id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2018-1000669
|
KOHA Library System version 16.11.x (up until 16.11.13) and 17.05.x (up until 17.05.05) contains a Cross Site Request Forgery (CSRF) vulnerability in /cgi-bin/koha/members/paycollect.pl Parameters affected: borrowernumber, amount, amountoutstanding, paid that can result in Attackers can mark payments as paid for certain users on behalf of Administrators. This attack appear to be exploitable via The victim must be socially engineered into clicking a link, usually via email. This vulnerability appears to have been fixed in 17.11.
|
[
"cpe:2.3:a:koha:koha:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2019-19297
|
A vulnerability has been identified in SiNVR/SiVMS Video Server (All versions < V5.0.0). The streaming service (default port 5410/tcp) of the SiVMS/SiNVR Video Server
contains a path traversal vulnerability, that could allow an
unauthenticated remote attacker to access and download arbitrary files from the server.
|
[
"cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2025-27664
|
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient CSRF Protection OVE-20230524-0008.
|
[] | null | 8.8 | null | null | null |
|
CVE-2021-46089
|
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges.
|
[
"cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2025-8503
|
code-projects Online Medicine Guide adaddmed.php sql injection
|
A vulnerability, which was classified as critical, has been found in code-projects Online Medicine Guide 1.0. Affected by this issue is some unknown functionality of the file /adaddmed.php. The manipulation of the argument mname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2012-4511
|
services/flickr/flickr.c in libsocialweb before 0.25.21 automatically connects to Flickr when no Flickr account is set, which might allow remote attackers to obtain sensitive information via a man-in-the-middle (MITM) attack.
|
[
"cpe:2.3:a:gnome:libsocialweb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libsocialweb:0.25.19:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
GHSA-8h86-6q3w-5h6p
|
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
|
[] | null | null | null | null | null |
|
CVE-2024-56882
|
Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements.
|
[] | null | 5.4 | null | null | null |
|
CVE-2025-38038
|
cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost
|
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost
set_boost is a per-policy function call, hence a driver wide lock is
unnecessary. Also this mutex_acquire can collide with the mutex_acquire
from the mode-switch path in status_store(), which can lead to a
deadlock. So, remove it.
|
[] | null | null | null | null | null |
GHSA-754q-jgg9-pxx9
|
The virtual keyboard implementation in GlobeTrotter Mobility Manager changes the color of a key as it is pressed, which allows local users to capture arbitrary keystrokes, such as for passwords, by shoulder surfing or grabbing periodic screenshots.
|
[] | null | null | null | null | null |
|
RHSA-2016:0365
|
Red Hat Security Advisory: openstack-nova security update
|
openstack-nova: Host data leak through resize/migration
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null | null |
CVE-2023-52971
|
MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan.
|
[] | null | 4.9 | null | null | null |
|
GHSA-8498-2h75-472j
|
Django denial-of-service in django.utils.html.strip_tags()
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities.
|
[] | 6.6 | 7.5 | null | null | null |
CVE-2023-34928
|
A stack overflow in the Edit_BasicSSID function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[
"cpe:2.3:h:h3c:magic:*:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:magic_b1st_firmware:100r012:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:magic_b1st:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2025-4012
|
playeduxyz PlayEdu 开源培训系统 User Avatar create server-side request forgery
|
A vulnerability was found in playeduxyz PlayEdu 开源培训系统 up to 1.8 and classified as problematic. This issue affects some unknown processing of the file /api/backend/v1/user/create of the component User Avatar Handler. The manipulation of the argument Avatar leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 2.7 | 2.7 | 3.3 | null |
GHSA-mqpq-8wg5-2cpj
|
VMware Workspace ONE Assist prior to 22.10 contains a Session fixation vulnerability. A malicious actor who obtains a valid session token may be able to authenticate to the application using that token.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-18806
|
A memory leak in the ql_alloc_large_buffers() function in drivers/net/ethernet/qlogic/qla3xxx.c in the Linux kernel before 5.3.5 allows local users to cause a denial of service (memory consumption) by triggering pci_dma_mapping_error() failures, aka CID-1acb8f2a7a9f.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2017-18422
|
In cPanel before 66.0.2, EasyApache 4 conversion sets weak domlog ownership and permissions (SEC-272).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 | null |
|
CVE-2011-1139
|
wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
|
[
"cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-74gq-xq9h-vp3g
|
In the Linux kernel, the following vulnerability has been resolved:ALSA: bcd2000: Fix a UAF bug on the error path of probingWhen the driver fails in snd_card_register() at probe time, it will free
the 'bcd2k->midi_out_urb' before killing it, which may cause a UAF bug.The following log can reveal it:[ 50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]
[ 50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0
[ 50.729530] Call Trace:
[ 50.732899] bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]Fix this by adding usb_kill_urb() before usb_free_urb().
|
[] | null | null | null | null | null |
|
CVE-2024-21001
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: BI Platform Security). The supported version that is affected is 7.0.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*"
] | null | 5.4 | null | null | null |
|
cisco-sa-20180307-ise
|
Cisco Identity Services Engine Authenticated CLI Denial of Service Vulnerability
|
A vulnerability in specific CLI commands for the Cisco Identity Services Engine could allow an authenticated, local attacker to cause a denial of service (DoS) condition. The device may need to be manually rebooted to recover.
The vulnerability is due to lack of proper input validation of the CLI user input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and issuing a crafted, malicious CLI command on the targeted device. A successful exploit could allow the attacker to cause a DoS condition. The attacker must have valid administrative privileges on the device to exploit this vulnerability.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise"]
|
[] | null | null | 4.4 | null | null |
CVE-2019-1010023
|
GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
|
[
"cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*"
] | null | 5.4 | 8.8 | 6.8 | null |
|
CVE-2019-7777
|
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2024-21265
|
Vulnerability in the Oracle Site Hub product of Oracle E-Business Suite (component: Site Hierarchy Flows). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Site Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Site Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Site Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:site_hub:12.2.3-12.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-frcm-5w4g-pjxj
|
Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
cisco-sa-20170621-piwf1
|
Cisco Prime Infrastructure Web Framework Code Cross-Site Scripting Vulnerabilities
|
A vulnerability in the web framework code of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected system.
The vulnerability is due to insufficient input validation of some parameters passed to the web server. An attacker could exploit this vulnerability by convincing a user to access a malicious link or by intercepting a user request and injecting malicious code into the request. An exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.
For additional information about cross-site scripting attacks and the methods used to exploit these vulnerabilities, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Scripting (XSS) Threat Vectors ["https://sec.cloudapps.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20060922-understanding-xss"].
There are no workarounds that address this vulnerability.
|
[] | null | null | 4.7 | null | null |
GHSA-5rmh-6fjp-jmcp
|
In the Linux kernel, the following vulnerability has been resolved:usb: mtu3: fix list_head check warningThis is caused by uninitialization of list_head.BUG: KASAN: use-after-free in __list_del_entry_valid+0x34/0xe4Call trace:
dump_backtrace+0x0/0x298
show_stack+0x24/0x34
dump_stack+0x130/0x1a8
print_address_description+0x88/0x56c
__kasan_report+0x1b8/0x2a0
kasan_report+0x14/0x20
__asan_load8+0x9c/0xa0
__list_del_entry_valid+0x34/0xe4
mtu3_req_complete+0x4c/0x300 [mtu3]
mtu3_gadget_stop+0x168/0x448 [mtu3]
usb_gadget_unregister_driver+0x204/0x3a0
unregister_gadget_item+0x44/0xa4
|
[] | null | 5.5 | null | null | null |
|
GHSA-pgrg-rvjm-c6vq
|
Use of hard-coded credentials vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to alter?configuration settings of the device. The affected products/versions are as follows: WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, and WZR-D1100H firmware Ver. 2.00 and earlier.
|
[] | null | 6.5 | null | null | null |
|
GHSA-89pw-4635-wc84
|
Pivotal Cloud Cache, versions prior to 1.3.1, prints a superuser password in plain text during BOSH deployment logs. A malicious user with access to the logs could escalate their privileges using this password.
|
[] | null | null | 8.8 | null | null |
|
CVE-2020-28341
|
An issue was discovered on Samsung mobile devices with Q(10.0) (Exynos990 chipsets) software. The S3K250AF Secure Element CC EAL 5+ chip allows attackers to execute arbitrary code and obtain sensitive information via a buffer overflow. The Samsung ID is SVE-2020-18632 (November 2020).
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-fwcc-9735-qjcm
|
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-10697
|
Tenda AC6 API Endpoint WriteFacMac formWriteFacMac command injection
|
A vulnerability has been found in Tenda AC6 15.03.05.19 and classified as critical. Affected by this vulnerability is the function formWriteFacMac of the file /goform/WriteFacMac of the component API Endpoint. The manipulation of the argument mac leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:o:tenda:ac6_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2024-50042
|
ice: Fix increasing MSI-X on VF
|
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix increasing MSI-X on VF
Increasing MSI-X value on a VF leads to invalid memory operations. This
is caused by not reallocating some arrays.
Reproducer:
modprobe ice
echo 0 > /sys/bus/pci/devices/$PF_PCI/sriov_drivers_autoprobe
echo 1 > /sys/bus/pci/devices/$PF_PCI/sriov_numvfs
echo 17 > /sys/bus/pci/devices/$VF0_PCI/sriov_vf_msix_count
Default MSI-X is 16, so 17 and above triggers this issue.
KASAN reports:
BUG: KASAN: slab-out-of-bounds in ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
Read of size 8 at addr ffff8888b937d180 by task bash/28433
(...)
Call Trace:
(...)
? ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
kasan_report+0xed/0x120
? ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
ice_vsi_cfg_def+0x3360/0x4770 [ice]
? mutex_unlock+0x83/0xd0
? __pfx_ice_vsi_cfg_def+0x10/0x10 [ice]
? __pfx_ice_remove_vsi_lkup_fltr+0x10/0x10 [ice]
ice_vsi_cfg+0x7f/0x3b0 [ice]
ice_vf_reconfig_vsi+0x114/0x210 [ice]
ice_sriov_set_msix_vec_count+0x3d0/0x960 [ice]
sriov_vf_msix_count_store+0x21c/0x300
(...)
Allocated by task 28201:
(...)
ice_vsi_cfg_def+0x1c8e/0x4770 [ice]
ice_vsi_cfg+0x7f/0x3b0 [ice]
ice_vsi_setup+0x179/0xa30 [ice]
ice_sriov_configure+0xcaa/0x1520 [ice]
sriov_numvfs_store+0x212/0x390
(...)
To fix it, use ice_vsi_rebuild() instead of ice_vf_reconfig_vsi(). This
causes the required arrays to be reallocated taking the new queue count
into account (ice_vsi_realloc_stat_arrays()). Set req_txq and req_rxq
before ice_vsi_rebuild(), so that realloc uses the newly set queue
count.
Additionally, ice_vsi_rebuild() does not remove VSI filters
(ice_fltr_remove_all()), so ice_vf_init_host_cfg() is no longer
necessary.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
RHSA-2018:1676
|
Red Hat Security Advisory: org.ovirt.engine-root security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/a:redhat:rhev_manager:4.2"
] | null | null | 5.6 | null | null |
ICSA-25-105-03
|
Siemens SIMOCODE, SIMATIC, SIPLUS, SIDOOR, SIWAREX
|
The integrated ICMP service of the network stack of affected devices can be forced to exhaust its available memory resources when receiving specially crafted messages targeting IP fragment re-assembly. This could allow an unauthenticated remote attacker to cause a temporary denial of service condition of the ICMP service, other communication services are not affected. Affected devices will resume normal operation after the attack terminates.
|
[] | null | 5.3 | null | null | null |
GHSA-7g6h-cq22-rqv6
|
If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
|
[] | null | 7.2 | null | null | null |
|
GHSA-2qv3-7vvv-5c37
|
In cmdq, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09057438; Issue ID: MSV-1696.
|
[] | null | 4.4 | null | null | null |
|
GHSA-58v2-rgf4-qvhg
|
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
|
[] | null | 6.7 | null | null | null |
|
GHSA-ccw9-q98h-qv5r
|
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sAppName parameter at sslapp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[] | null | 7.5 | null | null | null |
|
GHSA-cfc9-f8qw-f5wh
|
An uninitialized pointer use vulnerability exists in the functionality of WPS Office 11.2.0.11537 that handles Data elements in an Excel file. A specially crafted malformed file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[] | null | 8.8 | null | null | null |
|
GHSA-rr4f-g6mq-w5mm
|
Cross-site scripting (XSS) vulnerability in the ICAP patience page in Blue Coat Security Gateway OS (SGOS) 4.2 before 4.2.9, 5.2 before 5.2.5, and 5.3 before 5.3.1.7 allows remote attackers to inject arbitrary web script or HTML via the URL.
|
[] | null | null | null | null | null |
|
RHSA-2024:6786
|
Red Hat Security Advisory: firefox update
|
nss: vulnerable to Minerva side-channel information leak mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Firefox did not ask before openings news: links in an external application mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 9.8 | null | null | null |
CVE-2019-2683
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
CVE-2017-18234
|
An issue was discovered in Exempi before 2.4.3. It allows remote attackers to cause a denial of service (invalid memcpy with resultant use-after-free) or possibly have unspecified other impact via a .pdf file containing JPEG data, related to XMPFiles/source/FormatSupport/ReconcileTIFF.cpp, XMPFiles/source/FormatSupport/TIFF_MemoryReader.cpp, and XMPFiles/source/FormatSupport/TIFF_Support.hpp.
|
[
"cpe:2.3:a:exempi_project:exempi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-85f9-w9cx-h363
|
Cross site request forgery in Jenkins Job and Node ownership Plugin
|
Job and Node ownership Plugin 0.13.0 and earlier does not perform a permission check in several HTTP endpoints. This allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[] | null | 8.8 | null | null | null |
GHSA-p8g6-7v7w-4whg
|
In the Linux kernel, the following vulnerability has been resolved:vfio/pci: Create persistent INTx handlerA vulnerability exists where the eventfd for INTx signaling can be
deconfigured, which unregisters the IRQ handler but still allows
eventfds to be signaled with a NULL context through the SET_IRQS ioctl
or through unmask irqfd if the device interrupt is pending.Ideally this could be solved with some additional locking; the igate
mutex serializes the ioctl and config space accesses, and the interrupt
handler is unregistered relative to the trigger, but the irqfd path
runs asynchronous to those. The igate mutex cannot be acquired from the
atomic context of the eventfd wake function. Disabling the irqfd
relative to the eventfd registration is potentially incompatible with
existing userspace.As a result, the solution implemented here moves configuration of the
INTx interrupt handler to track the lifetime of the INTx context object
and irq_type configuration, rather than registration of a particular
trigger eventfd. Synchronization is added between the ioctl path and
eventfd_signal() wrapper such that the eventfd trigger can be
dynamically updated relative to in-flight interrupts or irqfd callbacks.
|
[] | null | 5.5 | null | null | null |
|
CVE-2009-0708
|
Multiple cross-site request forgery (CSRF) vulnerabilities in SemanticScuttle before 0.91 allow remote attackers to (1) hijack the authentication of administrators via unknown vectors or (2) hijack the authentication of arbitrary users via vectors involving the profile page.
|
[
"cpe:2.3:a:semanticscuttle:semanticscuttle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:semanticscuttle:semanticscuttle:0.89:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2015-9353
|
The gigpress plugin before 2.3.11 for WordPress has SQL injection in the admin area, a different vulnerability than CVE-2015-4066.
|
[
"cpe:2.3:a:tri:gigpress:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 | null |
|
CVE-2020-20245
|
Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the log process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
|
[
"cpe:2.3:o:mikrotik:routeros:6.46.3:*:*:*:-:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-jqg4-p627-84cf
|
An exploitable use-after-free vulnerability exists in the way LZW-compressed streams are processed in Aspose.PDF 19.2 for C++. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free condition. To trigger this vulnerability, a specifically crafted PDF document needs to be processed by the target application.
|
[] | null | 9.8 | null | null | null |
|
CVE-2014-3562
|
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
|
[
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-5vrc-7jfr-4642
|
monorepo-build Command Injection vulnerability
|
A command injection vulnerability affects all versions of package monorepo-build.
|
[] | null | 9.8 | null | null | null |
GHSA-8782-xgh5-r7mv
|
Concrete CMS vulnerable to Reflected Cross-Site Scripting via dashboard icons
|
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the dashboard icons due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
|
[] | null | 6.1 | null | null | null |
GHSA-79h6-4qjr-x9rg
|
Microsoft SQL Server 2012 SP2 and 2012 SP3 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability."
|
[] | null | null | 8.8 | null | null |
|
CVE-2024-47950
|
In JetBrains TeamCity before 2024.07.3 stored XSS was possible in Backup configuration settings
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
|
ICSA-20-135-01
|
Opto 22 SoftPAC Project
|
Paths specified within the zip files used to update the SoftPAC firmware are not sanitized. As a result, an attacker with user privileges can gain arbitrary file write access with system access.CVE-2020-12042 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N). SoftPAC 's firmware files ' signatures are not verified upon firmware update. This allows an attacker to replace legitimate firmware files with malicious files.CVE-2020-12046 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N). SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service including updating SoftPAC firmware, starting or stopping service, or writing to certain registry values.CVE-2020-10612 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). SoftPAC does not specify the path of multiple imported .dll files. Therefore, an attacker can replace them and execute code whenever the service starts.CVE-2020-10616 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N). SoftPAC communication does not include any credentials. This allows an attacker with network access to directly communicate with SoftPAC, including, for example, stopping the service remotely.CVE-2020-10620 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
ICSA-23-278-01
|
Hitachi Energy AFS65x,AFF66x, AFS67x, and AFR67x Series Products
|
In Expat (aka libexpat) before 2.4.3, a left shift by 29(or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory). In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize. Vulnerable code using addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. Vulnerable code using build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow Vulnerable code using defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. The lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. Vulnerable code using nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow An insecure direct object reference for the file-download URL in Synametrics SynaMan before 5.0 allows a remote attacker to access unshared files via a modified base64-encoded filename string. In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString. In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames Vulnerable code in xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. Vulnerable code in xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs. Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
|
[] | null | null | 7.5 | null | null |
GHSA-82rx-89fp-4w49
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in BoldGrid Total Upkeep allows Relative Path Traversal.This issue affects Total Upkeep: from n/a through 1.15.8.
|
[] | null | 7.5 | null | null | null |
|
cisco-sa-20180516-nfvis-path-traversal
|
Cisco Enterprise NFV Infrastructure Software Web Management Interface Path Traversal Vulnerability
|
A vulnerability in the web management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to conduct a path traversal attack on a targeted system.
The vulnerability is due to insufficient validation of web request parameters. An attacker who has access to the web management interface of the affected application could exploit this vulnerability by sending a malicious web request to the affected device. A successful exploit could allow the attacker to access sensitive information on the affected system.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis-path-traversal ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis-path-traversal"]
|
[] | null | null | 6.5 | null | null |
CVE-2021-44166
|
An improper access control vulnerability [CWE-284 ] in FortiToken Mobile (Android) external push notification 5.1.0 and below may allow a remote attacker having already obtained a user's password to access the protected system during the 2FA procedure, even though the deny button is clicked by the legitimate user.
|
[
"cpe:2.3:a:fortinet:fortitoken_mobile:4.0.0:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:4.0.1:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:4.1.1:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:4.2.1:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:4.2.2:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:4.3.0:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:4.4.0:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:4.5.0:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:5.0.2:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:5.0.3:*:*:*:*:android:*:*",
"cpe:2.3:a:fortinet:fortitoken_mobile:5.1.0:*:*:*:*:android:*:*"
] | null | 4.1 | null | null | null |
|
CVE-2019-15792
|
Type confusion in shiftfs
|
In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, shiftfs_btrfs_ioctl_fd_replace() calls fdget(oldfd), then without further checks passes the resulting file* into shiftfs_real_fdget(), which casts file->private_data, a void* that points to a filesystem-dependent type, to a "struct shiftfs_file_info *". As the private_data is not required to be a pointer, an attacker can use this to cause a denial of service or possibly execute arbitrary code.
|
[
"cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
GHSA-xmm8-v82g-957c
|
DELL EMC Avamar Server, versions 19.1, 19.2, 19.3, contain a SQL Injection Vulnerability in Fitness Analyzer. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database, causing unauthorized read and write access to application data. Exploitation may lead to leakage or deletion of sensitive backup data; hence the severity is Critical. Dell EMC recommends customers to upgrade at the earliest opportunity.
|
[] | null | null | null | null | null |
|
CVE-2007-6350
|
scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute code by invoking dangerous subcommands including (1) unison, (2) rsync, (3) svn, and (4) svnserve, as originally demonstrated by creating a Subversion (SVN) repository with malicious hooks, then using svn to trigger execution of those hooks.
|
[
"cpe:2.3:a:scponly:scponly:*:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:scponly:scponly:4.5:*:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
GHSA-f2h7-p6gx-hh2p
|
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several untrusted pointer dereference vulnerabilities have been identified, which may allow an attacker to execute arbitrary code.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-45745
|
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:tdx_module_software:1.5.05.46.698:*:*:*:*:*:*:*"
] | null | 7.9 | null | null | null |
|
GHSA-cg7q-23gj-hm59
|
IBM Jazz Foundation 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | 5.4 | null | null | null |
|
GHSA-g8w6-v52m-xmgv
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect integrity, related to MCF.
|
[] | null | null | null | null | null |
|
CVE-2023-27163
|
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
|
[
"cpe:2.3:a:rbaskets:request_baskets:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
RHSA-2005:685
|
Red Hat Security Advisory: mysql security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-rwrv-cg6w-mmfr
|
A certain Microsoft Windows Media Player 9 Series ActiveX control allows remote attackers to view and manipulate the Media Library on the local system via HTML script.
|
[] | null | null | null | null | null |
|
RHSA-2023:3425
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: remote code execution in cups-filters, beh CUPS backend
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null | null |
CVE-2002-1383
|
Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.
|
[
"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-41357
|
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/powerDNS/record-edit.php.
|
[
"cpe:2.3:a:phpipam:phpipam:1.6:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2005-1557
|
Multiple cross-site scripting (XSS) vulnerabilities in WebApp Guestbook PRO 3.2.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) content of a message.
|
[
"cpe:2.3:a:pixysoft:guestbook_pro:3.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2016-4134
|
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
CVE-2025-25776
|
Cross-Site Scripting (XSS) vulnerability exists in the User Registration and User Profile features of Codeastro Bus Ticket Booking System v1.0 allows an attacker to execute arbitrary code into the Full Name and Address fields during user registration or profile editing.
|
[] | null | 5 | null | null | null |
|
GHSA-rpgg-prx7-m6p6
|
The Audio component in Apple iOS before 9 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted audio file.
|
[] | null | null | null | null | null |
|
CVE-2018-5706
|
An issue was discovered in Octopus Deploy before 4.1.9. Any user with user editing permissions can modify teams to give themselves Administer System permissions even if they didn't have them, as demonstrated by use of the RoleEdit or TeamEdit permission.
|
[
"cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2016-6001
|
IBM Forms Experience Builder could be susceptible to a server-side request forgery (SSRF) from the application design interface allowing for some information disclosure of internal resources.
|
[
"cpe:2.3:a:ibm:forms_experience_builder:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:forms_experience_builder:8.6.0:*:*:*:*:*:*:*"
] | null | null | 3.1 | 3.5 | null |
|
GHSA-vw87-wrx2-xwxq
|
IBM Common Licensing 9.0 could allow a local user to enumerate usernames due to an observable response discrepancy. IBM X-Force ID: 273337.
|
[] | null | 4 | null | null | null |
|
CVE-2018-2444
|
SAP BusinessObjects Financial Consolidation, versions 10.0, 10.1, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
|
[
"cpe:2.3:a:sap:businessobjects_financial_consolidation:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:businessobjects_financial_consolidation:10.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2019-6518
|
Moxa IKS and EDS store plaintext passwords, which may allow sensitive information to be read by someone with access to the device.
|
[
"cpe:2.3:o:moxa:iks-g6824a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:iks-g6824a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:eds-405a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:eds-405a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:eds-408a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:eds-408a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:eds-510a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:eds-510a:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-28jp-5r9q-jh8r
|
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere BigInsights 2.0 through 2.1 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2022-42715
|
A reflected XSS vulnerability exists in REDCap before 12.04.18 in the Alerts & Notifications upload feature. A crafted CSV file will, when uploaded, trigger arbitrary JavaScript code execution.
|
[
"cpe:2.3:a:vanderbilt:redcap:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2023-49260
|
Stored cross-site scripting vulnerability
|
An XSS attack can be performed by changing the MOTD banner and pointing the victim to the "terminal_tool.cgi" path. It can be used together with the vulnerability CVE-2023-49255.
|
[
"cpe:2.3:o:hongdian:h8951-4g-esp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hongdian:h8951-4g-esp:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2021-24667
|
Gallery Blocks with Lightbox < 2.2.1- Authenticated Stored Cross-Site Scripting
|
A stored cross-site scripting vulnerability has been discovered in : Simply Gallery Blocks with Lightbox (Version – 2.2.0 & below). The vulnerability exists in the Lightbox functionality where a user with low privileges is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of image parameters in meta data.
|
[
"cpe:2.3:a:simplygallery:simply_gallery_blocks_with_lightbox:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null |
GHSA-cpcj-vfc4-275c
|
In memory management driver, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05336706.
|
[] | null | null | null | null | null |
|
GHSA-f54c-rr24-8cqx
|
Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote authenticated attacker to create a reverse shell with administrator privileges on the DBSec server via carefully constructed Java serialized object sent to the DBSec server.
|
[] | null | 8 | null | null | null |
|
CVE-2019-0254
|
SAP Disclosure Management (before version 10.1 Stack 1301) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
|
[
"cpe:2.3:a:sap:disclosure_management:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
RHSA-2015:1895
|
Red Hat Security Advisory: openstack-swift security update
|
openstack-swift: Information leak via Swift tempurls
|
[
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7",
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null | null |
CVE-2022-48886
|
ice: Add check for kzalloc
|
In the Linux kernel, the following vulnerability has been resolved:
ice: Add check for kzalloc
Add the check for the return value of kzalloc in order to avoid
NULL pointer dereference.
Moreover, use the goto-label to share the clean code.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-qf47-p59r-xq6g
|
On F5 BIG-IP 13.1.0-13.1.0.3, 13.0.0, 12.1.0-12.1.3.3, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, a malformed TLS handshake causes TMM to crash leading to a disruption of service. This issue is only exposed on the data plane when Proxy SSL configuration is enabled. The control plane is not impacted by this issue.
|
[] | null | null | 7.5 | null | null |
|
CVE-2017-14181
|
DeleteBitBuffer in libbitbuf/bitbuffer.c in mp4tools aacplusenc 0.17.5 allows remote attackers to cause a denial of service (invalid memory write, SEGV on unknown address 0x000000000030, and application crash) or possibly have unspecified other impact via a crafted .wav file, aka a NULL pointer dereference.
|
[
"cpe:2.3:a:aacplusenc_project:aacplusenc:0.17.5:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
RHSA-2012:1378
|
Red Hat Security Advisory: openstack-keystone security update
|
Keystone: Lack of authorization for adding users to tenants OpenStack-Keystone: role revocation token issues 2012.1.1: fails to validate tokens in Admin API 2012.1.1: fails to raise Unauthorized user error for disabled tenant
|
[
"cpe:/a:redhat:openstack:1::el6"
] | null | null | null | null | null |
CVE-2021-41357
|
Win32k Elevation of Privilege Vulnerability
|
Win32k Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2000-0147
|
snmpd in SCO OpenServer has an SNMP community string that is writable by default, which allows local attackers to modify the host's configuration.
|
[
"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-h7jh-3h8w-h94f
|
gnc-test-env in GnuCash 2.3.15 and earlier places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
|
[] | null | null | null | null | null |
|
GHSA-m3cp-mg4w-5xw3
|
A vulnerability has been found in SourceCodester Shopping Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file insert-product.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232951.
|
[] | null | null | 6.3 | null | null |
|
CVE-2024-11459
|
Country Blocker <= 3.2 - Reflected Cross-Site Scripting
|
The Country Blocker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'ip' parameter in all versions up to, and including, 3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.