, and the stacktrace is only display in debug configuration. This issue is patched in symfony/http-foundation versions 4.4.5 and 5.0.5 | [
"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*"
] |
CVE-2017-12177 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-2904 | Cross-site scripting (XSS) vulnerability in Sun Java System Messaging Server 6.0 through 6.3, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly a related issue to CVE-2006-5653. | [
"cpe:2.3:a:sun:java_system_messaging_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_messaging_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_messaging_server:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_messaging_server:6.3:*:*:*:*:*:*:*"
] |
|
CVE-2025-23804 | WordPress WP Service Payment Form With Authorize.net Plugin <= 2.6.0 - CSRF to Reflected Cross Site Scripting (XSS) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Shiv Prakash Tiwari WP Service Payment Form With Authorize.net allows Reflected XSS.This issue affects WP Service Payment Form With Authorize.net: from n/a through 2.6.0. | [] |
GHSA-73q3-c8rv-qv63 | Wysi Wiki Wyg 1.0 allows remote attackers to obtain system information via an invalid categup parameter to index.php, which calls the phpinfo function. | [] |
|
CVE-2014-0069 | The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-47147 | WordPress ipBlockList Plugin <= 1.0 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Kesz1 Technologies ipBlockList plugin <= 1.0 versions. | [
"cpe:2.3:a:kesz1:ipblocklist:*:*:*:*:*:wordpress:*:*"
] |
CVE-2012-3806 | Samsung Kies before 2.5.0.12094_27_11 contains a NULL pointer dereference vulnerability which could allow remote attackers to perform a denial of service. | [
"cpe:2.3:a:samsung:kies:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-22799 | A CWE-331: Insufficient Entropy vulnerability exists that could cause unintended connection from an internal network to an external network when an attacker manages to decrypt the SESU proxy password from the registry. Affected Product: Schneider Electric Software Update, V2.3.0 through V2.5.1 | [
"cpe:2.3:a:schneider-electric:software_update:*:*:*:*:*:*:*:*"
] |
|
GHSA-fqrh-w8r3-22q6 | lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each other transitive grants can cause locks to be acquired nested within one another, but in respectively opposite order. With suitable timing between the involved grant copy operations this may result in the locking up of a CPU. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.