id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2018-1425
|
IBM Security Guardium Big Data Intelligence (SonarG) 3.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 139003.
|
[
"cpe:2.3:a:ibm:security_guardium_big_data_intelligence:3.1:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
CVE-2024-36236
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
RHSA-2017:0065
|
Red Hat Security Advisory: kernel security update
|
kernel: Use-after-free in the recvmmsg exit path
|
[
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.5::server"
] | null | null | 8.1 | null | null |
GHSA-m5g7-g5cj-mjrh
|
ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.
|
[] | null | null | null | null | null |
|
GHSA-7547-299x-4pmv
|
Improper session management vulnerability in Samsung Health prior to 6.20.1.005 prevents logging out from Samsung Health App.
|
[] | null | null | null | null | null |
|
CVE-2008-0738
|
Multiple SQL injection vulnerabilities in CandyPress (CP) 4.1.1.26, and earlier 4.1.x versions, allow remote attackers to execute arbitrary SQL commands via the (1) idcust parameter to (a) ajax_getTiers.asp and (b) ajax_getCust.asp in ajax/, and the (2) tableName parameter to (c) ajax/ajax_tableFields.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:shoppingtree:candypress_store:*:*:*:*:*:*:*:*",
"cpe:2.3:a:shoppingtree:candypress_store:4.1.1.26:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-24479
|
FactoryTalk® View Machine Edition - Local Code Injection
|
A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user.
|
[] | 8.6 | null | null | null | null |
CVE-1999-1514
|
Buffer overflow in Celtech ExpressFS FTP server 2.x allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long USER command.
|
[
"cpe:2.3:a:celtech_software:expressfs:2.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-27602
|
SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the source rules and perform remote code execution enabling them to compromise the confidentiality, integrity and availability of the application.
|
[
"cpe:2.3:a:sap:commerce:1808:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:1811:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:2011:*:*:*:*:*:*:*"
] | null | null | 9.9 | null | null |
|
CVE-2022-24453
|
HEVC Video Extensions Remote Code Execution Vulnerability
|
HEVC Video Extensions Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-v2f2-hxv3-5cx2
|
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
|
[] | null | null | null | null | null |
|
CVE-2021-0234
|
Junos OS: QFX5100-96S: DDoS protection does not work as expected.
|
Due to an improper Initialization vulnerability on Juniper Networks Junos OS QFX5100-96S devices with QFX 5e Series image installed, ddos-protection configuration changes will not take effect beyond the default DDoS (Distributed Denial of Service) settings when configured from the CLI. The DDoS protection (jddosd) daemon allows the device to continue to function while protecting the packet forwarding engine (PFE) during the DDoS attack. When this issue occurs, the default DDoS settings within the PFE apply, as CPU bound packets will be throttled and dropped in the PFE when the limits are exceeded. To check if the device has this issue, the administrator can execute the following command to monitor the status of DDoS protection: user@device> show ddos-protection protocols error: the ddos-protection subsystem is not running This issue affects only QFX5100-96S devices. No other products or platforms are affected by this issue. This issue affects: Juniper Networks Junos OS on QFX5100-96S: 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R3-S4; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R3, 19.1R3-S4; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2;
|
[
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5100-96s:-:*:*:*:*:*:*:*"
] | null | 5.8 | null | null | null |
GHSA-hgxv-8gp2-j88j
|
In gasket_free_coherent_memory_all of gasket_page_table.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151454974References: N/A
|
[] | null | 6.7 | null | null | null |
|
GHSA-vqx3-p34h-gjh5
|
The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.
|
[] | null | 2.2 | null | null | null |
|
CVE-2024-2023
|
Folders <= 3.0 and Folders Pro <= 3.0.2 - Directory Traversal via handle_folders_file_upload
|
The Folders and Folders Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.0 in Folders and 3.0.2 in Folders Pro via the 'handle_folders_file_upload' function. This makes it possible for authenticated attackers, with author access and above, to upload files to arbitrary locations on the server.
|
[
"cpe:2.3:a:premio:folders:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:premio:folders_pro:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2024-13445
|
Elementor Website Builder – More Than Just a Page Builder <= 3.27.4 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the border, margin and gap parameters in all versions up to, and including, 3.27.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-cwq3-9m45-v2wc
|
Directory traversal vulnerability in includes/controller.php in Pulse CMS Basic before 1.2.9 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter to index.php.
|
[] | null | null | null | null | null |
|
GHSA-v6ff-g4q4-fqx2
|
There is an Assertion 'page_p != NULL' failed at /parser/js/js-parser-mem.c(parser_list_get) in JerryScript 3.0.0.
|
[] | null | null | null | null | null |
|
GHSA-9v2g-635q-h56f
|
Multiple SQL injection vulnerabilities in default.asp in Site2Nite allow remote attackers to execute arbitrary SQL commands via the (1) txtUserName and (2) txtPassword parameters. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2017-2100
|
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.1 and earlier allows remote attackers to conduct DNS rebinding attacks via unspecified vectors.
|
[
"cpe:2.3:a:ipa:appgoat:*:*:*:*:*:*:*:*"
] | null | null | 6.3 | 6.8 | null |
|
GHSA-fgmc-hghq-mhhv
|
Directory Traversal vulnerability in Hex-Dragon Plain Craft Launcher 2 version Alpha 1.3.9, allows local attackers to execute arbitrary code and gain sensitive information.
|
[] | null | 7.8 | null | null | null |
|
GHSA-3p63-xccw-wppw
|
A vulnerability has been found in PHPGurukul e-Diary Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /search-result.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-g44m-wxp5-6q6h
|
Cross-Site Request Forgery (CSRF) vulnerability in eyecix JobSearch allows Cross Site Request Forgery.This issue affects JobSearch: from n/a through 2.5.3.
|
[] | null | 4.3 | null | null | null |
|
GHSA-p5g4-jr8m-xjw5
|
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24703.
|
[] | null | null | 7.8 | null | null |
|
GHSA-xm65-9x7h-29gw
|
Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.
|
[] | null | null | null | null | null |
|
CVE-2013-0925
|
Google Chrome before 26.0.1410.43 does not ensure that an extension has the tabs (aka APIPermission::kTab) permission before providing a URL to this extension, which has unspecified impact and remote attack vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.41:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-54042
|
WordPress WP Post Hide plugin <= 1.0.9 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in xfinitysoft WP Post Hide allows Cross Site Request Forgery. This issue affects WP Post Hide: from n/a through 1.0.9.
|
[] | null | 4.3 | null | null | null |
GHSA-58cf-923h-gc5m
|
A vulnerability was found in SourceCodester Company Website CMS 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /dashboard/createblog of the component Create Blog Page. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-244310 is the identifier assigned to this vulnerability.
|
[] | null | null | 4.7 | null | null |
|
GHSA-6g7v-365p-9jh2
|
In registerSignalHandlers of main.c, there is a possible local arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256591441
|
[] | null | 6.7 | null | null | null |
|
GHSA-3wfw-cf7h-38c7
|
A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials.This vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software. An attacker could exploit this vulnerability by accessing the configuration files on an affected system. A successful exploit could allow the attacker to view MongoDB credentials.
|
[] | null | 8.4 | null | null | null |
|
CVE-2014-4262
|
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
|
[
"cpe:2.3:a:oracle:jdk:1.5.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update75:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update75:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update5:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
RHSA-2023:3366
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.2 packages and security update
|
golang: crash in a golang.org/x/crypto/ssh server golang: path/filepath: path-filepath filepath.Clean path traversal golang: crypto/tls: large handshake records may cause panics golang: net/http, net/textproto: denial of service from excessive memory allocation golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 7.3 | null | null | null |
CVE-2008-2144
|
Multiple unspecified vulnerabilities in Solaris print service for Sun Solaris 8, 9, and 10 allow remote attackers to cause a denial of service or execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2017-12630
|
In Apache Drill 1.11.0 and earlier when submitting form from Query page users are able to pass arbitrary script or HTML which will take effect on Profile page afterwards. Example: after submitting special script that returns cookie information from Query page, malicious user may obtain this information from Profile page afterwards.
|
[
"cpe:2.3:a:apache:drill:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2003-0088
|
TruBlueEnvironment for MacOS 10.2.3 and earlier allows local users to overwrite or create arbitrary files and gain root privileges by setting a certain environment variable that is used to write debugging information.
|
[
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-26wc-mjpc-3f8m
|
Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 leaks driver logs that contain addresses of kernel mode objects, weakening KASLR.
|
[] | null | 5.5 | null | null | null |
|
GHSA-m5jj-3fxw-8572
|
Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2022-4819
|
HotCRP cross site scripting
|
A vulnerability was found in HotCRP. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is d4ffdb0ef806453c54ddca7fdda3e5c60356285c. It is recommended to apply a patch to fix this issue. VDB-216998 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:hotcrp:hotcrp:-:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | null |
https://github.com/kohler/hotcrp/commit/d4ffdb0ef806453c54ddca7fdda3e5c60356285c
|
CVE-2024-21108
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
CVE-2024-38063
|
Windows TCP/IP Remote Code Execution Vulnerability
|
Windows TCP/IP Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2006-5369
|
Unspecified vulnerability in Oracle Application Object Library in Oracle E-Business Suite 11.5.10CU2 has unknown impact and remote authenticated attack vectors, aka Vuln# APPS02.
|
[
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2025-23510
|
WordPress WordPress Logging Service plugin <= 1.5.4 - CSRF to Stored Cross Site Scripting (XSS) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Zaantar WordPress Logging Service allows Stored XSS.This issue affects WordPress Logging Service: from n/a through 1.5.4.
|
[] | null | 7.1 | null | null | null |
CVE-2014-4061
|
Microsoft SQL Server 2008 SP3, 2008 R2 SP2, and 2012 SP1 does not properly control use of stack memory for processing of T-SQL batch commands, which allows remote authenticated users to cause a denial of service (daemon hang) via a crafted T-SQL statement, aka "Microsoft SQL Server Stack Overrun Vulnerability."
|
[
"cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:itanium:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:sp3:itanium:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:sp3:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:sp3:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2012:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2012:sp1:x86:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2025-21879
|
btrfs: fix use-after-free on inode when scanning root during em shrinking
|
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix use-after-free on inode when scanning root during em shrinking
At btrfs_scan_root() we are accessing the inode's root (and fs_info) in a
call to btrfs_fs_closing() after we have scheduled the inode for a delayed
iput, and that can result in a use-after-free on the inode in case the
cleaner kthread does the iput before we dereference the inode in the call
to btrfs_fs_closing().
Fix this by using the fs_info stored already in a local variable instead
of doing inode->root->fs_info.
|
[] | null | 7.8 | null | null | null |
GHSA-pxhq-xq33-27qf
|
Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015.
|
[] | null | null | null | null | null |
|
CVE-2024-23135
|
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
|
A maliciously crafted SLDPRT file in ASMkern228A.dll when parsed through Autodesk applications can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
|
[
"cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:2025:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:2025:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:2025:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-672j-xwv9-5wq3
|
FON La Fonera routers do not properly limit DNS service access by unauthenticated clients, which allows remote attackers to tunnel traffic via DNS requests for hosts that should not be accessible before authentication.
|
[] | null | null | null | null | null |
|
GHSA-7hqx-w6mq-g592
|
check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2025:10374
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.8 | null | null | null |
CVE-2007-1807
|
SQL injection vulnerability in modules/myalbum/viewcat.php in the myAlbum-P 2.0 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the cid parameter.
|
[
"cpe:2.3:a:peak_xoops:myalbum_p:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2014-8585
|
Directory traversal vulnerability in the WordPress Download Manager plugin for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the fname parameter to (1) views/file_download.php or (2) file_download.php.
|
[
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.2.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.32:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:1.5.33:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.10:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.11:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.12:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.13:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.14:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.15:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.16:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.17:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.18:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.0.19:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.1.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.2.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.3.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.4.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.91:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.92:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.93:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.94:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.95:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.96:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.97:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.98:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.5.99:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.91:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.92:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.93:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.94:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.95:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:2.6.96:*:*:*:*:wordpress:*:*"
] | null | null | null | 5 | null |
|
CVE-2020-12684
|
XXE injection can occur in i-net Clear Reports 2019 19.0.287 (Designer), as used in i-net HelpDesk and other products, when XML input containing a reference to an external entity is processed by a weakly configured XML parser.
|
[
"cpe:2.3:a:inetsoftware:i-net_clear_reports:19.0.287:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-g8w8-65mq-pgmc
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in anzia Ni WooCommerce Order Export allows Reflected XSS.This issue affects Ni WooCommerce Order Export: from n/a through 3.1.6.
|
[] | null | 7.1 | null | null | null |
|
CVE-2022-22890
|
There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' failed at /jerry-core/parser/js/js-scanner-util.c in Jerryscript 3.0.0.
|
[
"cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 5 | null |
|
RHSA-2008:0814
|
Red Hat Security Advisory: condor security and bug fix update
|
condor: incorrect handling of wild cards in authorization lists
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null | null |
GHSA-vqr7-r45q-8887
|
SQL injection vulnerability in product_cat in AgileBill 1.4.92 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-pqq3-38c3-35qx
|
ASUSTOR Data Master 3.1.5 and below allows authenticated remote non-administrative users to read any file on the file system when providing the full path to loginimage.cgi.
|
[] | null | null | 6.5 | null | null |
|
GHSA-qj43-c67c-c7c5
|
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
|
[] | null | 7.5 | null | null | null |
|
GHSA-hqx2-pqrp-v2ph
|
The Envo's Elementor Templates & Widgets for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.4. This is due to missing or incorrect nonce validation on the ajax_plugin_activation function. This makes it possible for unauthenticated attackers to activate arbitrary installed plugins via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
CVE-2002-1651
|
Cross-site scripting (XSS) vulnerability in Verity Search97 allows remote attackers to insert arbitrary web content and steal sensitive information from other clients, possibly due to certain error messages from template pages that use the (1) vformat or (2) vfilter functions.
|
[
"cpe:2.3:a:verity:search97:2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-4082
|
Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges.
*This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.* This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
|
[] | null | 5.9 | null | null | null |
|
GHSA-4p33-4mmg-2qxr
|
3proxy 0.5 to 0.5.2, when NT-encoded passwords are being used, allows remote attackers to cause a denial of service (blocked account) via unspecified vectors related to NTLM authentication, which causes a password hash to be overwritten.
|
[] | null | null | null | null | null |
|
GHSA-2g9p-2pv5-997p
|
A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212007.
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-0709
|
Windows Hyper-V Remote Code Execution Vulnerability
|
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.
An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.
The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
CVE-2019-10657
|
Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request.
|
[
"cpe:2.3:o:grandstream:gwn7610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:gwn7610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:gwn7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:gwn7000:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-8r9h-wv72-5pmq
|
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginCheck.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-31702
|
vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication.
|
[
"cpe:2.3:a:vmware:vrealize_network_insight:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_network_insight:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_network_insight:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_network_insight:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_network_insight:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_network_insight:6.7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2024-29434
|
An issue in the system image upload interface of Alldata v0.4.6 allows attackers to execute a directory traversal when uploading a file.
|
[] | null | 8.3 | null | null | null |
|
GHSA-j6hg-c78w-h2x4
|
Cross-Site Request Forgery (CSRF) vulnerability in Fluenx DeepL API translation plugin <= 2.1.4 versions.
|
[] | null | 4.3 | null | null | null |
|
GHSA-8qq4-g237-59gp
|
Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-30276
|
Adobe Audition 2024 M2V File Parsing Memory corruption
|
Audition versions 24.2, 23.6.4 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:audition:24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:audition:24.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-7vqf-qxp2-qfv6
|
Microsoft Exchange Server Remote Code Execution Vulnerability
|
[] | null | 8 | null | null | null |
|
GHSA-536w-qc2g-q32f
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPPOOL Sheets To WP Table Live Sync allows Stored XSS.This issue affects Sheets To WP Table Live Sync: from n/a through 3.7.0.
|
[] | null | 5.9 | null | null | null |
|
GHSA-fx6x-83f6-g9pc
|
** DISPUTED ** Directory traversal vulnerability in index.php in Simple Machines Forum (SMF) 1.1.3 allows remote attackers to include local files via unspecified vectors related to the sourcedir parameter or the actionArray hash. NOTE: CVE and multiple third parties dispute this vulnerability because both sourcedir and actionArray are defined before use.
|
[] | null | null | null | null | null |
|
GHSA-8qq4-8jvq-mfw4
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
|
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
|
[] | null | null | 7.5 | null | null |
GHSA-mmh6-m7v9-5956
|
Regular expression denial of service in markdown-link-extractor
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function
|
[] | null | null | null | null | null |
CVE-2011-4558
|
Tiki 8.2 and earlier allows remote administrators to execute arbitrary PHP code via crafted input to the regexres and regex parameters.
|
[
"cpe:2.3:a:tiki:tiki:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6 | null |
|
CVE-2024-9883
|
Pods < 3.2.7.1 - Admin+ Stored XSS
|
The Pods WordPress plugin before 3.2.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null | null |
GHSA-mhpx-vvg7-ghg9
|
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in image conversion related to processing of the PCX (picture exchange) file format. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 7.8 | null | null |
|
CVE-2023-31067
|
An issue was discovered in TSplus Remote Access through 16.0.2.14. There are Full Control permissions for Everyone on some directories under %PROGRAMFILES(X86)%\TSplus\Clients\www.
|
[
"cpe:2.3:a:tsplus:tsplus_remote_access:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-5www-87m9-2c36
|
The pipe_init_terminal function in main.c in s3dvt allows local users to gain privileges by leveraging setuid permissions and usage of bash 4.3 and earlier. NOTE: This vulnerability exists because of an incomplete fix for CVE-2013-6876.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-24746
|
Apache NimBLE: Denial of service in NimBLE Bluetooth stack
|
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache NimBLE.
Specially crafted GATT operation can cause infinite loop in GATT server leading to denial of service in Bluetooth stack or device.
This issue affects Apache NimBLE: through 1.6.0.
Users are recommended to upgrade to version 1.7.0, which fixes the issue.
|
[
"cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
https://github.com/apache/mynewt-nimble/commit/d42a0ebe6632bd0c318560e4293a522634f60594
|
GHSA-49hp-q4w9-2gpc
|
tpview.dll in VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows, when Cortado ThinPrint virtual printing is enabled, allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (host OS memory corruption) via a JPEG 2000 image.
|
[] | null | null | 7.8 | null | null |
|
CVE-2019-10150
|
It was found that OpenShift Container Platform versions 3.6.x - 4.6.0 does not perform SSH Host Key checking when using ssh key authentication during builds. An attacker, with the ability to redirect network traffic, could use this to alter the resulting build output.
|
[
"cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | null | null |
|
RHSA-2016:0296
|
Red Hat Security Advisory: rh-ror41 security update
|
rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller rubygem-activerecord: Nested attributes rejection proc bypass in Active Record rubygem-actionpack: Object leak vulnerability for wildcard controller routes in Action Pack rubygem-actionpack: possible object leak and denial of service attack in Action Pack rubygem-actionpack: directory traversal flaw in Action View rubygem-activerecord: possible input validation circumvention in Active Model
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null | null |
GHSA-f462-4c2j-6qcw
|
In the Linux kernel, the following vulnerability has been resolved:usb: typec: altmodes/displayport: do not index invalid pin_assignmentsA poorly implemented DisplayPort Alt Mode port partner can indicate
that its pin assignment capabilities are greater than the maximum
value, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show
will cause a BRK exception due to an out of bounds array access.Prevent for loop in pin_assignment_show from accessing
invalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX
value in typec_dp.h and using i < DP_PIN_ASSIGN_MAX as a loop
condition.
|
[] | null | null | null | null | null |
|
GHSA-2p86-fwpp-78jw
|
SNMP daemon in the DX200 based network element for Nokia Serving GPRS support node (SGSN) allows remote attackers to read SNMP options via arbitrary community strings.
|
[] | null | null | null | null | null |
|
CVE-2011-1713
|
Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.
|
[
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2007-4920
|
SQL injection vulnerability in soporte_derecha_w.php in PHP Webquest 2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter.
|
[
"cpe:2.3:a:php_webquest:php_webquest:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-84ww-gp3p-3hmw
|
In msmtp 1.8.2 and mpop 1.4.3, when tls_trust_file has its default configuration, certificate-verification results are not properly checked.
|
[] | null | null | 5.3 | null | null |
|
CVE-2018-1000003
|
Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.
|
[
"cpe:2.3:a:powerdns:recursor:4.1.0:*:*:*:*:*:*:*"
] | null | null | 3.7 | 4.3 | null |
|
CVE-2009-0658
|
Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
CVE-2011-3730
|
Drupal 7.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/simpletest/tests/upgrade/drupal-6.upload.database.php and certain other files.
|
[
"cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-mw2c-vx6j-mg76
|
CKEditor4 Cross-site Scripting vulnerability in samples with enabled the preview feature
|
Affected packagesThe vulnerability has been discovered in the samples that use the [preview](https://ckeditor.com/cke4/addon/preview) feature:`samples/old/**/*.html``plugins/[plugin name]/samples/**/*.html`All integrators that use these samples in the production code can be affected.ImpactA potential vulnerability has been discovered in one of CKEditor's 4 samples that are shipped with production code. The vulnerability allowed to execute JavaScript code by abusing the misconfigured [preview feature](https://ckeditor.com/cke4/addon/preview). It affects all users using the CKEditor 4 at version < 4.24.0-lts with affected samples used in a production environment.PatchesThe problem has been recognized and patched. The fix will be available in version 4.24.0-lts.For more informationEmail us at [[email protected]](mailto:[email protected]) if you have any questions or comments about this advisory.AcknowledgementsThe CKEditor 4 team would like to thank [Marcin Wyczechowski](https://www.linkedin.com/in/marcin-wyczechowski-0a823795/) & [Michał Majchrowicz](https://www.linkedin.com/in/micha%C5%82-majchrowicz-mwsc/) [AFINE Team](https://afine.com/) for recognizing and reporting this vulnerability.
|
[] | null | 6.1 | null | null | null |
CVE-2012-6562
|
engine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts.
|
[
"cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2020-9878
|
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-rvqc-v6vj-m9pw
|
The web container in IBM WebSphere Application Server (WAS) before 6.0.2.21, and 6.1.x before 6.1.0.9, sends response data intended for a different request in certain circumstances after a closed connection error, which might allow remote attackers to obtain sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-c49f-ghq8-6mq2
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the attach_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify cache rules.
|
[] | null | 4.3 | null | null | null |
|
CVE-2017-8915
|
sinopia, as used in SAP HANA XS 1.00 and 2.00, allows remote attackers to cause a denial of service (assertion failure and service crash) by pushing a package with a filename containing a $ (dollar sign) or % (percent) character, aka SAP Security Note 2407694.
|
[
"cpe:2.3:a:sap:hana_xs:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:hana_xs:2.00:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-j6xh-q826-55jw
|
OpenStack Compute (Nova) vulnerable to denial of service via XML Entity Expansion attack
|
The security group extension in OpenStack Compute (Nova) Grizzly 2013.1.3, Havana before havana-3, and earlier allows remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack. NOTE: this issue is due to an incomplete fix for CVE-2013-1664.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.