id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-84wf-fhj3-88jw
|
Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] |
|
CVE-2000-0576
|
Oracle Web Listener for AIX versions 4.0.7.0.0 and 4.0.8.1.0 allows remote attackers to cause a denial of service via a malformed URL.
|
[
"cpe:2.3:a:oracle:web_listener:4.0.7:*:aix:*:*:*:*:*",
"cpe:2.3:a:oracle:web_listener:4.0.8:*:aix:*:*:*:*:*"
] |
|
GHSA-whg5-wc48-659m
|
The msrle_decode_frame function in libavcodec/msrle.c in FFmpeg before 2.1.4 does not properly calculate line sizes, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Microsoft RLE video data.
|
[] |
|
CVE-2020-18392
|
Stack overflow vulnerability in parse_array Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
|
[
"cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*"
] |
|
GHSA-pfwp-8pq4-g7pv
|
Incomplete List of Disallowed Inputs in SOFA-Hessian
|
SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget.
|
[] |
CVE-2016-0757
|
OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image.
|
[
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2015.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2018-11049
|
RSA Identity Governance and Lifecycle Uncontrolled Search Path Vulnerability
|
RSA Identity Governance and Lifecycle, RSA Via Lifecycle and Governance, and RSA IMG releases have an uncontrolled search vulnerability. The installation scripts set an environment variable in an unintended manner. A local authenticated malicious user could trick the root user to run malicious code on the targeted system.
|
[
"cpe:2.3:a:emc:rsa_identity_governance_and_lifecycle:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:rsa_via_lifecycle_and_governance:7.0:*:*:*:*:*:*:*"
] |
GHSA-q9rx-4p5p-q33x
|
A maliciously crafted STP, CATPART or MODEL file when parsed in ASMKERN228A.dll through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
|
[] |
|
GHSA-825g-f3g2-6vxf
|
QuickApps CMS Cross-site Scripting
|
QuickApps CMS version 2.0.0 is vulnerable to Stored Cross-site Scripting in the user's real name field resulting in denial of service and performing unauthorised actions with an administrator user's account
|
[] |
CVE-2020-27606
|
BigBlueButton before 2.2.28 (or earlier) does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
|
[
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-10393
|
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-field.php by adding a question mark (?) followed by the payload.
|
[
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-h9w3-3v6q-p98r
|
Cross-site scripting (XSS) vulnerability in the group moderation screen in the control center (control.php) in Phorum before 5.2.19 allows remote attackers to inject arbitrary web script or HTML via the group parameter.
|
[] |
|
CVE-2016-10895
|
The option-tree plugin before 2.6.0 for WordPress has XSS via an add_list_item or add_social_links AJAX request.
|
[
"cpe:2.3:a:optiontree_project:optiontree:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2023-2795
|
CodeColorer < 0.10.1 – Admin+ Stored Cross-Site Scripting
|
The CodeColorer WordPress plugin before 0.10.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[
"cpe:2.3:a:codecolorer_project:codecolorer:*:*:*:*:*:wordpress:*:*"
] |
GHSA-mfw8-6m9g-8vvr
|
Path Traversal and Unrestricted File Upload exists in the Ninja Forms plugin before 3.0.23 for WordPress (when the Uploads add-on is activated). This allows an attacker to traverse the file system to access files and execute code via the includes/fields/upload.php (aka upload/submit page) name and tmp_name parameters.
|
[] |
|
CVE-2024-10965
|
emqx neuron JSON File schema information disclosure
|
A vulnerability classified as problematic was found in emqx neuron up to 2.10.0. Affected by this vulnerability is an unknown functionality of the file /api/v2/schema of the component JSON File Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The patch is named c9ce39747e0372aaa2157b2b56174914a12c06d8. It is recommended to apply a patch to fix this issue.
|
[
"cpe:2.3:a:emqx:neuron:*:*:*:*:*:*:*:*"
] |
CVE-2003-0424
|
Apple QuickTime / Darwin Streaming Server before 4.1.3f allows remote attackers to obtain the source code for scripts by appending encoded space (%20) or . (%2e) characters to an HTTP request for the script, e.g. view_broadcast.cgi.
|
[
"cpe:2.3:a:apple:darwin_streaming_server:4.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-9wf4-438r-vqf9
|
Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter under /admin/?page=members/view_member&id=2.
|
[] |
|
GHSA-gvgx-373w-cg37
|
A vulnerability was found in Tongda OA 2017 up to 11.10. It has been rated as critical. Affected by this issue is some unknown functionality of the file /general/approve_center/query/list/input_form/delete_data_attach.php. The manipulation of the argument RUN_ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-5h47-9rm5-fx3f
|
Evolution CMS Cross-site Scripting vulnerability
|
Cross-site scripting (XSS) vulnerability in evolution evo v.3.2.3 allows a local attacker to execute arbitrary code via a crafted payload injected uid parameter.
|
[] |
CVE-2014-3962
|
Multiple SQL injection vulnerabilities in Videos Tube 1.0 allow remote attackers to execute arbitrary SQL commands via the url parameter to (1) videocat.php or (2) single.php.
|
[
"cpe:2.3:a:videos_tube_project:videos_tube:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2004-1914
|
SQL injection vulnerability in modules.php in NukeCalendar 1.1.a, as used in PHP-Nuke, allows remote attackers to execute arbitrary SQL commands via the eid parameter.
|
[
"cpe:2.3:a:francisco_burzi:php-nuke:8.0_final:*:*:*:*:*:*:*",
"cpe:2.3:a:shiba-design:nukecalendar:1.1.a:*:*:*:*:*:*:*"
] |
|
GHSA-qfr3-fjjr-8qjm
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] |
|
GHSA-44cv-hr8r-whc9
|
An unclaimed Amazon S3 bucket, 'codeconf', is referenced in an audio file link within the .rst documentation file. This bucket has been claimed by an external party. The use of this unclaimed S3 bucket could lead to data integrity issues, data leakage, availability problems, loss of trustworthiness, and potential further attacks if the bucket is used to host malicious content or as a pivot point for further attacks.
|
[] |
|
GHSA-vqqr-hhw5-5mrg
|
VMware Workspace ONE Access and Identity Manager contain a URL injection vulnerability. A malicious actor with network access may be able to redirect an authenticated user to an arbitrary domain.
|
[] |
|
CVE-2019-5221
|
There is a path traversal vulnerability on Huawei Share. The software does not properly validate the path, an attacker could crafted a file path when transporting file through Huawei Share, successful exploit could allow the attacker to transport a file to arbitrary path on the phone. Affected products: Mate 20 X versions earlier than Ever-L29B 9.1.0.300(C432E3R1P12), versions earlier than Ever-L29B 9.1.0.300(C636E3R2P1), and versions earlier than Ever-L29B 9.1.0.300(C185E3R3P1).
|
[
"cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-6503
|
code-projects Inventory Management System fetchSelectedCategories.php sql injection
|
A vulnerability was found in code-projects Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /php_action/fetchSelectedCategories.php. The manipulation of the argument categoriesId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2019-16067
|
NETSAS Enigma NMS 65.0.0 and prior utilises basic authentication over HTTP for enforcing access control to the web application. The use of weak authentication transmitted over cleartext protocols can allow an attacker to steal username and password combinations by intercepting authentication traffic in transit.
|
[
"cpe:2.3:a:netsas:enigma_network_management_solution:*:*:*:*:*:*:*:*"
] |
|
GHSA-ggxj-x4rp-877f
|
Google Chrome before 17.0.963.46 does not properly decode audio data, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
|
[] |
|
CVE-2020-0877
|
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0788, CVE-2020-0887.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-16310
|
Technicolor TG588V V2 devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: this might overlap CVE-2018-15852 and CVE-2018-15907. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions
|
[
"cpe:2.3:h:technicolor:tg588v:2:*:*:*:*:*:*:*",
"cpe:2.3:o:technicolor:tg588v_firmware:-:*:*:*:*:*:*:*"
] |
|
GHSA-mq6f-5xh5-hgcf
|
Harbor timing attack risk
|
In the Harbor jobservice container, the comparison of secrets in the authenticator type is prone to timing attacks. The vulnerability occurs due to the following code: https://github.com/goharbor/harbor/blob/aaea068cceb4063ab89313d9785f2b40f35b0d63/src/jobservice/api/authenticator.go#L69-L69
To avoid this issue, constant time comparison should be used.ImpactThis attack might be possible theoretically, but no workable proof of concept is available, and access complexity is set at High.
The jobservice exposes these APIsIt is used to create jobs/stop job tasks and retrieve job task information. If an attacker obtains the secrets, it is possible to retrieve the job information, create a job, or stop a job task.The following versions of Harbor are involved:
<=Harbor 2.8.2, <=Harbor 2.7.2, <= Harbor 2.6.x, <=Harbor 1.10.17PatchesHarbor 2.8.3, Harbor 2.7.3, Harbor 1.10.18WorkaroundsBecause the jobservice only exposes HTTP service to harbor-core containers, blocking any inbound traffic from the external network to the jobservice container can reduce the risk.CreditsThanks to Porcupiney Hairs for reporting this issue.
|
[] |
GHSA-9c6g-fxpf-p2p8
|
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator and WebSafe software version 13.0.0, 12.0.0 - 12.1.2, 11.6.0 - 11.6.1 and 11.5.0 - 11.5.4, in some circumstances, Traffic Management Microkernel (TMM) does not properly handle certain malformed TLS1.2 records, which allows remote attackers to cause a denial-of-service (DoS) or possible remote command execution on the BIG-IP system.
|
[] |
|
CVE-2023-25539
|
Dell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.
|
[
"cpe:2.3:a:dell:networker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:networker:19.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-3354
|
Cisco IOS 12.0, 12.2, 12.4, 15.0, 15.1, 15.2, and 15.3 and IOS XE 2.x and 3.x before 3.7.4S; 3.2.xSE and 3.3.xSE before 3.3.2SE; 3.3.xSG and 3.4.xSG before 3.4.4SG; and 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S allow remote attackers to cause a denial of service (device reload) via malformed RSVP packets, aka Bug ID CSCui11547.
|
[
"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1s\\(.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\\(2\\)xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s\\(.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s\\(.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s\\(.5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4s\\(.6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7s\\(.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s\\(.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9s\\(.2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10s\\(.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s:*:*:*:*:*:*:*"
] |
|
CVE-2017-16095
|
serverliujiayi1 is a simple http server. serverliujiayi1 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
|
[
"cpe:2.3:a:serverliujiayi1_project:serverliujiayi1:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2025-20125
|
Cisco Identity Services Engine Insufficient Authorization Bypass Vulnerability
|
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node.
This vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to attacker to obtain information, modify system configuration, and reload the device.
Note: To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
|
[] |
GHSA-q8f5-jfgc-wgv5
|
SQL injection vulnerability in the Almond Classifieds (com_aclassf) component 5.6.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.
|
[] |
|
CVE-2021-37918
|
Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.
|
[
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7110:*:*:*:*:*:*"
] |
|
GHSA-pxq3-h2cm-cxrj
|
Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file.
|
[] |
|
GHSA-qrcm-99p5-fwr8
|
The FunnelKit Funnel Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'allow_iframe_tag_in_post' function which uses the 'wp_kses_allowed_html' filter to globally allow script and iframe tags in posts in all versions up to, and including, 3.4.5. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
GHSA-px9r-xxrx-3xj6
|
A logic issue was addressed with improved state management. This issue is fixed in iOS 14.8 and iPadOS 14.8. A remote attacker may be able to cause arbitrary code execution.
|
[] |
|
GHSA-mvg9-xffr-p774
|
Out of bounds read in Pillow
|
An issue was discovered in Pillow before 8.2.0. In `TiffDecode.c`, there is an out-of-bounds read in `TiffreadRGBATile` via invalid tile boundaries.
|
[] |
GHSA-3cpr-9mc9-3vfm
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: Fix double free in hci_conn_cleanupsyzbot reports a slab use-after-free in hci_conn_hash_flush [1].
After releasing an object using hci_conn_del_sysfs in the
hci_conn_cleanup function, releasing the same object again
using the hci_dev_put and hci_conn_put functions causes a double free.
Here's a simplified flow:hci_conn_del_sysfs:
hci_dev_put
put_device
kobject_put
kref_put
kobject_release
kobject_cleanup
kfree_const
kfree(name)hci_dev_put:
...
kfree(name)hci_conn_put:
put_device
...
kfree(name)This patch drop the hci_dev_put and hci_conn_put function
call in hci_conn_cleanup function, because the object is
freed in hci_conn_del_sysfs function.This patch also fixes the refcounting in hci_conn_add_sysfs() and
hci_conn_del_sysfs() to take into account device_add() failures.This fixes CVE-2023-28464.
|
[] |
|
GHSA-96hm-xqc5-vqv9
|
The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wprm-recipe-roundup-item shortcode in all versions up to, and including, 9.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
CVE-2018-5373
|
The Smooth Slider plugin through 2.8.6 for WordPress has SQL Injection via smooth-slider.php (trid parameter).
|
[
"cpe:2.3:a:slidervilla:smooth_slider:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2013-1195
|
The time-based ACL implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly handle periodic statements for the time-range command, which allows remote attackers to bypass intended access restrictions by sending network traffic during denied time periods, aka Bug IDs CSCuf79091 and CSCug45850.
|
[
"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:*"
] |
|
GHSA-h6c2-879r-jffh
|
Joplin Desktop App vulnerable to Cross-site Scripting
|
Cross Site Scripting vulnerability in Joplin Desktop App before v2.9.17 allows attacker to execute arbitrary code via improper santization.
|
[] |
CVE-2025-53925
|
Emlog has Stored Cross-site Scripting vulnerability in file upload functionality
|
Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows authenticated remote attackers to inject arbitrary web script or HTML via the file upload functionality. As an authenticated user it is possible to upload an .svg file that contains JavaScript code that is later executed. As of time of publication, no known patched versions exist.
|
[] |
GHSA-x5f5-hxh4-fhq6
|
A vulnerability in the CLI of the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to perform a command injection attack. More Information: CSCvb61384 CSCvb86764. Known Affected Releases: 2.0(1.68) 3.1(1k)A. Known Fixed Releases: 92.2(1.101) 92.1(1.1647).
|
[] |
|
CVE-2020-18735
|
A heap buffer overflow in /src/dds_stream.c of Eclipse IOT Cyclone DDS Project v0.1.0 causes the DDS subscriber server to crash.
|
[
"cpe:2.3:a:eclipse:cyclone_data_distribution_service:0.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-gc73-9mw9-ww3c
|
Buffer overflow in BankTown Client Control (aka BtCxCtl20Com) 1.4.2.51817, and possibly 1.5.2.50209, allows remote attackers to execute arbitrary code via a long string in the first argument to SetBannerUrl. NOTE: portions of these details are obtained from third party information.
|
[] |
|
CVE-2025-44557
|
A state machine transition flaw in the Bluetooth Low Energy (BLE) stack of Cypress PSoC4 v3.66 allows attackers to bypass the pairing process and authentication via a crafted pairing_failed packet.
|
[] |
|
CVE-2018-5744
|
A specially crafted packet can cause named to leak memory
|
A failure to free memory can occur when processing messages having a specific combination of EDNS options. Versions affected are: BIND 9.10.7 -> 9.10.8-P1, 9.11.3 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.10.7-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected.
|
[
"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*",
"cpe:2.3:a:isc:bind:9.10.8:-:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.5:-:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*",
"cpe:2.3:a:isc:bind:9.12.3:-:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.12.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.12.3:rc1:*:*:*:*:*:*"
] |
CVE-2020-25160
|
B. Braun SpaceCom, Battery Pack SP with Wi-Fi, and Data module compactplus
|
Improper access controls in the B. Braun Melsungen AG SpaceCom Version L81/U61 and earlier, and the Data module compactplus Versions A10 and A11 enables attackers to extract and tamper with the devices network configuration.
|
[
"cpe:2.3:o:bbraun:datamodule_compactplus:a10:*:*:*:*:*:*:*",
"cpe:2.3:o:bbraun:datamodule_compactplus:a11:*:*:*:*:*:*:*",
"cpe:2.3:h:bbraun:datamodule_compactplus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bbraun:spacecom:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bbraun:spacecom:-:*:*:*:*:*:*:*"
] |
GHSA-cm25-3w73-47rf
|
Net-SNMP 5.8 has a heap-based buffer overflow because a call to netsnmp_memdup is mishandled by netsnmp_table_set_add_default_row.
|
[] |
|
GHSA-cccm-3vq5-cxqg
|
A vulnerability was found in elunez eladmin up to 2.7 and classified as critical. This issue affects some unknown processing of the file /api/deploy/upload /api/database/upload of the component Database Management/Deployment Management. The manipulation of the argument file leads to path traversal: 'dir/../../filename'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273551.
|
[] |
|
GHSA-x5wr-4whf-hp72
|
Sourcecodester Hotel and Lodge Management System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the id parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.
|
[] |
|
GHSA-3g3f-pff6-g3m3
|
IBM Security Guardium 11.3, 11.4, and 11.5 is potentially vulnerable to CSV injection. A remote attacker could execute malicious commands due to improper validation of csv file contents. IBM X-Force ID: 265262.
|
[] |
|
GHSA-8hxm-42v5-66hm
|
Moodle vulnerable to Cross-Site Request Forgery
|
Multiple cross-site request forgery (CSRF) vulnerabilities in mod/wiki/ components in Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allow remote attackers to hijack the authentication of arbitrary users for requests that modify wiki data.
|
[] |
CVE-2008-5087
|
SQL injection vulnerability in TYPO3 Another Backend Login (wrg_anotherbelogin) extension before 0.0.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:another_backend_login:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:another_backend_login:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:another_backend_login:0.0.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-46256
|
Path traversal in GitHub Enterprise Server leading to remote code execution in GitHub Pages
|
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5 and 3.7.2. This vulnerability was reported via the GitHub Bug Bounty program.
|
[
"cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*"
] |
CVE-2023-51415
|
WordPress GiveWP Plugin <= 3.2.2 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GiveWP GiveWP – Donation Plugin and Fundraising Platform allows Stored XSS.This issue affects GiveWP – Donation Plugin and Fundraising Platform: from n/a through 3.2.2.
|
[
"cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*"
] |
GHSA-4x29-4984-2qcp
|
The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows remote attackers to cause a denial of service (crash) via a crafted AVI file that triggers a divide-by-zero error.
|
[] |
|
GHSA-jggq-92ww-7r4w
|
Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
|
[] |
|
GHSA-98c2-3mpw-gw7c
|
The Visitors WordPress plugin through 0.3 is affected by an Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability. The plugin would display the user's user agent string without validation or encoding within the WordPress admin panel.
|
[] |
|
CVE-2023-51564
|
Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files.
The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21606.
|
[
"cpe:2.3:a:kofax:power_pdf:*:*:*:*:*:*:*:*"
] |
GHSA-gm38-v6gv-jm89
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CR2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11332.
|
[] |
|
GHSA-vhqg-5v8p-7r24
|
Stack-based buffer overflow in the IMAP service in NetWin Surgemail 3.8k4-4 and earlier allows remote authenticated users to execute arbitrary code via a long first argument to the LIST command.
|
[] |
|
GHSA-j772-hpmw-32rm
|
OpenStack Horizon Cross-site scripting (XSS) vulnerability
|
Cross-site scripting (XSS) vulnerability in the refresh mechanism in the log viewer in `horizon/static/horizon/js/horizon.js` in OpenStack Dashboard (Horizon) folsom-1 and 2012.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the guest console.
|
[] |
GHSA-28rc-hxmf-wqhx
|
Rejected reason: Not used
|
[] |
|
GHSA-3jhm-87m6-x959
|
Path traversal mitigation bypass in OctoRPKI
|
ImpactThe existing URI path filters in OctoRPKI (version < 1.4.3) mitigating Path traversal vulnerability could be bypassed by an attacker. In case a malicious TAL file is parsed, it was possible to write files outside the base cache folder.Specific Go Packages Affectedgithub.com/cloudflare/cfrpki/cmd/octorpkiPatchesThe issue was fixed in version 1.4.3References[CVE-2021-3907](https://www.cvedetails.com/cve/CVE-2021-3907/)
|
[] |
CVE-2025-43560
|
ColdFusion | Improper Input Validation (CWE-20)
|
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. A high-privileged attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
|
[] |
GHSA-jq2f-3xc4-634f
|
Revive Adserver before 3.2.3 suffers from Improper Restriction of Excessive Authentication Attempts. The login page of Revive Adserver is vulnerable to password-guessing attacks. An account lockdown feature was considered, but rejected to avoid introducing service disruptions to regular users during such attacks. A random delay has instead been introduced as a countermeasure in case of password failures, along with a system to discourage parallel brute forcing. These systems will effectively allow the valid users to log in to the adserver, even while an attack is in progress.
|
[] |
|
CVE-2024-9221
|
Tainacan <= 0.21.10 - Reflected Cross-Site Scripting
|
The Tainacan plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.21.10. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:leogermani:tainacan:*:*:*:*:*:*:*:*"
] |
GHSA-rxvc-rwp4-p484
|
The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the legacy Image widget in all versions up to, and including, 2.29.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
CVE-2013-2848
|
The XSS Auditor in Google Chrome before 27.0.1453.93 might allow remote attackers to obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*"
] |
|
CVE-2021-33972
|
Buffer Overflow vulnerability in Qihoo 360 Safe Browser v13.0.2170.0 allows attacker to escalate priveleges.
|
[
"cpe:2.3:a:browser.360:safe_browser:12.3.1611.0:*:*:*:*:*:*:*"
] |
|
GHSA-h7h6-qvjq-8mhm
|
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in watchOS 7.0, tvOS 14.0, macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave, iOS 14.0 and iPadOS 14.0. Playing a malicious audio file may lead to arbitrary code execution.
|
[] |
|
GHSA-rxf2-6gjw-pqpg
|
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&social=remove&sid=2.
|
[] |
|
GHSA-6cg2-4798-gw4g
|
LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
|
[] |
|
CVE-2024-23256
|
A logic issue was addressed with improved state management. This issue is fixed in iOS 17.4 and iPadOS 17.4. A user's locked tabs may be briefly visible while switching tab groups when Locked Private Browsing is enabled.
|
[
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-87pj-9q82-m9qh
|
GitHub Authentication Plugin showed plain text client secret in configuration form
|
An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.
|
[] |
CVE-2006-4032
|
Unspecified vulnerability in Cisco IOS CallManager Express (CME) allows remote attackers to gain sensitive information (user names) from the Session Initiation Protocol (SIP) user directory via certain SIP messages, aka bug CSCse92417.
|
[
"cpe:2.3:h:cisco:callmanager_express:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-q38m-p7rw-6h5p
|
In MediaProvider, there is a possible permissions bypass due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-140729887
|
[] |
|
GHSA-r5q2-q7r4-9p62
|
Cross-Site Request Forgery (CSRF) vulnerability in Naresh Parmar Post View Count plugin <= 1.8.2 versions.
|
[] |
|
GHSA-9gf6-5j7x-x3m9
|
Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).
|
[] |
|
CVE-2018-1470
|
IBM Sterling File Gateway 2.2.0 through 2.2.6 could allow a remote authenticated attacker to obtain sensitive information displayed in the URL that could lead to further attacks against the system. IBM X-Force ID: 140688.
|
[
"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-6995
|
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] |
|
GHSA-rj55-jv57-g48f
|
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
|
[] |
|
CVE-2023-42057
|
PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20930.
|
[
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.5.368.0:*:*:*:*:*:*:*"
] |
CVE-2020-36405
|
Keystone Engine 0.9.2 has a use-after-free in llvm_ks::X86Operand::getToken.
|
[
"cpe:2.3:a:keystone-engine:keystone_engine:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
GHSA-gh5f-hwc4-h7mx
|
Integer overflow in app/aboot/aboot.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 devices allows attackers to bypass intended access restrictions via a crafted block count and block size of a sparse header, aka Android internal bug 28822465 and Qualcomm internal bug CR813933.
|
[] |
|
GHSA-4vwm-gcfx-wvpw
|
A vulnerability was found in SourceCodester Online Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/adminHome.php. The manipulation of the argument sliderpic leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264481 was assigned to this vulnerability.
|
[] |
|
CVE-2023-1168
|
Authenticated Remote Code Execution in Aruba CX Switches
|
An authenticated remote code execution vulnerability
exists in the AOS-CX Network Analytics Engine. Successful
exploitation of this vulnerability results in the ability to
execute arbitrary code as a privileged user on the underlying
operating system, leading to a complete compromise of the
switch running AOS-CX.
|
[
"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_10000-48y6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_6200f_48g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_6200m_24g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_6300m_24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_6300m_48g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8320-32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8320-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8325-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8325-48y8c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8360-12c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8360-16y2c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8360-24xf2c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8360-32y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8360-48xt4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8360-48y6c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_8400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:aruba_cx_9300_32d:-:*:*:*:*:*:*:*"
] |
CVE-2020-12894
|
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
|
[
"cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-39409
|
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Business Process Automation). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Transportation Management. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
|
[
"cpe:2.3:a:oracle:transportation_management:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.5.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-12060
|
WP Media Optimizer (.webp) <= 1.4.0 - Reflected Cross-Site Scripting via wpmowebp-css-resources and wpmowebp-js-resources Parameters
|
The WP Media Optimizer (.webp) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘wpmowebp-css-resources’ and 'wpmowebp-js-resources' parameters in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] |
GHSA-cf3h-vjg3-v2hx
|
Deserialization of Untrusted Data vulnerability in ProfilePress Membership Team Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress.This issue affects Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress: from n/a through 4.3.2.
|
[] |
|
CVE-2007-4356
|
Microsoft Internet Explorer 6 and 7 embeds FTP credentials in HTML files that are retrieved during an FTP session, which allows context-dependent attackers to obtain sensitive information by reading the HTML source, as demonstrated by a (1) .htm, (2) .html, or (3) .mht file.
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.