id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-j7h7-7c79-56qf
|
The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the wppb_toolbox_usermeta_handler function in all versions up to, and including, 3.10.7. This makes it possible for authenticated attackers, with contributor-level access and above, to expose sensitive information within user metadata.
|
[] | null | 4.3 | null | null | null |
|
GHSA-pv4x-5wmj-f287
|
The Sky Addons for Elementor (Free Templates Library, Live Copy, Animations, Post Grid, Post Carousel, Particles, Sliders, Chart) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wrapper link URL value in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2021-46988
|
userfaultfd: release page in error path to avoid BUG_ON
|
In the Linux kernel, the following vulnerability has been resolved:
userfaultfd: release page in error path to avoid BUG_ON
Consider the following sequence of events:
1. Userspace issues a UFFD ioctl, which ends up calling into
shmem_mfill_atomic_pte(). We successfully account the blocks, we
shmem_alloc_page(), but then the copy_from_user() fails. We return
-ENOENT. We don't release the page we allocated.
2. Our caller detects this error code, tries the copy_from_user() after
dropping the mmap_lock, and retries, calling back into
shmem_mfill_atomic_pte().
3. Meanwhile, let's say another process filled up the tmpfs being used.
4. So shmem_mfill_atomic_pte() fails to account blocks this time, and
immediately returns - without releasing the page.
This triggers a BUG_ON in our caller, which asserts that the page
should always be consumed, unless -ENOENT is returned.
To fix this, detect if we have such a "dangling" page when accounting
fails, and if so, release it before returning.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-9h69-wwg8-442f
|
Stored Cross Site Scripting vulnerabilities exist in ASPECT if administrator creden-tials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.
|
[] | 4.6 | 4.8 | null | null | null |
|
RHSA-2002:138
|
Red Hat Security Advisory: unzip security update
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null | null |
GHSA-9vwj-hj2h-whjq
|
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
|
[] | null | 9.8 | null | null | null |
|
PYSEC-2020-291
| null |
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor. However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors. This results in special casing during validation at model loading time. Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays. This results in both read and write gadgets, albeit very limited in scope. The issue is patched in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83), and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code.
|
[] | null | null | null | null | null |
GHSA-252x-53mm-q5hm
|
The BGP implementation in Cisco NX-OS does not properly filter AS paths, which allows remote attackers to cause a denial of service (BGP service reset and resync) via a malformed UPDATE message, aka Bug ID CSCtn13055.
|
[] | null | null | null | null | null |
|
CVE-2022-38533
|
In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.
|
[
"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
RHSA-2023:6372
|
Red Hat Security Advisory: gdb security update
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
GHSA-c2j8-jfxp-62hj
|
In telephony, there is a possible bypass of user interaction requirements due to missing permission checks. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-73136824
|
[] | null | null | null | null | null |
|
CVE-2025-22388
|
An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads.
|
[] | null | 5.7 | null | null | null |
|
CVE-2015-4153
|
Directory traversal vulnerability in the zM Ajax Login & Register plugin before 1.1.0 for WordPress allows remote attackers to include and execute arbitrary php files via a relative path in the template parameter in a load_template action to wp-admin/admin-ajax.php.
|
[
"cpe:2.3:a:zanematthew:zm_ajax_login_\\&_register:*:*:*:*:*:wordpress:*:*"
] | null | null | null | 5 | null |
|
GHSA-3548-7j56-4648
|
Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.
|
[] | null | null | null | null | null |
|
GHSA-qmmq-6cfg-qc67
|
HCL Domino is susceptible to a lockout policy bypass vulnerability in the LDAP service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the LDAP service. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.
|
[] | null | null | null | null | null |
|
GHSA-wmv6-5m97-cfc8
|
VMware AirWatch Console (AWC) contains a Broken Access Control vulnerability. Successful exploitation of this issue could result in end-user device details being disclosed to an unauthorized administrator.
|
[] | null | 4.9 | null | null | null |
|
CVE-2017-8365
|
The i2les_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
|
[
"cpe:2.3:a:libsndfile_project:libsndfile:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2012-1664
|
Multiple cross-site scripting (XSS) vulnerabilities in the admin panel in osCMax before 2.5.1 allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter in a process action to admin/login.php; (2) pageTitle, (3) current_product_id, or (4) cPath parameter to admin/new_attributes_include.php; (5) sb_id, (6) sb_key, (7) gc_id, (8) gc_key, or (9) path parameter to admin/htaccess.php; (10) title parameter to admin/information_form.php; (11) search parameter to admin/xsell.php; (12) gross or (13) max parameter to admin/stats_products_purchased.php; (14) status parameter to admin/stats_monthly_sales.php; (15) sorted parameter to admin/stats_customers.php; (16) information_id parameter to /admin/information_manager.php; or (17) zID parameter to /admin/geo_zones.php.
|
[
"cpe:2.3:a:oscmax:oscmax:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2007-6627
|
Integer overflow in the RTSP_remove_msg function in RTSP_lowlevel.c in LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an RTP packet with a size value of 0xffff.
|
[
"cpe:2.3:a:feng:feng:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-cq8v-6hvc-rjqq
|
Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.
|
[] | null | null | null | null | null |
|
CVE-2006-2498
|
Invision Power Board (IPB) before 2.1.6 allows remote attackers to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php.
|
[
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1_alpha2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1_rc1:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-cf5r-m6qv-vfqf
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | null | null | null |
|
GHSA-c7j9-vm5x-xj32
|
Autel MaxiCharger AC Elite Business C50 DLB_HostHeartBeat Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DLB_HostHeartBeat handler of the DLB protocol implementation. When parsing an AES key, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.Was ZDI-CAN-23241
|
[] | null | 8.8 | null | null | null |
|
RHSA-2024:0753
|
Red Hat Security Advisory: linux-firmware security update
|
hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null | null |
CVE-2006-2426
|
Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.
|
[
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.5.0_6:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2024-49406
|
Improper validation of integrity check value in Blockchain Keystore prior to version 1.3.16 allows local attackers to modify transaction. Root privilege is required for triggering this vulnerability.
|
[
"cpe:2.3:a:samsung:blockchain_keystore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:samsung:blockchain_keystore:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2024-5489
|
Wbcom Designs - Custom Font Uploader <= 2.3.4 - Missing Authorization to Font Deletion
|
The Wbcom Designs – Custom Font Uploader plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'cfu_delete_customfont' function in all versions up to, and including, 2.3.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete any custom font.
|
[
"cpe:2.3:a:wbcomdesigns:custom_font_uploader:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2025-23553
|
WordPress Userbase Access Control plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Cramer Userbase Access Control allows Reflected XSS. This issue affects Userbase Access Control: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
GHSA-7c2w-7jrj-xg2m
|
Reflected XSS in wordpress plugin e-search v1.0
|
[] | null | null | 6.1 | null | null |
|
CVE-2016-4073
|
Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.
|
[
"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.29:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-3f85-ch4h-849r
|
In the Linux kernel, the following vulnerability has been resolved:x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no monitorsCommit6eac36bb9eb0 ("x86/resctrl: Allocate the cleanest CLOSID by searching closid_num_dirty_rmid")added logic that causes resctrl to search for the CLOSID with the fewest dirty
cache lines when creating a new control group, if requested by the arch code.
This depends on the values read from the llc_occupancy counters. The logic is
applicable to architectures where the CLOSID effectively forms part of the
monitoring identifier and so do not allow complete freedom to choose an unused
monitoring identifier for a given CLOSID.This support missed that some platforms may not have these counters. This
causes a NULL pointer dereference when creating a new control group as the
array was not allocated by dom_data_init().As this feature isn't necessary on platforms that don't have cache occupancy
monitors, add this to the check that occurs when a new control group is
allocated.
|
[] | null | 5.5 | null | null | null |
|
CVE-2025-25685
|
An issue was discovered in GL-INet Beryl AX GL-MT3000 v4.7.0. Attackers are able to download arbitrary files from the device's file system via adding symbolic links on an external drive used as a samba share.
|
[] | null | 7.5 | null | null | null |
|
GHSA-g4f7-999c-8f35
|
Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allows attackers to crash the system easily resulting in a possible DoS attack, or possibly gain privileges. The Samsung ID is SVE-2016-7119.
|
[] | null | null | 9.8 | null | null |
|
GHSA-6h9x-74vw-438v
|
Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.
|
[] | null | null | 6.1 | null | null |
|
CVE-2025-26596
|
Xorg: xwayland: heap overflow in xkbwritekeysyms()
|
A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
|
[
"cpe:/o:redhat:enterprise_linux:10.0",
"cpe:/o:redhat:rhel_els:7",
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:8"
] | null | 7.8 | null | null | null |
RHSA-2014:1877
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
RHSA-2023:0806
|
Red Hat Security Advisory: Mozilla Firefox security update
|
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null | null |
RHSA-2003:058
|
Red Hat Security Advisory: shadow-utils security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null | null |
CVE-2024-45594
|
Decidim allows cross-site scripting (XSS) in the online or hybrid meeting embeds
|
Decidim is a participatory democracy framework. The meeting embeds feature used in the online or hybrid meetings is subject to potential XSS attack through a malformed URL. This vulnerability is fixed in 0.28.3 and 0.29.0.
|
[
"cpe:2.3:a:decidim:decidim:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
CVE-2022-21753
|
In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06493873; Issue ID: ALPS06493899.
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
GHSA-fhmf-2c4w-wccg
|
An Improper Input Validation vulnerability exists in Pro-Face GP-Pro EX v4.08 and previous versions which could cause the execution arbitrary executable when GP-Pro EX is launched.
|
[] | null | null | 8.8 | null | null |
|
ICSA-22-223-04
|
Emerson ROC800, ROC800L and DL8000
|
The affected product uses the ROC protocol for communications, which could allow an attacker to read, write and delete file or folder operations.CVE-2022-30264 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 6.3 | null | null |
CVE-2021-3037
|
PAN-OS: Secrets for scheduled configuration exports are logged in system logs
|
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
|
[
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
] | null | 2.3 | null | null | null |
CVE-2024-23111
|
An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions reboot page may allow a remote privileged attacker with super-admin access to execute JavaScript code via crafted HTTP GET requests.
|
[
"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null | null |
|
CVE-2018-11639
|
Plaintext Storage of Passwords within Cookies in /var/www/xms/application/controllers/verifyLogin.php in the administrative console in Dialogic PowerMedia XMS before 3.5 SU2 allows remote attackers to access a user's password in cleartext.
|
[
"cpe:2.3:a:dialogic:powermedia_xms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dialogic:powermedia_xms:3.5:su1:*:*:*:*:*:*"
] | null | null | 8.1 | 4.3 | null |
|
GHSA-g4ww-5v49-gv5x
|
Cross-site scripting (XSS) vulnerability in login.cgi in D-Link router DIR-655 (rev Bx) with firmware before 2.12b01 allows remote attackers to inject arbitrary web script or HTML via the html_response_page parameter.
|
[] | null | null | null | null | null |
|
CVE-2021-3531
|
A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
|
[
"cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-3wqw-8x5p-vv88
|
Microsoft WS-Discovery Denial of Service Vulnerability
|
[] | null | 7.5 | null | null | null |
|
cisco-sa-asaftd-xss-webui-gQLSFyPM
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerability
|
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773"].
|
[] | null | 6.1 | null | null | null |
CVE-2024-41878
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.19 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to inject and execute arbitrary JavaScript code within the context of the user's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2022-3477
|
tagDiv Composer < 3.5 - Unauthenticated Account Takeover
|
The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address
|
[
"cpe:2.3:a:newsmag_project:newsmag:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:newspaper_project:newspaper:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:tagdiv_composer_project:tagdiv_composer:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
GHSA-6p8w-pc35-mqv8
|
[clickstorm] SEO (cs_seo) TYPO3 extension Cross-site Scripting (XSS) vulnerability
|
Cross-site scripting (XSS) vulnerability in the [clickstorm] SEO (cs_seo) TYPO3 extension allows backend users to execute arbitrary script via the JSON-LD output.
|
[] | null | 5.5 | null | null | null |
GHSA-j35m-x776-7v62
|
LINE for Windows before 4.8.3 allows man-in-the-middle attackers to execute arbitrary code.
|
[] | null | null | 8.1 | null | null |
|
GHSA-xc95-rpw4-jf66
|
The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to SQL Injection via the 'orderBy' parameter in all versions up to, and including, 1.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 6.5 | null | null | null |
|
GHSA-pfqr-532x-cjjm
|
Use after free in Tab Strip in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.
|
[] | null | 8.8 | null | null | null |
|
RHSA-2022:6838
|
Red Hat Security Advisory: expat security update
|
expat: a use-after-free in the doContent function in xmlparse.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.1 | null | null | null |
GHSA-qhg7-hg3p-3hfq
|
A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
|
[] | null | 9.8 | null | null | null |
|
CVE-2016-8478
|
An information disclosure vulnerability in the Qualcomm video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32511270. References: QC-CR#1088206.
|
[
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
] | null | null | 4.7 | 2.6 | null |
|
GHSA-mf7m-rm6j-7h8r
|
A vulnerability was found in uTorrent. It has been rated as critical. Affected by this issue is some unknown functionality of the component JSON RPC Server. The manipulation leads to privilege escalation. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
|
[] | null | 8.8 | null | null | null |
|
GHSA-cwrc-37vg-jwr8
|
SQL injection vulnerability in sendcard.php in Sendcard 3.2.3 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
CVE-2007-4217
|
Stack-based buffer overflow in the domacro function in ftp in IBM AIX 5.2 and 5.3 allows local users to gain privileges via a long parameter to a macro, as demonstrated by executing a macro via the '$' command.
|
[
"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
RHSA-2011:0881
|
Red Hat Security Advisory: Red Hat Network Proxy server jabberd security update
|
jabberd: DoS via the XML "billion laughs attack"
|
[
"cpe:/a:redhat:network_proxy:5.4::el5"
] | null | null | null | null | null |
GHSA-49gm-5685-8fxv
|
Liferay Portal and Liferay DXP Vulnerable to XSS via the OAuth2ProviderApplicationRedirect Class
|
Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class before 4.0.51 from Liferay Portal (7.4.3.41 through 7.4.3.89), and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.
|
[] | null | 9.6 | null | null | null |
CVE-1999-1026
|
aspppd on Solaris 2.5 x86 allows local users to modify arbitrary files and gain root privileges via a symlink attack on the /tmp/.asppp.fifo file.
|
[
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-6qw7-m8v3-2wm6
|
The NextGenUpdate (aka com.tapatalk.nextgenupdatecomforums) application 3.1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
ICSA-25-226-02
|
Siemens COMOS
|
Out-of-bounds Write vulnerability was discovered in Open Design Alliance Drawings SDK before 2025.10. Reading crafted DWF file and missing proper checks on received SectionIterator data can trigger an unhandled exception. This can allow attackers to cause a crash, potentially enabling a denial-of-service attack (Crash, Exit, or Restart) or possible code execution.
|
[] | null | 8.2 | null | null | null |
CVE-2018-0595
|
Untrusted search path vulnerability in the installer of Skype for Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:microsoft:skype:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2008-6742
|
Foxy P2P software allows remote attackers to cause a denial of service (memory consumption) via a foxy URI with a download action and a large fs value.
|
[
"cpe:2.3:a:gofoxy:foxy:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-x46h-g6vh-9qm7
|
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain
full access to the device.
|
[] | null | 9 | null | null | null |
|
CVE-2023-6166
|
Quiz Maker < 6.4.9.5 - Reflected Cross-Site Scripting
|
The Quiz Maker WordPress plugin before 6.4.9.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting
|
[
"cpe:2.3:a:ays-pro:quiz_maker:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-p7j7-fgpw-pm2x
|
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
|
[] | null | null | 5.5 | null | null |
|
RHSA-2018:0577
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.9 security update
|
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
|
[
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 8.1 | null | null |
CVE-2022-41115
|
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability
|
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
GHSA-5mgx-r2w8-pf82
|
Multiple SQL injection vulnerabilities in index.php in FamilyProject 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the logmbr parameter (aka login field) or (2) the mdpmbr parameter (aka pass or "Mot de passe" field). NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2008-6238
|
Cross-site scripting (XSS) vulnerability in archive/savedqueries/savequeryfinish.html in OpenEdit Digital Asset Management (DAM) before 5.2014 allows remote attackers to inject arbitrary web script or HTML via the name parameter.
|
[
"cpe:2.3:a:openedit:openedit_digital_asset_management:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-wcf9-3wr2-8wmf
|
An incomplete-cleanup vulnerability in the Office rendering engine of Gotenberg through 6.2.1 allows an attacker to overwrite LibreOffice configuration files and execute arbitrary code via macros.
|
[] | null | null | null | null | null |
|
CVE-2023-26987
|
An issue discovered in Konga 0.14.9 allows remote attackers to manipulate user accounts regardless of privilege via crafted POST request.
|
[
"cpe:2.3:a:konga_project:konga:0.14.9:-:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2018-20497
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.4.13, 11.5.x before 11.5.6, and 11.6.x before 11.6.1. It allows SSRF.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5 | null | 4 | null |
|
CVE-2023-45772
|
WordPress Proofreading Plugin <= 1.0.11 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Scribit Proofreading plugin <= 1.0.11 versions.
|
[
"cpe:2.3:a:scribit:proofreading:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
CVE-2011-3538
|
Unspecified vulnerability in the Sun Ray component in Oracle Virtualization 4.0 allows remote attackers to affect integrity, related to Authentication. NOTE: this identifier was inadvertently used for an Oracle Industry Applications issue involving TMS Help, but that issue has been assigned CVE-2011-2323.
|
[
"cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-7qmp-3hh8-g4vw
|
In parisneo/lollms-webui version v9.8, the lollms_binding_infos is missing the client_id parameter, which leads to multiple security vulnerabilities. Specifically, the endpoints /reload_binding, /install_binding, /reinstall_binding, /unInstall_binding, /set_active_binding_settings, and /update_binding_settings are susceptible to CSRF attacks and local attacks. An attacker can exploit this vulnerability to perform unauthorized actions on the victim's machine.
|
[] | null | null | 4.4 | null | null |
|
GHSA-q2fm-hcj9-g269
|
Microsoft NetMeeting 3.01 2000 before SP4 allows remote attackers to cause a denial of service (shutdown of NetMeeting conference) via malformed packets, as demonstrated via the chat conversation.
|
[] | null | null | null | null | null |
|
CVE-2011-3536
|
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect availability, related to DTrace Software Library (libdtrace).
|
[
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2022-41158
|
eyoom builder Remote Code Execution Vulnerability
|
Remote code execution vulnerability can be achieved by using cookie values as paths to a file by this builder program. A remote attacker could exploit the vulnerability to execute or inject malicious code.
|
[
"cpe:2.3:a:eyoom:eyoom_builder:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2007-6089
|
PHP remote file inclusion vulnerability in index.php in meBiblio 0.4.5 allows remote attackers to execute arbitrary PHP code via a URL in the action parameter.
|
[
"cpe:2.3:a:mebiblio:mebiblio:0.4.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-48x4-xr25-pcvw
|
In the Linux kernel, the following vulnerability has been resolved:acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctlFix an issue detected by syzbot with KASAN:BUG: KASAN: vmalloc-out-of-bounds in cmd_to_func drivers/acpi/nfit/
core.c:416 [inline]
BUG: KASAN: vmalloc-out-of-bounds in acpi_nfit_ctl+0x20e8/0x24a0
drivers/acpi/nfit/core.c:459The issue occurs in cmd_to_func when the call_pkg->nd_reserved2
array is accessed without verifying that call_pkg points to a buffer
that is appropriately sized as a struct nd_cmd_pkg. This can lead
to out-of-bounds access and undefined behavior if the buffer does not
have sufficient space.To address this, a check was added in acpi_nfit_ctl() to ensure that
buf is not NULL and that buf_len is less than sizeof(*call_pkg)
before accessing it. This ensures safe access to the members of
call_pkg, including the nd_reserved2 array.
|
[] | null | 7.1 | null | null | null |
|
CVE-2021-39975
|
Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2020-14112
|
Information Leak Vulnerability exists in the Xiaomi Router AX6000. The vulnerability is caused by incorrect routing configuration. Attackers can exploit this vulnerability to download part of the files in Xiaomi Router AX6000.
|
[
"cpe:2.3:o:mi:ax6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mi:ax6000:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2025-8123
|
deerwms deer-wms-2 edit sql injection
|
A vulnerability was found in deerwms deer-wms-2 up to 3.3. It has been classified as critical. Affected is an unknown function of the file /system/dept/edit. The manipulation of the argument ancestors leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2013-4498
|
The Spaces OG submodule in the Spaces module 6.x-3.x before 6.x-3.7 for Drupal does not properly delete organic group group spaces content when using the option to move to a new group, which causes the content to be "orphaned" and allows remote authenticated users with the "access content" permission to obtain sensitive information via vectors involving a rebuild access for the site or content.
|
[
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:florian_weber:spaces:6.x-3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2017-18525
|
The megamenu plugin before 2.4 for WordPress has XSS.
|
[
"cpe:2.3:a:megamenu:max_mega_menu:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-8v63-cqqc-6r2c
|
Prototype Pollution in object-path
|
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). The `del()` function fails to validate which Object properties it deletes. This allows attackers to modify the prototype of Object, causing the modification of default properties like `toString` on all objects.
|
[] | null | null | 7.5 | null | null |
CVE-2021-3035
|
Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution
|
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted.
|
[
"cpe:2.3:a:paloaltonetworks:bridgecrew_checkov:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
GHSA-x7ph-vwqf-8prr
|
Multiple cross-site scripting (XSS) vulnerabilities in SmarterTools SmarterStats 6.2.4100 allow remote attackers to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by Default.aspx and certain other files.
|
[] | null | null | null | null | null |
|
CVE-2009-4557
|
Cross-site scripting (XSS) vulnerability in the Image Assist module 5.x-1.x before 5.x-1.8, 5.x-2.x before 2.0-alpha4, 6.x-1.x before 6.x-1.1, 6.x-2.x before 2.0-alpha4, and 6.x-3.x-dev before 2009-07-15, a module for Drupal, allows remote authenticated users, with image-node creation privileges, to inject arbitrary web script or HTML via a node title.
|
[
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-2.0-alpha1:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-2.0-alpha3:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-2.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:5.x-3.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:6.x-1.0-beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:6.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:6.x-2.0-alpha2:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:6.x-2.0-alpha3:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:6.x-2.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:unleashedmind:img_assist:6.x-3.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2011-1114
|
Google Chrome before 9.0.597.107 does not properly handle tables, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node."
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-9p9v-6p34-p6gj
|
Grupo Embras GEOSIAP ERP v2.2.167.02 was discovered to contain a SQL injection vulnerability via the codLogin parameter on the login page.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-30292
|
ColdFusion | Cross-site Scripting (Reflected XSS) (CWE-79)
|
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[] | null | 6.1 | null | null | null |
RHSA-2024:3668
|
Red Hat Security Advisory: ruby:3.1 security, bug fix, and enhancement update
|
ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.6 | null | null | null |
CVE-2025-27914
|
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A Reflected Cross-Site Scripting (XSS) vulnerability exists in the /h/rest endpoint, allowing authenticated attackers to inject and execute arbitrary JavaScript in a victim's session. Exploitation requires a valid auth token and involves a crafted URL with manipulated query parameters that triggers XSS when accessed by a victim.
|
[] | null | 5.4 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.