id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-7qx7-vmc7-hhcr
|
A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5 and classified as critical. Affected by this issue is some unknown functionality of the file /api/mjkj-chat/cgform-api/addData/. The manipulation of the argument chatUserID leads to business logic errors. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-53v8-f936-c2xp
|
An issue in Beijing Baidu Netcom Science & Technology Co Ltd Haokan Video iOS 7.70.0 allows attackers to access sensitive user information via supplying a crafted link.
|
[] |
|
CVE-2025-31914
|
WordPress Pixel WordPress Form BuilderPlugin & Autoresponder <= 1.0.2 - SQL Injection Vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in kamleshyadav Pixel WordPress Form BuilderPlugin & Autoresponder allows Blind SQL Injection. This issue affects Pixel WordPress Form BuilderPlugin & Autoresponder: from n/a through 1.0.2.
|
[] |
GHSA-2jg6-w6jg-4rh2
|
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.
|
[] |
|
CVE-2025-24123
|
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.
|
[] |
|
CVE-2024-35847
|
irqchip/gic-v3-its: Prevent double free on error
|
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Prevent double free on error
The error handling path in its_vpe_irq_domain_alloc() causes a double free
when its_vpe_init() fails after successfully allocating at least one
interrupt. This happens because its_vpe_irq_domain_free() frees the
interrupts along with the area bitmap and the vprop_page and
its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the
vprop_page again.
Fix this by unconditionally invoking its_vpe_irq_domain_free() which
handles all cases correctly and by removing the bitmap/vprop_page freeing
from its_vpe_irq_domain_alloc().
[ tglx: Massaged change log ]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
CVE-2025-49541
|
ColdFusion | Cross-site Scripting (Stored XSS) (CWE-79)
|
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses.
|
[] |
GHSA-wc8w-gh5m-62fv
|
MoinMoin Access Restrictions Bypassed due to improper ACL enforcement
|
MoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to True, which might allow remote attackers to bypass intended access restrictions, a different vulnerability than CVE-2008-1937.
|
[] |
CVE-2024-24976
|
A denial of service vulnerability exists in the OAS Engine File Data Source Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can cause the running program to stop. An attacker can send a sequence of requests to trigger this vulnerability.
|
[] |
|
GHSA-76fq-c73c-746h
|
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE), Cisco TelePresence Codec (TC), and Cisco RoomOS Software could allow an authenticated, remote attacker to escalate privileges to an unrestricted user of the restricted shell. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including specific arguments when opening an SSH connection to an affected device. A successful exploit could allow the attacker to gain unrestricted user access to the restricted shell of an affected device.
|
[] |
|
GHSA-8xp3-mcw7-w7cp
|
In the Linux kernel, the following vulnerability has been resolved:HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()Update struct hid_descriptor to better reflect the mandatory and
optional parts of the HID Descriptor as per USB HID 1.11 specification.
Note: the kernel currently does not parse any optional HID class
descriptors, only the mandatory report descriptor.Update all references to member element desc[0] to rpt_desc.Add test to verify bLength and bNumDescriptors values are valid.Replace the for loop with direct access to the mandatory HID class
descriptor member for the report descriptor. This eliminates the
possibility of getting an out-of-bounds fault.Add a warning message if the HID descriptor contains any unsupported
optional HID class descriptors.
|
[] |
|
GHSA-xw2w-mmgv-hf8h
|
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.
|
[] |
|
GHSA-h322-r32h-qf8x
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Polevaultweb Intagrate Lite allows Stored XSS.This issue affects Intagrate Lite: from n/a through 1.3.7.
|
[] |
|
GHSA-37xj-pfm3-jg48
|
Vulnerability in the PeopleSoft Enterprise CS Student Records product of Oracle PeopleSoft (component: Class Search). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CS Student Records. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise CS Student Records, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise CS Student Records accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise CS Student Records accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[] |
|
GHSA-7wf4-j39m-25gh
|
The iPhone4.TW (aka com.tapatalk.iPhone4TWforums) application 3.3.20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
GHSA-w6wj-g5cv-fh4w
|
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
|
[] |
|
CVE-2011-0589
|
Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0563 and CVE-2011-0606.
|
[
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-27716
|
On versions 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.5, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when a BIG-IP APM virtual server processes traffic of an undisclosed nature, the Traffic Management Microkernel (TMM) stops responding and restarts.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-52802
|
WordPress Import YouTube videos as WP Posts plugin <= 2.1 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in enguerranws Import YouTube videos as WP Posts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Import YouTube videos as WP Posts: from n/a through 2.1.
|
[] |
GHSA-m6q8-mwf6-6mmc
|
CSRF vulnerability in Jenkins GitHub Pull Request Builder Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[] |
CVE-2019-7286
|
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-m3rr-mh54-jmrf
|
Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file.
|
[] |
|
CVE-2006-3673
|
nNetObject.cpp in Armagetron Advanced 2.8.2 and earlier allows remote attackers to cause a denial of service (application crash) via a large owner value, which causes an assert error.
|
[
"cpe:2.3:a:armagetron:armagetron_advanced:*:*:*:*:*:*:*:*",
"cpe:2.3:a:armagetron:armagetron_advanced:0.2.7.0:*:*:*:*:*:*:*"
] |
|
GHSA-rqp3-x5r3-8m58
|
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word Viewer, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability."
|
[] |
|
GHSA-44f8-jm5j-7x8w
|
A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as critical. This vulnerability affects the function add_req of the file /_parse/_all_edits.php. The manipulation of the argument jid/limit leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-mjv8-7jx2-fjmq
|
A SIGFPE signal is raised in the function apply_filters() of h5repack_filters.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
|
[] |
|
GHSA-782r-hcgf-6crv
|
In the Linux kernel, the following vulnerability has been resolved:udf: Avoid using corrupted block bitmap bufferWhen the filesystem block bitmap is corrupted, we detect the corruption
while loading the bitmap and fail the allocation with error. However the
next allocation from the same bitmap will notice the bitmap buffer is
already loaded and tries to allocate from the bitmap with mixed results
(depending on the exact nature of the bitmap corruption). Fix the
problem by using BH_verified bit to indicate whether the bitmap is valid
or not.
|
[] |
|
GHSA-g78g-7qh3-cvvv
|
A vulnerability was found in ACME Ultra Mini HTTPd 1.21. It has been classified as problematic. This affects an unknown part of the component HTTP GET Request Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-249819.
|
[] |
|
GHSA-r2rj-8r7j-cph4
|
Stack-based and heap-based buffer overflows in ProxyNow! 2.75 and earlier allow remote attackers to execute arbitrary code via a GET request with a long ftp:// URL.
|
[] |
|
GHSA-rvc6-cvq7-4g2q
|
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15797.
|
[] |
|
GHSA-4rw8-6238-r9gq
|
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: don't skip expired elements during walkThere is an asymmetry between commit/abort and preparation phase if the
following conditions are met:set is a verdict map ("1.2.3.4 : jump foo")timeouts are enabledIn this case, following sequence is problematic:element E in set S refers to chain Cuserspace requests removal of set Skernel does a set walk to decrement chain->use count for all elements
from preparation phasekernel does another set walk to remove elements from the commit phase
(or another walk to do a chain->use increment for all elements from
abort phase)If E has already expired in 1), it will be ignored during list walk, so its use count
won't have been changed.Then, when set is culled, ->destroy callback will zap the element via
nf_tables_set_elem_destroy(), but this function is only safe for
elements that have been deactivated earlier from the preparation phase:
lack of earlier deactivate removes the element but leaks the chain use
count, which results in a WARN splat when the chain gets removed later,
plus a leak of the nft_chain structure.Update pipapo_get() not to skip expired elements, otherwise flush
command reports bogus ENOENT errors.
|
[] |
|
GHSA-6r2v-grpr-6wv9
|
The Estatebud – Properties & Listings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.0. This is due to missing or incorrect nonce validation on the 'estatebud_settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] |
|
GHSA-w6p4-84vc-qc2w
|
Ackites KillWxapkg vulnerable to OS Command Injection
|
A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
|
[] |
GHSA-m48p-94mp-44pv
|
Arbitrary File Download exists in the Jtag Members Directory 5.3.7 component for Joomla! via the download_file parameter.
|
[] |
|
CVE-2020-11783
|
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
|
[
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*"
] |
|
GHSA-4c7j-5rpp-4x8h
|
JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 22, allows remote attackers to cause a denial of service (heap-based out-of-bounds write and application crash) or possibly have unspecified other impact via crafted JavaScript code that triggers access to red-zone memory locations, related to jit/ThunkGenerators.cpp, llint/LowLevelInterpreter32_64.asm, and llint/LowLevelInterpreter64.asm.
|
[] |
|
GHSA-9x2g-3f9c-gp3j
|
Cross-site scripting (XSS) vulnerability in the Euro Calculator (skt_eurocalc) extension 0.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] |
|
GHSA-mq4v-mwpp-gcfh
|
A vulnerability was found in itsourcecode Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269620.
|
[] |
|
GHSA-6pfp-7jf5-ghjw
|
Konica Minolta bizhub MFP devices before 2022-04-14 allow a Sandbox Escape. An attacker must attach a keyboard to a USB port, press F12, and then escape from the kiosk mode.
|
[] |
|
CVE-2017-13093
|
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), including modification of encrypted IP cyphertext to insert hardware trojans
|
The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of encrypted IP cyphertext to insert hardware trojans. The methods are flawed and, in the most egregious cases, enable attack vectors that allow recovery of the entire underlying plaintext IP. Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key, among other impacts.
|
[
"cpe:2.3:o:-:-:-:*:*:*:*:*:*:*"
] |
GHSA-2vqp-59qv-pmrc
|
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
|
[] |
|
GHSA-9w2j-w59m-592g
|
Missing Authorization vulnerability in Chimpstudio JobHunt Job Alerts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JobHunt Job Alerts: from n/a through 3.6.
|
[] |
|
CVE-2022-1166
|
JobMonster < 4.6.6.1 - Directory Listing in Upload Folder
|
The JobMonster Theme was vulnerable to Directory Listing in the /wp-content/uploads/jobmonster/ folder, as it did not include a default PHP file, or .htaccess file. This could expose personal data such as people's resumes. Although Directory Listing can be prevented by securely configuring the web server, vendors can also take measures to make it less likely to happen.
|
[
"cpe:2.3:a:nootheme:jobmonster:*:*:*:*:*:wordpress:*:*"
] |
CVE-2021-46766
|
Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
|
[
"cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-0678
|
Grub2: squash4: integer overflow may lead to heap based out-of-bounds write when reading data
|
A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections.
|
[
"cpe:/o:redhat:enterprise_linux:10",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:/a:redhat:openshift:4"
] |
GHSA-ggq9-q258-r9g6
|
Protection Mechanism Failure in the Firewall in McAfee Endpoint Security (ENS) 10.x prior to 10.6.1 May 2019 update allows context-dependent attackers to circumvent ENS protection where GTI flagged IP addresses are not blocked by the ENS Firewall via specially crafted malicious sites where the GTI reputation is carefully manipulated and does not correctly trigger the ENS Firewall to block the connection.
|
[] |
|
CVE-2024-46670
|
An Out-of-bounds Read vulnerability [CWE-125] in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of Service via crafted requests.
|
[
"cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortipam:1.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-mjmh-q76h-6245
|
Improper input validation in firmware for Intel(R) NUC 8 Compute Element, Intel(R) NUC 11 Compute Element, Intel(R) NUC 12 Compute Element may allow a privileged user to enable escalation of privilege via local access.
|
[] |
|
GHSA-v6qx-c5rh-4q6q
|
An issue was discovered in AtaLegacySmm in the kernel 5.0 before 05.08.46, 5.1 before 05.16.46, 5.2 before 05.26.46, 5.3 before 05.35.46, 5.4 before 05.43.46, and 5.5 before 05.51.45 in Insyde InsydeH2O. Code execution can occur because the SMI handler lacks a CommBuffer check.
|
[] |
|
GHSA-52h8-5hwm-jv8x
|
A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
[] |
|
CVE-2023-38904
|
A Cross Site Scripting (XSS) vulnerability in Netlify CMS v.2.10.192 allows a remote attacker to execute arbitrary code via a crafted payload to the body parameter of the new post function.
|
[
"cpe:2.3:a:decapcms:netlify_cms:2.10.192:*:*:*:*:*:*:*"
] |
|
GHSA-gc9g-pr94-xwgf
|
An XSS issue was discovered in FSMLabs TimeKeeper 8.0.17. On the "Configuration -> Compliance -> Add a new compliance report" and "Configuration -> Timekeeper Configuration -> Add a new source there" screens, there are entry points to inject JavaScript code.
|
[] |
|
CVE-2025-21791
|
vrf: use RCU protection in l3mdev_l3_out()
|
In the Linux kernel, the following vulnerability has been resolved:
vrf: use RCU protection in l3mdev_l3_out()
l3mdev_l3_out() can be called without RCU being held:
raw_sendmsg()
ip_push_pending_frames()
ip_send_skb()
ip_local_out()
__ip_local_out()
l3mdev_ip_out()
Add rcu_read_lock() / rcu_read_unlock() pair to avoid
a potential UAF.
|
[] |
CVE-2017-8587
|
Windows Explorer in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511 allows a denial of service vulnerability when it attempts to open a non-existent file, aka "Windows Explorer Denial of Service Vulnerability".
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
] |
|
CVE-2020-1871
|
USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.
|
[
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*"
] |
|
GHSA-ffh2-pjxc-wxgm
|
In Activity Manager, there is a possible way to determine whether an app is installed due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
CVE-2023-1414
|
WP VR < 8.3.0 - Subscriber+ Arbitrary Tour Update
|
The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours
|
[
"cpe:2.3:a:rextheme:wp_vr:*:*:*:*:*:wordpress:*:*"
] |
CVE-2025-26918
|
WordPress Small Package Quotes – Unishippers Edition plugin <= 2.4.9 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in enituretechnology Small Package Quotes – Unishippers Edition allows Reflected XSS. This issue affects Small Package Quotes – Unishippers Edition: from n/a through 2.4.9.
|
[] |
CVE-2016-9676
|
Buffer overflow in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:citrix:provisioning_services:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:provisioning_services:7.11:*:*:*:*:*:*:*"
] |
|
GHSA-xpf2-4v7h-fpcm
|
Failure to unmap certain SysHub mappings in
error paths of the ASP (AMD Secure Processor) bootloader may allow an attacker
with a malicious bootloader to exhaust the SysHub resources resulting in a
potential denial of service.
|
[] |
|
CVE-2009-4200
|
SQL injection vulnerability in the Seminar (com_seminar) component 1.28 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a View_seminar action to index.php.
|
[
"cpe:2.3:a:vollmar:com_seminar:1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
GHSA-vvp7-94rj-24rc
|
A local privilege escalation vulnerability exists in Trend Micro Security 2019 (v15.0) in which, if exploited, would allow an attacker to manipulate a specific product feature to load a malicious service.
|
[] |
|
GHSA-x4r8-6j7v-623j
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition component of Oracle Fusion Middleware (subcomponent: Analytics Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] |
|
GHSA-g574-cx8g-fpfc
|
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1215, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260.
|
[] |
|
GHSA-p8c7-34p7-r42c
|
Directory traversal vulnerability in kcfinder/browse.php in Vtiger CRM before 6.0.0 Security patch 1 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter in a download action. NOTE: it is likely that this issue is actually in the KCFinder third-party component, and it affects additional products besides Vtiger CRM.
|
[] |
|
CVE-2025-23882
|
WordPress WP Download Codes Plugin <= 2.5.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Download Codes allows Reflected XSS. This issue affects WP Download Codes: from n/a through 2.5.4.
|
[] |
GHSA-9r68-wc93-mhmq
|
Cross-Site Request Forgery (CSRF) vulnerability in flowdee ClickWhale allows Cross Site Request Forgery. This issue affects ClickWhale: from n/a through 2.4.3.
|
[] |
|
GHSA-8j44-692v-gxcw
|
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.
|
[] |
|
GHSA-5cjg-mfj5-2f85
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of annotations. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6327.
|
[] |
|
GHSA-r8wm-m82j-j2jj
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mircea N. NMR Strava activities allows DOM-Based XSS.This issue affects NMR Strava activities: from n/a through 1.0.6.
|
[] |
|
CVE-2020-14834
|
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:trade_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-3h5c-v4x2-h5xf
|
Use After Free in NPM radare2.js prior to 5.6.2.
|
[] |
|
GHSA-97g9-469m-9mmg
|
Network Preferences in Apple Mac OS X 10.4.11 stores PPP passwords in cleartext in a world-readable file, which allows local users to obtain sensitive information by reading this file.
|
[] |
|
GHSA-v3m2-pg96-w33m
|
Openstack cinder Improper handling of ScaleIO backend credentials
|
An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project
|
[] |
CVE-2021-43256
|
Microsoft Excel Remote Code Execution Vulnerability
|
Microsoft Excel Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel_rt:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*",
"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*"
] |
CVE-2020-1791
|
HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.185(C00E74R3P8) have an improper authorization vulnerability. The system has a logic judging error under certain scenario, successful exploit could allow the attacker to switch to third desktop after a series of operation in ADB mode.
|
[
"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*"
] |
|
GHSA-m943-675h-hvfc
|
TeamPass before 2.1.20 allows remote attackers to bypass access restrictions via a request to index.php followed by a direct request to a file that calls the session_start function before checking the CPM key, as demonstrated by a request to sources/upload/upload.files.php.
|
[] |
|
CVE-2021-39679
|
In init of vendor_graphicbuffer_meta.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188745089References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-7p3h-rrxf-82f3
|
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_utc, at 0x9d0193ac, the value for the `offset` key is copied using `strcpy` to the buffer at `$sp+0x2d0`.This buffer is 100 bytes large, sending anything longer will cause a buffer overflow.
|
[] |
|
CVE-2025-31538
|
WordPress Checklist plugin <= 1.1.9 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in checklistcom Checklist allows Stored XSS. This issue affects Checklist: from n/a through 1.1.9.
|
[] |
CVE-2011-3623
|
Multiple stack-based buffer overflows in VideoLAN VLC media player before 1.0.2 allow remote attackers to execute arbitrary code via (1) a crafted ASF file, related to the ASF_ObjectDumpDebug function in modules/demux/asf/libasf.c; (2) a crafted AVI file, related to the AVI_ChunkDumpDebug_level function in modules/demux/avi/libavi.c; or (3) a crafted MP4 file, related to the __MP4_BoxDumpStructure function in modules/demux/mp4/libmp4.c.
|
[
"cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-46101
|
GDidees CMS <= v3.9.1 has a file upload vulnerability.
|
[
"cpe:2.3:a:gdidees:gdidees_cms:*:*:*:*:*:*:*:*"
] |
|
GHSA-75pc-rgg3-8xw2
|
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] |
|
GHSA-42hr-vjrg-wjr7
|
In the module "Carousels Pack - Instagram, Products, Brands, Supplier" (hicarouselspack) for PrestaShop up to version 1.5.0 from HiPresta for PrestaShop, a guest can perform SQL injection via HiCpProductGetter::getViewedProduct().`
|
[] |
|
GHSA-4pj4-372m-4fxh
|
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113262406
|
[] |
|
GHSA-cv67-23pp-jfh2
|
In the Linux kernel, the following vulnerability has been resolved:libbpf: Prevent null-pointer dereference when prog to load has no BTFIn bpf_objec_load_prog(), there's no guarantee that obj->btf is non-NULL
when passing it to btf__fd(), and this function does not perform any
check before dereferencing its argument (as bpf_object__btf_fd() used to
do). As a consequence, we get segmentation fault errors in bpftool (for
example) when trying to load programs that come without BTF information.v2: Keep btf__fd() in the fix instead of reverting to bpf_object__btf_fd().
|
[] |
|
GHSA-j79m-7c8r-83mc
|
VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.
|
[] |
|
CVE-2025-30101
|
Dell PowerScale OneFS, versions 9.8.0.0 through 9.10.1.0, contain a time-of-check time-of-use (TOCTOU) race condition vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to denial of service and information tampering.
|
[] |
|
GHSA-vc6q-p6h2-hjwc
|
SQL injection vulnerability in admin/edit.asp in 8pixel.net simpleblog 2.3 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] |
|
GHSA-h9qh-wvqp-pffp
|
Multiple SQL injection vulnerabilities in index.php in Nullam Blog 0.1.2 allow remote attackers to execute arbitrary SQL commands via the (1) i parameter or (2) v parameters in a register action.
|
[] |
|
GHSA-qjh5-4v97-hr98
|
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (device reload) via a high volume of SIP traffic, aka Bug ID CSCsr65901.
|
[] |
|
GHSA-9593-96fp-8w9m
|
The authenticate function in LDAPUserFolder/LDAPUserFolder.py in zope-ldapuserfolder 2.9-1 does not verify the password for the emergency account, which allows remote attackers to gain privileges.
|
[] |
|
CVE-2019-7840
|
ColdFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 and earlier have a deserialization of untrusted data vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:coldfusion:11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:11.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*"
] |
|
CVE-2021-20121
|
The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is vulnerable to an authenticated arbitrary file read. An authenticated user with physical access to the device can read arbitrary files from the device by preparing and connecting a specially prepared USB drive to the device, and making a series of crafted requests to the device's web interface.
|
[
"cpe:2.3:o:telus:prv65b444a-s-ts_firmware:3.00.20:*:*:*:*:*:*:*",
"cpe:2.3:h:telus:prv65b444a-s-ts:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-4082
|
The HCL Connections 5.5 help system is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
|
[
"cpe:2.3:a:hcltech:connections:5.5:*:*:*:*:*:*:*"
] |
|
GHSA-wg24-7m7r-fcx2
|
The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to an Open Redirect via the `page` POST parameter in the `npBulkActions`, `npBulkEdit`, `npListingSort`, and `npCategoryFilter` `admin_post` actions.
|
[] |
|
CVE-2006-2120
|
The TIFFToRGB function in libtiff before 3.8.1 allows remote attackers to cause a denial of service (crash) via a crafted TIFF image with Yr/Yg/Yb values that exceed the YCR/YCG/YCB values, which triggers an out-of-bounds read.
|
[
"cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*"
] |
|
CVE-2005-1721
|
Buffer overflow in the legacy client support for AFP Server for Mac OS X 10.4.1 allows attackers to execute arbitrary code.
|
[
"cpe:2.3:a:apple:afp_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-2684
|
Jetbox CMS 2.1 allows remote attackers to obtain sensitive information via (1) a direct request to (a) main_page.php, (b) open_tree.php, and (c) outputs.php; (2) a malformed view parameter to index.php, as demonstrated with an SQL injection manipulation; or (3) the id[] parameter to admin/cms/opentree.php, which reveals the installation path in the resulting error message.
|
[
"cpe:2.3:a:jetbox:jetbox_cms:2.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-24418
|
Smooth Scroll Page Up/Down Buttons <= 1.4 - Authenticated Stored XSS via psb_positioning
|
The Smooth Scroll Page Up/Down Buttons WordPress plugin through 1.4 does not properly sanitise and validate its psb_positioning settings, allowing high privilege users such as admin to set an XSS payload in it, which will be executed in all pages of the blog
|
[
"cpe:2.3:a:smooth_scroll_page_up\\/down_buttons_project:smooth_scroll_page_up\\/down_buttons:*:*:*:*:*:wordpress:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.