id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-mpj3-4vv5-g8qc
Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, PerformanceBridge Focal Point Version A.01, IntelliVue patient monitors MX100, MX400-MX850, and MP2-MP90 Versions N and prior, IntelliVue X3 and X2 Versions N and prior. The software parses a formatted message or structure but does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data, causing the application on the surveillance station to restart.
[]
null
6.5
null
null
null
GHSA-vx9h-7frf-374v
A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software trusts a certificate issued by an entity that isn't authorized to issue certificates. This occurs when the "Basic Constraints" extension in the certificate indicates that it is meant to be an "End Entity”. This flaw could allow an attacker to perform a Man-in-the-Middle (MITM) attack, intercepting and potentially altering communications between the user and the website.
[]
8.6
7.4
null
null
null
CVE-2021-24404
WP-Board <= 1.1 (beta) - Unauthenticated SQL Injection
The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.
[ "cpe:2.3:a:wp-board_project:wp-board:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
6.5
null
CVE-2020-16102
Improper Authentication vulnerability in Gallagher Command Centre Server allows an unauthenticated remote attacker to create items with invalid configuration, potentially causing the server to crash and fail to restart. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1299(MR2); 8.20 versions prior to 8.20.1218(MR4); 8.10 versions prior to 8.10.1253(MR6); 8.00 versions prior to 8.00.1252(MR7); version 7.90 and prior versions.
[ "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.00.1252:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.00.1252:maintenance_release7:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.10.1253:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.10.1253:maintenance_release6:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.20.1218:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.20.1218:maintenance_release4:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.30.1299:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.30.1299:maintenance_release2:*:*:*:*:*:*" ]
null
7.1
null
null
null
CVE-2006-2730
PHP remote file inclusion vulnerability in admin/lib_action_step.php in Hot Open Tickets (HOT) 11012004_ver2f, when register_globals is enabled, allows remote attackers to include arbitrary files via the GLOBALS[CLASS_PATH] parameter. NOTE: this issue might be resultant from a global overwrite vulnerability.
[ "cpe:2.3:a:hot_open_tickets:hot_open_tickets:2f_2004-11-01:*:*:*:*:*:*:*" ]
null
null
null
5.1
null
GHSA-j65j-7f2j-mh39
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the entrys parameter from fromAddressNat function.
[]
null
8
null
null
null
GHSA-9q39-8jrg-38mq
A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been rated as critical. This issue affects some unknown processing of the file view_employee.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271457 was assigned to this vulnerability.
[]
5.3
6.3
null
null
null
GHSA-2w2m-vwp5-22c5
A Buffer Overflow and Information Disclosure issue exists in HP OfficeJet Pro Printers before 001.1937C, and HP PageWide Managed Printers and HP PageWide Pro Printers before 001.1937D exists; A maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
[]
null
null
null
null
null
GHSA-cxfc-q5xx-wr6x
Ultrafunk Popcorn 1.20 allows remote attackers to cause a denial of service (crash) via a malformed Date field that is converted into a year greater than 2037.
[]
null
null
null
null
null
CVE-2013-1527
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote authenticated users to affect confidentiality via unknown vectors related to Report Distribution.
[ "cpe:2.3:a:oracle:peoplesoft_products:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2013-2162
Race condition in the post-installation script (mysql-server-5.5.postinst) for MySQL Server 5.5 for Debian GNU/Linux and Ubuntu Linux creates a configuration file with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as credentials.
[ "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" ]
null
null
null
1.9
null
GHSA-6hxv-6w4p-6pv3
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5 allows remote attackers to inject arbitrary web script or HTML via the reportType parameter to an unspecified component.
[]
null
null
null
null
null
GHSA-7p87-3v89-xjw3
Multiple SQL injection vulnerabilities in eNdonesia 8.4 allow remote attackers to execute arbitrary SQL commands via the (1) artid parameter to mod.php in a viewarticle action (publisher mod) and the (2) bid parameter to banners.php in a click action. NOTE: the mod.php viewdisk and viewlink vectors are already covered by CVE-2006-6873.
[]
null
null
null
null
null
CVE-2015-3111
Heap-based buffer overflow in Adobe Photoshop CC before 16.0 (aka 2015.0.0) and Adobe Bridge CC before 6.11 allows attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-wcvw-xvmj-6fw7
RG-EW1200G PRO Wireless Routers EW_3.0(1)B11P204, RG-EW1800GX PRO Wireless Routers EW_3.0(1)B11P204, and RG-EW3200GX PRO Wireless Routers EW_3.0(1)B11P204 were discovered to contain multiple command injection vulnerabilities via the data.ip, data.protocal, data.iface and data.package parameters in the runPackDiagnose function of diagnose.lua.
[]
null
8.8
null
null
null
GHSA-cxjg-wpgh-jhh5
SQL injection vulnerability found in PrestaShop themevolty v.4.0.8 and before allow a remote attacker to gain privileges via the tvcmsblog, tvcmsvideotab, tvcmswishlist, tvcmsbrandlist, tvcmscategorychainslider, tvcmscategoryproduct, tvcmscategoryslider, tvcmspaymenticon, tvcmstestimonial components.
[]
null
9.8
null
null
null
CVE-2008-1376
A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrappers support, which might allow remote attackers to bypass intended access restrictions.
[ "cpe:2.3:o:redhat:enterprise_linux:5.0:*:client:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "cpe:2.3:a:redhat:nfs_utils:1.0.9:35z.el5_2:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-33rm-jrgq-qgx9
In Progress MOVEit Transfer before 2021.0 (13.0), a SQL injection vulnerability has been found in the MOVEit Transfer web app that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or destroy database elements. This is in MOVEit.DMZ.WebApp in SILHuman.vb.
[]
null
null
null
null
null
CVE-2022-22785
Improperly constrained session cookies in Zoom Client for Meetings
The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.
[ "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*" ]
null
5.9
null
null
null
GHSA-x834-53jc-rjr9
Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.
[]
null
6.7
null
null
null
CVE-2020-10495
CSRF in admin/edit-template.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit an article template, given the id, via a crafted request.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
CVE-2025-52789
WordPress Lewe ChordPress plugin <= 3.9.7 - Cross Site Request Forgery (CSRF) to Stored XSS Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in George Lewe Lewe ChordPress allows Stored XSS. This issue affects Lewe ChordPress: from n/a through 3.9.7.
[]
null
7.1
null
null
null
GHSA-68c3-2f9v-prp3
Pointer corruption in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unauthenticated remote user to potentially execute arbitrary WebGL code via local access.
[]
null
null
7.8
null
null
CVE-2023-0943
SourceCodester Best POS Management System Image save_settings unrestricted upload
A vulnerability, which was classified as problematic, has been found in SourceCodester Best POS Management System 1.0. This issue affects the function save_settings of the file index.php?page=site_settings of the component Image Handler. The manipulation of the argument img with the input ../../shell.php leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221591.
[ "cpe:2.3:a:best_pos_management_system_project:best_pos_management_system:1.0:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
null
CVE-2021-0646
In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process's SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2023-40663
WordPress WP VR Plugin <= 8.3.4 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rextheme WP VR plugin <= 8.3.4 versions.
[ "cpe:2.3:a:rextheme:wp_vr:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
CVE-2013-3372
Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 allows remote attackers to inject multiple Content-Disposition HTTP headers and possibly conduct cross-site scripting (XSS) attacks via unspecified vectors.
[ "cpe:2.3:a:bestpractical:rt:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.8:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.0:preflight1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:preflight0:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.1:rc5:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.11:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.13:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.13:rc2:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.14:rc1:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.15:*:*:*:*:*:*:*", "cpe:2.3:a:bestpractical:rt:3.8.16:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-34446
iTop XSS vulnerability on pages/preferences.php
iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, when displaying `pages/preferences.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.
[ "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", "cpe:2.3:a:combodo:itop:3.0.3:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-43412
Xibo CMS XSS vulnerability when previewing files uploaded to the library containing HTML/JS
Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute arbitrary JavaScript via the file preview function. Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser. This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality. This behavior has been changed in 4.1.0 to preview previewing of generic files. There are no workarounds for this issue.
[ "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
null
CVE-2017-9970
A remote code execution vulnerability exists in Schneider Electric's StruxureOn Gateway versions 1.1.3 and prior. Uploading a zip which contains carefully crafted metadata allows for the file to be uploaded to any directory on the host machine information which could lead to remote code execution.
[ "cpe:2.3:a:schneider-electric:struxureon_gateway:*:*:*:*:*:*:*:*" ]
null
null
7.2
9
null
CVE-2019-18259
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.
[ "cpe:2.3:o:omron:plc_cj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:omron:plc_cs_firmware:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2007-2443
Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
[ "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" ]
null
null
null
8.3
null
CVE-2025-28242
Improper session management in the /login_ok.htm endpoint of DAEnetIP4 METO v1.25 allows attackers to execute a session hijacking attack.
[]
null
9.8
null
null
null
CVE-2008-5914
An unspecified function in the JavaScript implementation in Apple Safari creates and exposes a "temporary footprint" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an "in-session phishing attack." NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
RHSA-2023:0450
Red Hat Security Advisory: OpenShift Container Platform 4.12.1 security update
aws-efs-utils: Race condition during concurrent TLS mounts in efs-utils and aws-efs-csi-driver
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
5.6
null
null
null
GHSA-882p-jqgm-f45g
Uncontrolled resource consumption in nokogiri
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
[]
null
null
6.5
null
null
GHSA-wp6c-p3vm-q9jm
An insecurity temporary file vulnerability exists in RHQ Mongo DB Drift Server through 2013-09-25 when unpacking zipped files.
[]
null
7.1
null
null
null
GHSA-67fv-9r7g-432h
Rhai stack overflow vulenrability
A stack overflow vulnerability was found in version 1.18.0 of rhai. The flaw position is: (/ SRC/rhai/SRC/eval/STMT. Rs in rhai: : eval: : STMT: : _ $LT $impl $u20 $rhai.. engine.. Engine$GT$::eval_stmt::h3f1d68ce37fc6e96). Due to the stack overflow is a recursive call/SRC/rhai/SRC/eval/STMT. Rs file eval_stmt_block function.
[]
8.7
7.5
null
null
null
GHSA-m7q8-8fgq-qmc2
Directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
[]
null
null
null
null
null
CVE-2015-6606
The Secure Element Evaluation Kit (aka SEEK or SmartCard API) plugin in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22301786.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2023-1539
Improper Restriction of Excessive Authentication Attempts in answerdev/answer
Improper Restriction of Excessive Authentication Attempts in GitHub repository answerdev/answer prior to 1.0.6.
[ "cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
CVE-2021-22479
The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
null
CVE-2021-41872
Skyworth Digital Technology Penguin Aurora Box 41502 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
[ "cpe:2.3:o:skyworthdigital:penguin_aurora_box_41502_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:skyworthdigital:penguin_aurora_box_41502:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-qm4q-xhjm-67jr
Microsoft Outlook Remote Code Execution Vulnerability
[]
null
8
null
null
null
GHSA-j49g-wx52-cq2p
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PickPlugins Wishlist allows SQL Injection. This issue affects Wishlist: from n/a through 1.0.43.
[]
null
8.5
null
null
null
GHSA-hm57-4qpx-f734
Credentials transmitted in plain text by Jenkins DeployHub Plugin
DeployHub Plugin stores credentials in job `config.xml` files as part of its configuration.While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by DeployHub Plugin 8.0.14 and earlier. These credentials could be viewed by users with Extended Read permission.
[]
null
3.1
null
null
null
CVE-2023-3898
SQLi in mAyaNets E-Commerce Software
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mAyaNet E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: before 1.1.
[ "cpe:2.3:a:mayanets:e-commerce:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2022-21805
Reflected cross-site scripting vulnerability in the attached file name of php_mailform versions prior to Version 1.40 allows a remote unauthenticated attacker to inject an arbitrary script via unspecified vectors.
[ "cpe:2.3:a:econosys-system:php_mailform:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-h498-88jq-wh8m
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access information about a user's contacts.
[]
null
3.3
null
null
null
CVE-2022-39351
Dependency-Track vulnerable to logging of API keys in clear text when handling API requests using keys with insufficient permissions
Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.6.0, performing an API request using a valid API key with insufficient permissions causes the API key to be written to Dependency-Track's audit log in clear text. Actors with access to the audit log can exploit this flaw to gain access to valid API keys. The issue has been fixed in Dependency-Track 4.6.0. Instead of logging the entire API key, only the last 4 characters of the key will be logged. It is strongly recommended to check historic logs for occurrences of this behavior, and re-generating API keys in case of leakage.
[ "cpe:2.3:a:owasp:dependency-track:*:*:*:*:*:*:*:*" ]
null
4.4
null
null
null
CVE-2017-7023
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
GHSA-jxq3-2hwh-v5qg
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
[]
null
7.2
null
null
null
GHSA-j5xq-963p-r9mj
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, on TZ cold boot the CNOC_QDSS RG0 locked by xBL_SEC is cleared by TZ.
[]
null
null
9.8
null
null
GHSA-5hf4-4qjp-q973
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
null
null
null
CVE-2024-35898
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() nft_unregister_flowtable_type() within nf_flow_inet_module_exit() can concurrent with __nft_flowtable_type_get() within nf_tables_newflowtable(). And thhere is not any protection when iterate over nf_tables_flowtables list in __nft_flowtable_type_get(). Therefore, there is pertential data-race of nf_tables_flowtables list entry. Use list_for_each_entry_rcu() to iterate over nf_tables_flowtables list in __nft_flowtable_type_get(), and use rcu_read_lock() in the caller nft_flowtable_type_get() to protect the entire type query process.
[]
null
5.5
null
null
null
GHSA-w3m7-pqwv-79w9
Unspecified vulnerability in GlobalSCAPE Secure FTP Server before 3.1.4 Build 01.10.2006 allows attackers to cause a denial of service (application crash) via a "custom command" with a long argument.
[]
null
null
null
null
null
CVE-2025-32870
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetTraces' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
[]
8.7
8.8
null
null
null
CVE-2021-22710
A CWE-119:Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Interactive Graphical SCADA System (IGSS) Definition (Def.exe) V15.0.0.21041 and prior, which could cause remote code execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition.
[ "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
GHSA-vgvv-hj3p-69r2
An issue was discovered in Aviatrix Controller before R5.3.1151. Encrypted key values are stored in a readable file.
[]
null
null
null
null
null
CVE-2024-48270
An issue in the component /logins of oasys v1.1 allows attackers to access sensitive information via a burst attack.
[ "cpe:2.3:a:misstt123:oasys:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-28110
Go SDK for CloudEvents's use of WithRoundTripper to create a Client leaks credentials
Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue.
[ "cpe:2.3:a:cloudevents:sdk_go:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2024-2673
Campcodes Online Job Finder System login.php sql injection
A vulnerability classified as critical has been found in Campcodes Online Job Finder System 1.0. This affects an unknown part of the file /admin/login.php. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257373 was assigned to this vulnerability.
[ "cpe:2.3:a:campcodes:online_job_finder_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
CVE-2023-0067
Timed Content < 2.73 - Contributor+ Stored XSS
The Timed Content WordPress plugin before 2.73 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[ "cpe:2.3:a:timed_content_project:timed_content:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-x4xp-x564-qcw8
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. Affected by this issue is the function mysqli_query of the file sexit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-238154 is the identifier assigned to this vulnerability.
[]
null
null
6.3
null
null
CVE-2025-54129
HAXiam allows for User Enumeration
HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5.
[]
null
4.3
null
null
null
RHSA-2025:1875
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.9
dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling
[ "cpe:/a:redhat:service_mesh:2.5::el8" ]
null
4.5
null
null
null
GHSA-p74p-fmvr-r6wf
The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the broken preg_replace expression in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2023-3584
Member can create team with team override scheme
Mattermost fails to properly check the authorization of POST /api/v4/teams when passing a team override scheme ID in the request, allowing an authenticated attacker with knowledge of a Team Override Scheme ID to create a new team with said team override scheme.
[ "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
null
CVE-2024-11210
EyouCMS FilemanagerLogic.php editFile path traversal
A vulnerability was found in EyouCMS 1.51. It has been rated as critical. This issue affects the function editFile of the file application/admin/logic/FilemanagerLogic.php. The manipulation of the argument activepath leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:eyoucms:eyoucms:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:eyoucms:eyoucms:1.5.1:*:*:*:*:*:*:*" ]
5.3
5.4
5.4
5.5
null
CVE-2025-3994
TOTOLINK N150RT IP Port Filtering home.htm cross site scripting
A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been classified as problematic. Affected is an unknown function of the file /home.htm of the component IP Port Filtering. The manipulation of the argument Comment leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
4.8
2.4
2.4
3.3
null
GHSA-3p2f-6gxq-2j9p
Microsoft Windows 10 1511, Windows 10 1607, and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0215, CVE-2017-0218, and CVE-2017-0219.
[]
null
null
5.3
null
null
CVE-2025-38302
block: don't use submit_bio_noacct_nocheck in blk_zone_wplug_bio_work
In the Linux kernel, the following vulnerability has been resolved: block: don't use submit_bio_noacct_nocheck in blk_zone_wplug_bio_work Bios queued up in the zone write plug have already gone through all all preparation in the submit_bio path, including the freeze protection. Submitting them through submit_bio_noacct_nocheck duplicates the work and can can cause deadlocks when freezing a queue with pending bio write plugs. Go straight to ->submit_bio or blk_mq_submit_bio to bypass the superfluous extra freeze protection and checks.
[]
null
null
null
null
null
CVE-2022-47648
An Improper Access Control vulnerability allows an attacker to access the control panel of the B420 without requiring any sort of authorization or authentication due to the IP based authorization. If an authorized user has accessed a publicly available B420 product using valid credentials, an insider attacker can gain access to the same panel without requiring any sort of authorization. The B420 module was already obsolete at the time this vulnerability was found (The End of Life announcement was made in 2013).
[ "cpe:2.3:o:bosch:b420_firmware:02.02.0001:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:b420:-:*:*:*:*:*:*:*" ]
null
7.6
null
null
null
GHSA-3749-62f5-h6xh
Missing Authorization vulnerability in Fatcat Apps Landing Page Cat.This issue affects Landing Page Cat: from n/a through 1.7.4.
[]
null
5.4
null
null
null
GHSA-m2h9-c2v8-hj79
Mikrotik RouterOs before 6.44.6 (long-term tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/cerm process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
[]
null
6.5
null
null
null
CVE-2006-4580
register.php in The Address Book 1.04e allows remote attackers to bypass the "Allow User Self-Registration" setting and create arbitrary users by setting the mode parameter to "confirm".
[ "cpe:2.3:a:the_address_book:the_address_book:1.04e:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-2mff-f6qm-822q
A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for UBI_IOCATT, because kobj->name is not released.
[]
null
5.5
null
null
null
GHSA-j49f-932x-4prx
Netscape Navigator 7.1 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
[]
null
null
null
null
null
GHSA-f2gv-fw5f-xgjx
The Server Service (SRV.SYS driver) in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 up to SP1, and other products, allows remote attackers to obtain sensitive information via crafted requests that leak information in SMB buffers, which are not properly initialized, aka "SMB Information Disclosure Vulnerability."
[]
null
null
null
null
null
CVE-2016-0542
Unspecified vulnerability in the Oracle Field Service component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via unknown vectors related to Field Service Map.
[ "cpe:2.3:a:oracle:field_service:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:field_service:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:field_service:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:field_service:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:field_service:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:field_service:12.2.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2018:0521
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
null
GHSA-7mmm-q9r4-mm4v
Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
[]
null
null
null
null
null
RHSA-2023:5731
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
null
GHSA-ww5v-8cqx-53r8
NVIDIA GPU Display Driver for Windows contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll), where an unauthorized attacker on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution to cause denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components.
[]
null
8.5
null
null
null
CVE-2017-9306
inc/SP/Html/Html.class.php in sysPass 2.1.9 allows remote attackers to bypass the XSS filter, as demonstrated by use of an "<svg/onload=" substring instead of an "<svg onload=" substring.
[ "cpe:2.3:a:syspass:syspass:2.1.9:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2024-5245
NETGEAR ProSAFE Network Management System Default Credentials Local Privilege Escalation Vulnerability
NETGEAR ProSAFE Network Management System Default Credentials Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. The issue results from the use of default MySQL credentials. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22755.
[ "cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.34:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2010-0391
Multiple stack-based buffer overflows in Embarcadero Technologies InterBase SMP 2009 9.0.3.437 allow remote attackers to execute arbitrary code via unknown vectors involving crafted packets. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:embarcadero:interbase_smp_2009:9.0.3.437:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-43274
A privacy issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.6. A sandboxed process may be able to circumvent sandbox restrictions.
[]
null
4.4
null
null
null
RHSA-2013:1850
Red Hat Security Advisory: openjpeg security update
openjpeg: multiple denial of service flaws openjpeg: heap-based buffer overflows openjpeg: out-of-bounds memory read flaws openjpeg: heap-based buffer overflows in version 1.3
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
null
CVE-2020-8638
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
[ "cpe:2.3:a:testlink:testlink:1.9.20:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-5rp3-9frh-m3wx
A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.
[]
null
6.7
null
null
null
GHSA-w94h-9p28-g2v3
Tenda AC6 V15.03.06.23_multi is vulnerable to Buffer Overflow in the formSetCfm function.
[]
null
7.5
null
null
null
GHSA-hjvr-v7mw-6f2j
Server-Side Request Forgery vulnerability in SLims version 9.6.0. This vulnerability could allow an authenticated attacker to send requests to internal services or upload the contents of relevant files via the "scrape_image.php" file in the imageURL parameter.
[]
null
9.9
null
null
null
GHSA-w42f-mvfv-2f9r
Ananta Gazelle 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/template.php and certain other files.
[]
null
null
null
null
null
GHSA-fhx9-p329-4x23
The iframe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `iframe` shortcode in versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permission and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This was partially patched in version 4.6 and fully patched in version 4.7.
[]
null
6.4
null
null
null
GHSA-g826-ww3p-93hh
Stack-based buffer overflow in the reader in CoolPDF 3.0.2.256 allows remote attackers to execute arbitrary code via a PDF document with a crafted stream.
[]
null
null
null
null
null
GHSA-282v-8gf3-6m78
Cross-site request forgery (CSRF) vulnerability in phpMyAdmin 2.7.0 allows remote attackers to perform unauthorized actions as a logged-in user via a link or IMG tag to server_privileges.php, as demonstrated using the dbname and checkprivs parameters. NOTE: the provenance of this issue is unknown, although third parties imply that it is related to the disclosure of CVE-2005-4349, which was labeled as SQL injection but disputed.
[]
null
null
null
null
null
CVE-2024-22080
An issue was discovered in Elspec G5 digital fault recorder versions 1.1.4.15 and before. Unauthenticated memory corruption can occur during XML body parsing.
[ "cpe:2.3:a:elspec:g5_digital_fault_recorder:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-68jf-xfpm-34w7
In the Linux kernel, the following vulnerability has been resolved:crypto: qat - add param check for DHReject requests with a source buffer that is bigger than the size of the key. This is to prevent a possible integer underflow that might happen when copying the source scatterlist into a linear buffer.
[]
null
5.5
null
null
null
GHSA-6g5w-7qx6-q4pr
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
[]
null
null
null
null
null