id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-3pmm-gf6j-2r75
|
A vulnerability has been found in Sayski ForestBlog up to 20250321 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /search. The manipulation of the argument keywords leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 3.5 | null | null | null |
|
CVE-2018-6166
|
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-m99j-42qj-56rq
|
include.php in Shoutpro 1.0 might allow remote attackers to bypass IP ban restrictions via a URL in the path parameter that points to an alternate bannedips.php file. NOTE: this issue was originally reported as remote file inclusion, but CVE analysis suggests that this cannot be used for code execution.
|
[] | null | null | null | null | null |
|
CVE-2024-44243
|
A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.2. An app may be able to modify protected parts of the file system.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2020-10416
|
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/kb-backup.php by adding a question mark (?) followed by the payload.
|
[
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
CVE-2015-2620
|
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-rrrr-5gqp-f52r
|
Unspecified vulnerability in the PropFilePasswordEncoder utility in the Security component in IBM WebSphere Application Server (WAS) 5.1 before 5.1.1.19 has unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-2rvp-xx6f-mxq8
|
On BIG-IP 11.5.1-11.6.4, iRules performing HTTP header manipulation may cause an interruption to service when processing traffic handled by a Virtual Server with an associated HTTP profile, in specific circumstances, when the requests do not strictly conform to RFCs.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2020:3329
|
Red Hat Security Advisory: Red Hat Ansible Tower 3.6.5-1 - RHEL7 Container
|
Tower: SSRF: Server Side Request Forgery on Credential
|
[
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | 5.5 | null | null | null |
CVE-2022-31148
|
Persistent cross site scripting in customer module in Shopware
|
Shopware is an open source e-commerce software. In versions from 5.7.0 a persistent cross site scripting (XSS) vulnerability exists in the customer module. Users are recommend to update to the current version 5.7.14. You can get the update to 5.7.14 regularly via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.
|
[
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-9hqp-m898-4x8x
|
A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
|
[] | null | null | 9.8 | null | null |
|
CVE-2016-1120
|
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2025-9865
|
Inappropriate implementation in Toolbar in Google Chrome on Android prior to 140.0.7339.80 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
|
[] | null | 5.4 | null | null | null |
|
CVE-2017-3578
|
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: RAS subsystems). The supported version that is affected is AK 2013. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Sun ZFS Storage Appliance Kit (AK) executes to compromise Sun ZFS Storage Appliance Kit (AK). While the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit_software:2013:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4.6 | null |
|
CVE-2022-27631
|
A memory corruption vulnerability exists in the httpd unescape functionality of DD-WRT Revision 32270 - Revision 48599. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
|
[
"cpe:2.3:o:dd-wrt:dd-wrt:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
|
GHSA-66x7-256j-6wf5
|
Cross-Site Request Forgery (CSRF) vulnerability in Plugincraft Mediamatic – Media Library Folders plugin <= 2.8.1 versions.
|
[] | null | 4.3 | null | null | null |
|
CVE-2011-2754
|
Cross-site scripting (XSS) vulnerability in the PageBuilder2 (aka Page Builder) theme in IBM WebSphere Portal 7.x before 7.0.0.1 CF006, as used in IBM Web Content Manager (WCM) and other products, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:ibm:web_content_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf002:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf003:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf004:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf005:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-jr9g-4vv8-j8cf
|
Cross-site scripting (XSS) vulnerability in the on-line help feature in Citrix Web Interface 2.0 and earlier, and NFuse, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-gr8w-6777-6rwj
|
In the Linux kernel, the following vulnerability has been resolved:soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()This loop is supposed to break if the frequency returned from
clk_round_rate() is the same as on the previous iteration. However,
that check doesn't make sense on the first iteration through the loop.
It leads to reading before the start of these->clk_perf_tbl[] array.
|
[] | null | null | null | null | null |
|
CVE-2023-28649
|
The Hub in the Snap One OvrC cloud platform is a device used to centralize and manage nested devices connected to it. A vulnerability exists in which an attacker could impersonate a hub and send device requests to claim already claimed devices. The OvrC cloud platform receives the requests but does not validate if the found devices are already managed by another user.
|
[
"cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*",
"cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
|
CVE-2023-4246
|
The GiveWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.33.3. This is due to missing or incorrect nonce validation on the give_sendwp_remote_install_handler function. This makes it possible for unauthenticated attackers to install and activate the SendWP plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
|
CVE-2024-23716
|
In DevmemIntPFNotify of devicemem_server.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:a:imaginationtech:ddk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
|
CVE-2021-42786
|
Remote Code Execution at AgentControllerServlet
|
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) has Remote Code Execution vulnerabilities in multiple instances of the API requests. The affected endpoints do not have any input validation of the user's input that allowed a malicious payload to be injected.
|
[
"cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:riverbed:steelcentral_appinternals_dynamic_sampling_agent:10.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2021-43011
|
Adobe Prelude M4A file memory corruption vulnerability could lead to remote code execution
|
Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
|
[
"cpe:2.3:a:adobe:prelude:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-w9gr-856x-c2gv
|
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2006-0843
|
Leif M. Wright's Blog 3.5 stores the config file and other txt files under the web root with insufficient access control, which allows remote attackers to read the administrator's password.
|
[
"cpe:2.3:a:leif_m._wright:web_blog:3.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-40281
|
An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 in dl/dl_print.php when registering ordinary users.
|
[
"cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zzcms:zzcms:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zzcms:zzcms:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:zzcms:zzcms:2021:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-xm9w-228p-45pp
|
An issue was discovered on KuWFi GC111 GC111-GL-LM321_V3.0_20191211 devices. The TELNET service is enabled by default and exposed over the WAN interface without authentication.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9645-h66p-jm39
|
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. The issue involves the "CoreMedia External Displays" component. It allows local users to gain privileges or cause a denial of service (type confusion) via unspecified vectors.
|
[] | null | null | 7.8 | null | null |
|
GHSA-97gm-qxrm-c6w2
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.11.8, 12 before 12.0.6, and 12.1 before 12.1.6. Cookies for GitLab Pages (which have access control) could be sent over cleartext HTTP.
|
[] | null | 5.9 | null | null | null |
|
GHSA-9q5h-jvgh-x2h7
|
Microsoft Internet Explorer 9 and earlier does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing an http: URL that redirects to a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue, aka "Drag and Drop Information Disclosure Vulnerability." NOTE: this vulnerability exists because of an incomplete fix in the Internet Explorer 9 release.
|
[] | null | null | null | null | null |
|
CVE-2021-20261
|
A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | 6.4 | null | 4.4 | null |
|
CVE-2022-1428
|
An issue has been discovered in GitLab affecting all versions before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was incorrectly verifying throttling limits for authenticated package requests which resulted in limits not being enforced.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-cj78-rgw3-4h5p
|
Improper Restriction of XML External Entity Reference in trytond and proteus
|
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
|
[] | null | 6.5 | null | null | null |
GHSA-wh6f-4x45-xjrj
|
Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
|
[] | null | null | null | null | null |
|
GHSA-chwm-xp9x-8vv7
|
In the Linux kernel, the following vulnerability has been resolved:tty: vcc: Add check for kstrdup() in vcc_probe()Add check for the return value of kstrdup() and return the error, if it
fails in order to avoid NULL pointer dereference.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-58116
|
Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework
Impact: Successful exploitation of this vulnerability may affect availability.
|
[] | null | 4 | null | null | null |
|
CVE-2015-4464
|
Kguard Digital Video Recorder 104, 108, v2 does not have any authorization or authentication between an ActiveX client and the application server.
|
[
"cpe:2.3:o:kguardsecurity:kg-sha104_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:kguardsecurity:kg-sha104:-:*:*:*:*:*:*:*",
"cpe:2.3:o:kguardsecurity:kg-sha108_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:kguardsecurity:kg-sha108:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-cgfc-x233-hpqv
|
An unspecified RFC function in SAP CCMS Agent allows remote attackers to execute arbitrary commands via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-w2fq-mj73-7568
|
BlackBoard CourseInfo 4.0 does not properly authenticate users, which allows local users to modify CourseInfo database information and gain privileges by directly calling the supporting CGI programs such as user_update_passwd.pl and user_update_admin.pl.
|
[] | null | null | null | null | null |
|
GHSA-6p5r-g9mq-ggh2
|
Reference binding to nullptr in `MatrixSetDiagV*` ops
|
ImpactAn attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`:The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong:PatchesWe have patched the issue in GitHub commit [ff8894044dfae5568ecbf2ed514c1a37dc394f1b](https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
[] | 6.9 | 7.1 | null | null | null |
CVE-2002-1843
|
Perlbot 1.9.2 allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the $text variable in SpelCheck.pm or (2) the $filename variable in HTMLPlog.pm.
|
[
"cpe:2.3:a:perlbot:perlbot:1.9.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
cisco-sa-20200122-ios-xr-routes
|
Cisco IOS XR Software BGP EVPN Operational Routes Denial of Service Vulnerability
|
A vulnerability in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
The vulnerability is due to incorrect processing of a BGP update message that contains crafted EVPN attributes. An attacker could indirectly exploit the vulnerability by sending BGP EVPN update messages with a specific, malformed attribute to an affected system and waiting for a user on the device to display the EVPN operational routes’ status. If successful, the attacker could cause the BGP process to restart unexpectedly, resulting in a DoS condition.
The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-routes ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-routes"]
|
[] | null | null | 7.4 | null | null |
CVE-2007-2284
|
Buffer overflow in ABC-View Manager 1.42 allows user-assisted remote attackers to execute arbitrary code via a crafted .PSP file.
|
[
"cpe:2.3:a:abc-view:abc-view_manager:1.42:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2021-43798
|
Grafana path traversal
|
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
|
[
"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"cpe:2.3:a:grafana:grafana:8.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:grafana:grafana:8.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:grafana:grafana:8.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:grafana:grafana:8.3.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-72w9-fcj5-3fcg
|
Improper Authentication in Apache Shiro
|
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
|
[] | null | 9.8 | null | null | null |
GHSA-jj8j-m6ch-fccm
|
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "orders_products_status_manual_name_long[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser.
|
[] | null | 8.8 | null | null | null |
|
GHSA-hfvq-hp2j-56vw
|
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-0861
|
Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
GHSA-j478-4j6c-x46v
|
Vulnerability in Support Tools Manager (xstm,cstm,stm) in HP-UX 11.11 and earlier allows local users to cause a denial of service.
|
[] | null | null | null | null | null |
|
GHSA-462q-5367-hv76
|
Unspecified vulnerability in HP NonStop G06.12.00 through G06.32.00, H06.08.00 through H06.18.01, and J06.04.00 through J06.07.01 allows local users to gain privileges, cause a denial of service, or obtain "access to data" via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2012-1572
|
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space
|
[
"cpe:2.3:a:openstack:keystone:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2020-15665
|
Firefox did not reset the address bar after the beforeunload dialog was shown if the user chose to remain on the page. This could have resulted in an incorrect URL being shown when used in conjunction with other unexpected browser behaviors. This vulnerability affects Firefox < 80.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
GHSA-w74v-4922-34mq
|
SQL injection vulnerability in index.php in the com_iomezun component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit action.
|
[] | null | null | null | null | null |
|
CVE-2023-7203
|
Smart Forms < 2.6.87 - Subscriber+ Arbitrary Entry Deletion
|
The Smart Forms WordPress plugin before 2.6.87 does not have authorisation in various AJAX actions, which could allow users with a role as low as subscriber to call them and perform unauthorised actions such as deleting entries. The plugin also lacks CSRF checks in some places which could allow attackers to make logged in users perform unwanted actions via CSRF attacks such as deleting entries.
|
[
"cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2025-4692
|
ABUP IoT Cloud Platform Incorrect Privilege Assignment
|
Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the
ABUP Cloud Update Platform.
|
[] | 5.9 | 6.8 | null | null | null |
CVE-2013-6230
|
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.
|
[
"cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2023-33621
|
GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.
|
[
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:3.215:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
|
GHSA-gwvc-g4vv-pjx6
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.2 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A low-privileged attacker can point a CI/CD Component to an incorrect path and cause the server to exhaust all available memory through an infinite loop and cause Denial of Service.
|
[] | null | 6.5 | null | null | null |
|
GHSA-g7m2-8cqp-hf7v
|
Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
|
[] | null | null | 7.8 | null | null |
|
GHSA-xqxh-cq77-r6qh
|
VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.
|
[] | null | null | null | null | null |
|
CVE-2023-36907
|
Windows Cryptographic Services Information Disclosure Vulnerability
|
Windows Cryptographic Services Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-1999-0323
|
FreeBSD mmap function allows users to modify append-only or immutable files.
|
[
"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-23059
|
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the username parameter in the setDdnsCfg function.
|
[
"cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2021:3904
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: SVM nested virtualization issue in KVM (AVIC support) kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.8 | null | null | null |
CVE-2022-48941
|
ice: fix concurrent reset and removal of VFs
|
In the Linux kernel, the following vulnerability has been resolved:
ice: fix concurrent reset and removal of VFs
Commit c503e63200c6 ("ice: Stop processing VF messages during teardown")
introduced a driver state flag, ICE_VF_DEINIT_IN_PROGRESS, which is
intended to prevent some issues with concurrently handling messages from
VFs while tearing down the VFs.
This change was motivated by crashes caused while tearing down and
bringing up VFs in rapid succession.
It turns out that the fix actually introduces issues with the VF driver
caused because the PF no longer responds to any messages sent by the VF
during its .remove routine. This results in the VF potentially removing
its DMA memory before the PF has shut down the device queues.
Additionally, the fix doesn't actually resolve concurrency issues within
the ice driver. It is possible for a VF to initiate a reset just prior
to the ice driver removing VFs. This can result in the remove task
concurrently operating while the VF is being reset. This results in
similar memory corruption and panics purportedly fixed by that commit.
Fix this concurrency at its root by protecting both the reset and
removal flows using the existing VF cfg_lock. This ensures that we
cannot remove the VF while any outstanding critical tasks such as a
virtchnl message or a reset are occurring.
This locking change also fixes the root cause originally fixed by commit
c503e63200c6 ("ice: Stop processing VF messages during teardown"), so we
can simply revert it.
Note that I kept these two changes together because simply reverting the
original commit alone would leave the driver vulnerable to worse race
conditions.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
GHSA-mqwx-r894-9hfp
|
Process Sync has a Potential Unsound Issue in SharedMutex
|
In the process-sync crate 0.2.2 for Rust, the drop function lacks a check for whether the pthread_mutex is unlocked.
|
[] | null | 2.9 | null | null | null |
CVE-2017-14504
|
ReadPNMImage in coders/pnm.c in GraphicsMagick 1.3.26 does not ensure the correct number of colors for the XV 332 format, leading to a NULL Pointer Dereference.
|
[
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-w6pw-5gh5-4952
|
Plone python code injection
|
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to "go_back."
|
[] | 9.3 | 9.8 | null | null | null |
GHSA-5g8x-p6v8-2gx5
|
Cross-site scripting (XSS) vulnerability in templates/login.php in LDAP Account Manager (LAM) 4.3 and 4.2.1 allows remote attackers to inject arbitrary web script or HTML via the language parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-31170
|
Out-of-bounds Read in libfluid_msg library
|
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of10::StatsReplyQueue::unpack.
This issue affects libfluid: 0.1.0.
|
[
"cpe:2.3:a:open_networking_foundation:libfluid:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opennetworking:libfluid_msg:0.1.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-3vw3-g8hp-j327
|
Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing.
|
[] | null | null | null | null | null |
|
CVE-2024-24230
|
Komm.One CMS 10.4.2.14 has a Server-Side Template Injection (SSTI) vulnerability via the Velocity template engine. It allows remote attackers to execute arbitrary code via a URL that specifies java.lang.Runtime in conjunction with getRuntime().exec followed by an OS command.
|
[
"cpe:2.3:a:komm.one:cms:10.4.2.14:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2018-1000182
|
A server-side request forgery vulnerability exists in Jenkins Git Plugin 3.9.0 and older in AssemblaWeb.java, GitBlitRepositoryBrowser.java, Gitiles.java, TFS2013GitRepositoryBrowser.java, ViewGitWeb.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.
|
[
"cpe:2.3:a:jenkins:git:*:*:*:*:*:jenkins:*:*"
] | null | null | 6.4 | 5.5 | null |
|
CVE-2020-26649
|
AtomXCMS 2.0 is affected by Incorrect Access Control via admin/dump.php
|
[
"cpe:2.3:a:atomx:atomxcms_2:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.5 | null |
|
GHSA-7wjj-g2fp-6r9j
|
The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command.
|
[] | null | null | 7.5 | null | null |
|
CVE-2017-20162
|
vercel ms index.js parse redos
|
A vulnerability, which was classified as problematic, has been found in vercel ms up to 1.x. This issue affects the function parse of the file index.js. The manipulation of the argument str leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is named caae2988ba2a37765d055c4eee63d383320ee662. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217451.
|
[
"cpe:2.3:a:vercel:ms:*:*:*:*:*:node.js:*:*"
] | null | 4.3 | 4.3 | 3.5 |
https://github.com/vercel/ms/commit/caae2988ba2a37765d055c4eee63d383320ee662
|
CVE-2001-0998
|
IBM HACMP 4.4 allows remote attackers to cause a denial of service via a completed TCP connection to HACMP ports (e.g., using a port scan) that does not send additional data, which causes a failure in snmpd.
|
[
"cpe:2.3:a:ibm:hacmp:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-34125
|
An issue discovered in Yuneec Mantis Q and PX4-Autopilot v 1.11.3 and below allow attacker to gain access to sensitive information via various nuttx commands.
|
[
"cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:yuneec:mantis_q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:yuneec:mantis_q:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-jrcw-h5xr-875m
|
Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and (1) a zero value of the "this" variable in the nsContentList::Item function; (2) interaction of the indic IME extension, a Hindi language selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames.
|
[] | null | null | null | null | null |
|
GHSA-v7vg-hc4h-5gw6
|
lib/Auth/Source/External.php in the drupalauth module before 1.2.2 for simpleSAMLphp allows remote attackers to authenticate as an arbitrary user via the user name (uid) in a cookie.
|
[] | null | null | null | null | null |
|
CVE-2007-5833
|
Multiple cross-site scripting (XSS) vulnerabilities in BosDev BosMarket Business Directory System allow remote authenticated users to inject arbitrary web script or HTML via (1) user info (account details) or (2) a post.
|
[
"cpe:2.3:a:bosdev:bosmarket_business_directory_system:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2024-6926
|
Viral Signup <= 2.1 - Unauthenticated SQLi
|
The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
[
"cpe:2.3:a:wow-company:viral-signup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wow-company:viral_signup:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
CVE-2019-11969
|
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
|
[
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
CVE-2013-4057
|
Cross-site request forgery (CSRF) vulnerability in the XML Pack in IBM InfoSphere Information Server 8.5.x through 8.5 FP3, 8.7.x through 8.7 FP2, and 9.1.x through 9.1.2.0 allows remote attackers to hijack the authentication of arbitrary users.
|
[
"cpe:2.3:a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-gq66-wmx6-v7rg
|
The Upload File functionality in upload.jspa in Aurea Jive Jive-n 9.0.2.1 On-Premises allows for an XML External Entity attack through a crafted file, allowing attackers to read arbitrary files.
|
[] | null | null | 6.5 | null | null |
|
CVE-2019-0183
|
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 | null |
|
GHSA-grh3-7c9c-hj98
|
In loadMediaResumptionControls of MediaResumeListener.kt, there is a possible way to play and listen to media files played by another user on the same device due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5 | null | null | null |
|
GHSA-xg6g-3jwv-7334
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Asdqwe Dev Ajax Domain Checker plugin <= 1.3.0 versions.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-30074
|
Alludo Parallels Desktop before 19.4.2 and 20.x before 20.2.2 for macOS on Intel platforms allows privilege escalation to root via the VM creation routine.
|
[] | null | 7.8 | null | null | null |
|
GHSA-45x7-38m2-h2jc
|
Zoho ManageEngine ADManager Plus version 7110 and prior allows account takeover via SSO.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-26580
|
A potential security vulnerability has been identified in HPE iLO Amplifier Pack. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS). HPE has provided the following software update to resolve the vulnerability in HPE iLO Amplifier Pack: HPE iLO Amplifier Pack 1.95 or later.
|
[
"cpe:2.3:a:hpe:integrated_lights-out_amplifier:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-wgj2-mq2h-cpcf
|
In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash.
|
[] | null | null | 6.5 | null | null |
|
GHSA-4rpq-2c89-9227
|
server/content/SyncStorageEngine.java in SyncStorageEngine in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 mismanages certain authority data, which allows attackers to cause a denial of service (reboot loop) via a crafted application, aka internal bug 26513719.
|
[] | null | null | 5.5 | null | null |
|
GHSA-786f-rrh2-r2pf
|
A vulnerability in the implementation of the Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to the incorrect processing of a BGP update message that contains specific EVPN attributes. An attacker could exploit this vulnerability by sending a BGP update message that contains specific EVPN attributes. To exploit this vulnerability, an attacker must control a BGP speaker that has an established trusted peer connection to an affected device that is configured with the address family L2VPN EVPN to receive and process the update message. This vulnerability cannot be exploited by any data that is initiated by clients on the Layer 2 network or by peers that are not configured to accept the L2VPN EVPN address family. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP updates only from explicitly defined peers. For this vulnerability to be exploited, the malicious BGP update message must either come from a configured, valid BGP peer or be injected by the attacker into the affected BGP network on an existing, valid TCP connection to a BGP peer.
|
[] | null | 6.8 | null | null | null |
|
GHSA-r8ch-wqmp-x6mp
|
Dameware Remote Mini Control version 12.1.0.34 and prior contains an unauthenticated remote buffer over-read due to the server not properly validating RsaSignatureLen during key negotiation, which could crash the application or leak sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-6348-qpvc-cw5w
|
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause denial of service.
|
[] | null | 4 | null | null | null |
|
RHSA-2004:174
|
Red Hat Security Advisory: utempter security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
GHSA-g9fm-wc6h-pvgj
|
Magento Open Source Server-Side Request Forgery (SSRF) vulnerability
|
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. An admin-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.
|
[] | null | 4.9 | null | null | null |
GHSA-7jrw-jh47-4684
|
NVIDIA GPU Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a NULL-pointer dereference, which may lead to denial of service.
|
[] | null | 6.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.