id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2019-20627
|
AutoUpdater.cs in AutoUpdater.NET before 1.5.8 allows XXE.
|
[
"cpe:2.3:a:rbsoft:autoupdater.net:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
CVE-2024-30528
|
WordPress Spiffy Calendar plugin <= 4.9.10 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Spiffy Plugins Spiffy Calendar.This issue affects Spiffy Calendar: from n/a through 4.9.10.
|
[
"cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 5.4
| null | null | null |
GHSA-5mwq-xh9g-83gq
|
A stored cross-site scripting (XSS) vulnerability in /index.php?page=category_list of Online Jewelry Shop v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Category Name parameter.
|
[] | null | 5.4
| null | null | null |
|
GHSA-v5gf-r78h-55q6
|
document-merge-service vulnerable to Remote Code Execution via Server-Side Template Injection
|
ImpactA remote code execution (RCE) via server-side template injection (SSTI) allows for user supplied code to be executed in the server's context where it is executed as the document-merge-server user with the UID 901 thus giving an attacker considerable control over the container.PatchesIt has been patched in v6.5.2Referenceshttps://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection/jinja2-sstiPOCAdd the following to a document, upload and render it:The index might be different, so to debug this first render a template with `{{ PLACEHOLDER.__class__.__mro__[1].__subclasses__() }}` and then get the index of `subprocess.Popen` and replace 202 with that.
|
[] | null | 9.1
| null | null | null |
GHSA-qvjx-h46h-h827
|
Cross-site scripting (XSS) vulnerability in Junos Space before 15.2R2 allows remote attackers to steal sensitive information or perform certain administrative actions.
|
[] | null | null | 6.1
| null | null |
|
CVE-2006-2844
|
Multiple PHP remote file inclusion vulnerabilities in Redaxo 3.0 allow remote attackers to execute arbitrary PHP code via a URL in the REX[INCLUDE_PATH] parameter to (1) simple_user/pages/index.inc.php and (2) stats/pages/index.inc.php.
|
[
"cpe:2.3:a:redaxo:redaxo:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-qj9v-7hv9-cw8w
|
SQL injection vulnerability in the Tiny Market (hm_tinymarket) extension 0.5.4 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-31612
|
An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
|
[
"cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*"
] | null | 7.5
| null | null | null |
|
CVE-2017-17290
|
The Light Directory Access Protocol (LDAP) clients of Huawei TE60 with software V600R006C00, ViewPoint 9030 with software V100R011C02, V100R011C03 have a resource management errors vulnerability. An unauthenticated, remote attacker may make the LDAP server not respond to the client's request by controlling the LDAP server. Due to improper management of LDAP connection resource, a successful exploit may cause the connection resource exhausted of the LDAP client.
|
[
"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2018-12678
|
Portainer before 1.18.0 supports unauthenticated requests to the websocket endpoint with an unvalidated id query parameter for the /websocket/exec endpoint, which allows remote attackers to bypass intended access restrictions or conduct SSRF attacks.
|
[
"cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*"
] | null | null | 9.8
| 7.5
| null |
|
CVE-2025-29523
|
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping6 function.
|
[] | null | 7.2
| null | null | null |
|
CVE-2023-36033
|
Windows DWM Core Library Elevation of Privilege Vulnerability
|
Windows DWM Core Library Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
GHSA-9cr9-j2r9-7m87
|
Cross-site scripting vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-vvg7-3vpg-wq97
|
Amazon FreeRTOS up to and including v1.4.8 for AWS lacks length checking in prvProcessReceivedPublish, resulting in leakage of arbitrary memory contents on a device to an attacker. An attacker sends a malformed MQTT publish packet, and waits for an MQTTACK packet containing the leaked data.
|
[] | null | 7.5
| null | null | null |
|
GHSA-v567-j6g5-phvx
|
During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
|
[] | null | 6.5
| null | null | null |
|
GHSA-fr94-f6f6-4wxj
|
A vulnerability was found in SourceCodester Online Food Ordering System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /fos/admin/ajax.php?action=save_settings of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be launched remotely. VDB-223214 is the identifier assigned to this vulnerability.
|
[] | null | 9.8
| null | null | null |
|
GHSA-f5ch-pqm5-5632
|
IBM InfoSphere Information Server could allow an authenticated user to consume file space resources due to unrestricted file uploads. IBM X-Force ID: 298279.
|
[] | null | 6.5
| null | null | null |
|
GHSA-rg97-cq96-v6fx
|
The files function in the administration section in CS-Cart 4.6.2 and earlier allows attackers to execute arbitrary PHP code via vectors involving a custom page.
|
[] | null | null | 7.2
| null | null |
|
CVE-2013-5848
|
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and JavaFX 2.2.40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
|
[
"cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.21:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-v9q2-wpg8-f6j6
|
Missing Authorization vulnerability in bPlugins Tiktok Feed allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Tiktok Feed: from n/a through 1.0.21.
|
[] | null | 7.1
| null | null | null |
|
CVE-2010-0610
|
Multiple SQL injection vulnerabilities in the Photoblog (com_photoblog) component for Joomla! allow remote attackers to execute arbitrary SQL commands via the blog parameter in an images action to index.php. NOTE: a separate vector for the id parameter to detail.php may also exist.
|
[
"cpe:2.3:a:webguerilla:com_photoblog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2021-21487
|
SAP Payment Engine version 500, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
|
[
"cpe:2.3:a:sap:payment_engine:500:*:*:*:*:*:*:*"
] | null | null | 6.8
| null | null |
|
GHSA-mpr3-94w6-rc26
|
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite,
versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability.
|
[] | null | 9.8
| null | null | null |
|
CVE-2016-7282
|
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Browser Information Disclosure Vulnerability."
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
GHSA-5mrw-645j-x2vj
|
SQL injection vulnerability in system/index.php in Audins Audiens 3.3 allows remote attackers to execute arbitrary SQL commands via the PHPSESSID cookie. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-v5c4-vv55-556f
|
EyouCMS V1.5.8-UTF8-SP1 is vulnerable to Cross Site Request Forgery (CSRF) via the background, column management function and add.
|
[] | null | 8.8
| null | null | null |
|
GHSA-5j5p-cr5c-763j
|
An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The Access Control in the bundled media browser is broken, which allows an unauthenticated attacker to perform requests to the pixx.io API for the configured API user. This allows an attacker to download various media files from the DAM system.
|
[] | null | 8.8
| null | null | null |
|
GHSA-g3rq-g295-4j3m
|
Regular Expression Denial of Service (ReDoS) in Jinja2
|
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
|
[] | 6.9
| 5.3
| null | null | null |
GHSA-fv6q-cpfx-7rj8
|
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 162239
|
[] | null | 6.5
| null | null | null |
|
GHSA-46p6-x25q-mhqr
|
Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected congiguration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected congiguration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
|
[] | null | null | 9.8
| null | null |
|
GHSA-m9jp-5r56-gqvq
|
Multiple cross-site scripting (XSS) vulnerabilities in yorumkaydet.asp in Dersimiz Haber Ekleme Modulu allow remote attackers to inject arbitrary web script or HTML via the (1) yazan, (2) mail, and (3) yorum parameters. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2025-7103
|
BoyunCMS curl Index.php server-side request forgery
|
A vulnerability was found in BoyunCMS up to 1.4.20. It has been rated as critical. This issue affects some unknown processing of the file /application/pay/controller/Index.php of the component curl. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3
| 6.3
| 6.3
| 6.5
| null |
CVE-2024-39162
|
pyspider through 0.3.10 allows /update XSS. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
[] | null | 6.1
| null | null | null |
|
CVE-2018-13684
|
The mintToken function of a smart contract implementation for ZIP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:zip_project:zip:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2010-3491
|
The (1) ActiveMatrix Runtime and (2) ActiveMatrix Administrator components in TIBCO ActiveMatrix Service Grid before 2.3.1, ActiveMatrix Service Bus before 2.3.1, ActiveMatrix BusinessWorks Service Engine before 5.8.1, and ActiveMatrix Service Performance Manager before 1.3.2 do not properly handle JMX connections, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service via unspecified vectors.
|
[
"cpe:2.3:a:tibco:activematrix_businessworks_service_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_bus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_grid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_performance_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-5qmc-pjcc-q3m7
|
An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. A reflected cross-site scripting (XSS) vulnerability in admin/cgi-bin/listdir.pl allows authenticated remote administrators to inject arbitrary web script or HTML into an HTTP GET parameter (which reflect the user input without sanitization).
|
[] | null | 4.8
| null | null | null |
|
CVE-2016-7175
|
epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.5:*:*:*:*:*:*:*"
] | null | null | 5.9
| 4.3
| null |
|
GHSA-3r4g-mm9v-9r4p
|
Buffer overflow in the IMAP service for SPA-PRO Mail @Solomon 4.00 allows remote authenticated users to execute arbitrary code via a long CREATE command.
|
[] | null | null | null | null | null |
|
GHSA-mqxr-gww5-9jhp
|
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
|
[] | null | 7.5
| null | null | null |
|
CVE-2022-31176
|
Grafana Image Renderer leaking files
|
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).
|
[
"cpe:2.3:a:grafana:grafana-image-renderer:*:*:*:*:*:grafana:*:*"
] | null | 8.3
| null | null | null |
CVE-2014-4199
|
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, allows local users to write to arbitrary files via a symlink attack on a file in /tmp.
|
[
"cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vm-support:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*"
] | null | null | null | 6.3
| null |
|
CVE-2014-9089
|
Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php.
|
[
"cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2024-37234
|
WordPress Academy LMS plugin <= 2.0.4 - Open Redirection vulnerability
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Kodezen Limited Academy LMS.This issue affects Academy LMS: from n/a through 2.0.4.
|
[] | null | 3.5
| null | null | null |
GHSA-wpgx-q62h-3583
|
Unspecified vulnerability in the Oracle Forms component in Oracle Application Server 10.1.2.2 and E-Business Suite 12.0.3 allows remote attackers to affect integrity via unknown vectors, aka AS04.
|
[] | null | null | null | null | null |
|
GHSA-49gg-c8j8-3j2c
|
Pexip Infinity before 34.1 has Improper Access Control for persons in a waiting room. They can see the conference roster list, and perform certain actions that should not be allowed before they are admitted to the meeting.
|
[] | null | 4.3
| null | null | null |
|
GHSA-95g7-fcwr-c2p8
|
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/renamefile.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information or make the server unserviceable.
|
[] | null | null | 8.2
| null | null |
|
GHSA-wr6h-564j-w633
|
The Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_hfe_compatibility_option_callback ()function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the compatibility option setting.
|
[] | null | 4.3
| null | null | null |
|
CVE-2014-2129
|
The SIP inspection engine in Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.48), 8.4 before 8.4(6.5), 9.0 before 9.0(3.1), and 9.1 before 9.1(2.5) allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted SIP packets, aka Bug ID CSCuh44052.
|
[
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.1
| null |
|
GHSA-x9cj-35rq-fj52
|
A remote code execution vulnerability exists in Microsoft PowerPoint 2007 Service Pack 3, Microsoft PowerPoint 2010 Service Pack 2, Microsoft PowerPoint 2013 Service Pack 1, Microsoft PowerPoint 2013 RT Service Pack 1, Microsoft PowerPoint 2016, Microsoft PowerPoint Viewer 2007, Microsoft SharePoint Server 2013 Service Pack 1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Web Apps 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8743.
|
[] | null | null | 7.8
| null | null |
|
RHSA-2024:1454
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.38 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5
| null | null | null |
CVE-2020-9674
|
Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | 6.8
| null |
|
GHSA-j4vv-mqwg-vrfp
|
Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8
| null | null | null |
|
CVE-2017-10820
|
Untrusted search path vulnerability in Installer of IP Messenger for Win 4.60 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:ipa:ip_messenger:*:*:*:*:*:windows:*:*"
] | null | null | 7.8
| 9.3
| null |
|
GHSA-r586-r9hc-jwq2
|
The HGiga OAKlouds mobile portal does not filter special characters of the IPv6 Gateway parameter of the network interface card setting page. Remote attackers can use this vulnerability to perform command injection and execute arbitrary commands in the system without logging in.
|
[] | null | null | null | null | null |
|
CVE-2023-3643
|
Boss Mini document file inclusion
|
A vulnerability was found in Boss Mini 1.4.0 Build 6221. It has been classified as critical. This affects an unknown part of the file boss/servlet/document. The manipulation of the argument path leads to file inclusion. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233889 was assigned to this vulnerability.
|
[
"cpe:2.3:o:carel:boss_mini_firmware:1.4.0:build_6221:*:*:*:*:*:*",
"cpe:2.3:h:carel:boss_mini:-:*:*:*:*:*:*:*"
] | null | 7.3
| 7.3
| 7.5
| null |
GHSA-rx94-fvxc-g9vh
|
The change password option in the Windows Security interface for Windows 2000 allows attackers to use the option to attempt to change passwords of other users on other systems or identify valid accounts by monitoring error messages, possibly due to a problem in the NetuserChangePassword function.
|
[] | null | null | null | null | null |
|
CVE-2021-42306
|
Azure Active Directory Information Disclosure Vulnerability
|
An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate keyCredential on an Azure AD Application or Service Principal (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application.
Azure AD addressed this vulnerability by preventing disclosure of any private key values added to the application.
Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information.
For more details on this issue, please refer to the MSRC Blog Entry.
|
[
"cpe:2.3:a:microsoft:azure_active_directory:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_active_site_recovery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_migrate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_automation:-:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
RHSA-2022:1139
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_lua: Possible buffer overflow when parsing multipart content httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 8.3
| null | null | null |
CVE-2021-24357
|
FooGallery < 2.0.35 - Authenticated Stored Cross-Site Scripting
|
In the Best Image Gallery & Responsive Photo Gallery – FooGallery WordPress plugin before 2.0.35, the Custom CSS field of each gallery is not properly sanitised or validated before being being output in the page where the gallery is embed, leading to a stored Cross-Site Scripting issue.
|
[
"cpe:2.3:a:fooplugins:foogallery:*:*:*:*:*:wordpress:*:*"
] | null | 5.4
| null | 3.5
| null |
GHSA-99gr-qjpq-vqh5
|
Multiple cross-site scripting (XSS) vulnerabilities in Fujitsu-Siemens WebTransactions 7.0, 7.1, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via vectors associated with (1) a demo application shipped with WebTransactions and possibly (2) an unspecified "dynamic application."
|
[] | null | null | null | null | null |
|
GHSA-cmj4-q56c-v7p7
|
SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands.
|
[] | null | 9.8
| null | null | null |
|
CVE-2020-1009
|
An elevation of privilege vulnerability exists in the way that the Microsoft Store Install Service handles file operations in protected locations, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1011, CVE-2020-1015.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | 7.2
| null |
|
CVE-2025-34232
|
Vasion Print (formerly PrinterLogic) Blind SSRF via Lexmark dellCheck.php
|
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind server-side request forgery (SSRF) vulnerability reachable via the /var/www/app/console_release/lexmark/dellCheck.php script that can be exploited by an unauthenticated user. When a printer is registered, the software stores the printer’s host name in the variable $printer_vo->str_host_address. The code later builds a URL like 'http://<host‑address>:80/DevMgmt/DiscoveryTree.xml' and sends the request with curl. No validation, whitelist, or private‑network filtering is performed before the request is made. Because the request is blind, an attacker cannot see the data directly, but can still: probe internal services, trigger internal actions, or gather other intelligence. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
|
[] | 6.9
| null | null | null | null |
GHSA-r7v4-jwx9-wx43
|
Authorization Bypass Through User-Controlled Key when using CILogonOAuthenticator oauthenticator
|
BackgroundCILogon is a federated auth provider that allows users to authenticate
themselves via a number of Identity Providers (IdP), focused primarily on educational and
research institutions (such as Universities). More traditional and open IdPs
such as GitHub, ORCID, Google, Microsoft, etc are also supported.CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log
in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub
only to users of a given institute. The allowed_idps configuration trait of
CILogonOAuthenticator is documented to be a list of domains that indicate the
institutions whose users are authorized to access this JupyterHub. This authorization
is validated by ensuring that the *email* field provided to us by CILogon has a
*domain* that matches one of the domains listed in `allowed_idps`.ImpactIf `allowed_idps` contains `berkeley.edu`, you might expect only users with valid
current credentials provided by University of California, Berkeley to be able to
access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider
is used by the user to login, only the email address provided. So a user can login
with a GitHub account that has email set to `<something>@berkeley.edu`, and that will
be treated exactly the same as someone logging in using the UC Berkeley official
Identity Provider. This has two consequences:Since GitHub (and most other providers we tested) only require you to verify
your email once, a user can access a JupyterHub even if their access to
the institution's IdP has been revoked or expired.CILogon supports hundreds of identity providers - if even one of them allows
users to set any email ids without verifying, that can be used to impersonate
*any* user on any other identity provider! While CILogon itself has a stellar
security record, this particular method of doing authorization means an attacker
would only need to compromise a single identity provider to compromise all of
CILogonWe currently do not know of any identity provider that provides *unverified*
email addresses to CILogon, so this is not a severe known vulnerability. However,
there are hundreds of IdPs, and we could not try them all.PatchesThis patch makes a *breaking change* in how `allowed_idps` is interpreted. It's
no longer a list of domains, but configuration representing the `EntityID` of the
IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/).
So instead of `berkeley.edu`, you would specify `urn:mace:incommon:berkeley.edu` to
allow logins from users currently with `berkeley.edu` accounts. GitHub users
with a verified `berkeley.edu` email will no longer be allowed to log in.For details on how to transition your CILogonOAuthenticator configuration to the patched version 15.0.0 or above, see [the migration](https://oauthenticator.readthedocs.io/en/latest/migrations.html) documentation.
|
[] | null | 4.2
| null | null | null |
CVE-2025-30639
|
WordPress IDonatePro Plugin <= 2.1.9 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in ThemeAtelier IDonatePro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects IDonatePro: from n/a through 2.1.9.
|
[] | null | 7.5
| null | null | null |
RHSA-2024:4564
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.4
| null | null | null |
GHSA-hfrm-xrcq-wmjv
|
IBM Remote Supervisor Adapter II firmware for System x3650, x3850 M2, and x3950 M2 1.13 and earlier generates weak RSA keys, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2015-6611
|
mediaserver in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, aka internal bugs 23905951, 23912202, 23953967, 23696300, 23600291, 23756261, 23541506, 23284974, 23542351, and 23542352, a different vulnerability than CVE-2015-8074.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2020-14103
|
The application in the mobile phone can read the SNO information of the device, Xiaomi 10 MIUI < 2020.01.15.
|
[
"cpe:2.3:o:mi:miui:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mi:mi_10:-:*:*:*:*:*:*:*"
] | null | 5.5
| null | 4.3
| null |
|
CVE-2025-20218
|
Cisco Secure Firepower Management Center Software XPATH Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device.
To exploit this vulnerability, the attacker must have valid administrative credentials.
|
[] | null | 4.9
| null | null | null |
GHSA-35rf-2xxr-prvf
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bowo System Dashboard allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects System Dashboard: from n/a through 2.8.18.
|
[] | null | 4.3
| null | null | null |
|
GHSA-23qj-fcjw-2v26
|
Unspecified vulnerability in Oracle Database Server 9.0.1.5 and 9.2.0.7 has unknown impact and attack vectors in the Oracle Enterprise Manager Intelligent Agent component, aka Vuln# DB07.
|
[] | null | null | null | null | null |
|
GHSA-467f-p48c-3q9m
|
Unspecified vulnerability in the PeopleSoft Enterprise PT PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote attackers to affect integrity via vectors related to PIA Core Technology.
|
[] | null | null | null | null | null |
|
CVE-2005-1627
|
Unknown vulnerability in Viewglob before 2.0.1, related to "a potential security issue with the Viewglob display and ssh X forwarding," has unknown impact.
|
[
"cpe:2.3:a:viewglob:viewglob:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:viewglob:viewglob:2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1
| null |
|
CVE-2017-16401
|
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of an image conversion, specifically in Enhanced Metafile Format Plus (EMF +) processing modules. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*"
] | null | null | 8.8
| 9.3
| null |
|
CVE-2020-11959
|
An unsafe configuration of nginx lead to information leak in Xiaomi router R3600 ROM before 1.0.50.
|
[
"cpe:2.3:o:mi:xiaomi_r3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mi:xiaomi_r3600:-:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
CVE-2017-7513
|
It was found that Satellite 5 configured with SSL/TLS for the PostgreSQL backend failed to correctly validate X.509 server certificate host name fields. A man-in-the-middle attacker could use this flaw to spoof a PostgreSQL server using a specially crafted X.509 certificate.
|
[
"cpe:2.3:a:redhat:satellite:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
] | null | null | 5.4
| null | null |
|
GHSA-79m9-mggg-xpg9
|
Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via crafted serialized objects, aka Bug ID CSCut39230.
|
[] | null | null | null | null | null |
|
CVE-2024-50115
|
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
|
In the Linux kernel, the following vulnerability has been resolved:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits
4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't
enforce 32-byte alignment of nCR3.
In the absolute worst case scenario, failure to ignore bits 4:0 can result
in an out-of-bounds read, e.g. if the target page is at the end of a
memslot, and the VMM isn't using guard pages.
Per the APM:
The CR3 register points to the base address of the page-directory-pointer
table. The page-directory-pointer table is aligned on a 32-byte boundary,
with the low 5 address bits 4:0 assumed to be 0.
And the SDM's much more explicit:
4:0 Ignored
Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow
that is broken.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
] | null | 7.1
| null | null | null |
CVE-2007-1682
|
Multiple stack-based buffer overflows in the FileManager ActiveX control in SAFmgPws.dll in SoftArtisans XFile before 2.4.0 allow remote attackers to execute arbitrary code via unspecified calls to the (1) BuildPath, (2) GetDriveName, (3) DriveExists, or (4) DeleteFile method.
|
[
"cpe:2.3:a:softartisans:xfile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:softartisans:xfile:2.2.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-2p37-x8h9-2j2q
|
Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.7.0 allow remote attackers to inject arbitrary web script or HTML via (1) the URI to includes/application.php, reachable through index.php; and, when Internet Explorer or Konqueror is used, (2) allow remote attackers to inject arbitrary web script or HTML via the searchword parameter in a search action to index.php in the com_search component. NOTE: vector 2 exists because of an incomplete fix for CVE-2011-2509.5.
|
[] | null | null | null | null | null |
|
GHSA-38hp-c2qq-q6vh
|
The installer in VMware Workstation 7.x before 7.1.2 build 301548 and VMware Player 3.x before 3.1.2 build 301548 renders an index.htm file if present in the installation directory, which might allow local users to trigger unintended interpretation of web script or HTML by creating this file.
|
[] | null | null | null | null | null |
|
CVE-2018-4854
|
A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system.
|
[
"cpe:2.3:o:siemens:siclock_tc400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siclock_tc400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siclock_tc100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siclock_tc100:-:*:*:*:*:*:*:*"
] | null | null | 8.8
| 9.3
| null |
|
GHSA-58p5-3cgm-hvjh
|
The Telnet proxy of 602Pro LAN SUITE 2002 does not restrict the number of outstanding connections to the local host, which allows remote attackers to create a denial of service (memory consumption) via a large number of connections.
|
[] | null | null | null | null | null |
|
GHSA-5q75-r4xj-cjrr
|
fastadmin V1.0.0.20200506_beta contains a cross-site scripting (XSS) vulnerability which may allow an attacker to obtain administrator credentials to log in to the background.
|
[] | null | null | null | null | null |
|
CVE-2023-28629
|
Stored XSS possible on VSM and Job Details pages via malicious pipeline label configuration in gocd
|
GoCD is an open source continuous delivery server. GoCD versions before 23.1.0 are vulnerable to a stored XSS vulnerability, where pipeline configuration with a malicious pipeline label configuration can affect browser display of pipeline runs generated from that configuration. An attacker that has permissions to configure GoCD pipelines could include JavaScript elements within the label template, causing a XSS vulnerability to be triggered for any users viewing the Value Stream Map or Job Details for runs of the affected pipeline, potentially allowing them to perform arbitrary actions within the victim's browser context rather than their own. This issue has been fixed in GoCD 23.1.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
CVE-2018-6114
|
Incorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4.3
| null |
|
GHSA-3763-pmwr-w4qp
|
An insufficient DRAM address validation in PMFW may allow a privileged attacker to perform a DMA read from an invalid DRAM address to SRAM, potentially resulting in loss of data integrity.
|
[] | null | 5.2
| null | null | null |
|
GHSA-4j6h-qxvh-v5mq
|
Pulse Secure Virtual Traffic Manager 9.9 versions prior to 9.9r2 and 10.4r1 allow a remote authenticated user to obtain sensitive historical activity information by leveraging incorrect permission validation.
|
[] | null | 4.3
| null | null | null |
|
CVE-2025-6096
|
codesiddhant Jasmin Ransomware dashboard.php sql injection
|
A vulnerability has been found in codesiddhant Jasmin Ransomware up to 1.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3
| 6.3
| 6.3
| 6.5
| null |
GHSA-fgpq-r4xv-rw5g
|
A vulnerability was found in GNOME libgsf up to 1.14.53. It has been classified as critical. This affects the function gsf_base64_encode_simple. The manipulation of the argument size_t leads to heap-based buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 4.8
| 5.3
| null | null | null |
|
CVE-2024-25121
|
Improper Access Control Persisting File Abstraction Layer Entities via Data Handler in TYPO3
|
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions of TYPO3 entities of the File Abstraction Layer (FAL) could be persisted directly via `DataHandler`. This allowed attackers to reference files in the fallback storage directly and retrieve their file names and contents. The fallback storage ("zero-storage") is used as a backward compatibility layer for files located outside properly configured file storages and within the public web root directory. Exploiting this vulnerability requires a valid backend user account. Users are advised to update to TYPO3 version 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1 which fix the problem described. When persisting entities of the File Abstraction Layer directly via DataHandler, `sys_file` entities are now denied by default, and `sys_file_reference` & `sys_file_metadata` entities are not permitted to reference files in the fallback storage anymore. When importing data from secure origins, this must be explicitly enabled in the corresponding DataHandler instance by using `$dataHandler->isImporting = true;`.
|
[
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:13.0.0:*:*:*:*:*:*:*"
] | null | 7.1
| null | null | null |
GHSA-fcx3-mx84-8j3q
|
Windows Secure Channel Denial of Service Vulnerability
|
[] | null | 7.5
| null | null | null |
|
CVE-2019-19001
|
eSOMS X-FrameOption
|
For ABB eSOMS versions 4.0 to 6.0.2, the X-Frame-Options header is not configured in HTTP response. This can potentially allow 'ClickJacking' attacks where an attacker can frame parts of the application on a malicious web site, revealing sensitive user information such as authentication credentials.
|
[
"cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | null | null |
CVE-2025-11350
|
Campcodes Online Apartment Visitor Management System bwdates-reports-details.php sql injection
|
A security flaw has been discovered in Campcodes Online Apartment Visitor Management System 1.0. The affected element is an unknown function of the file /bwdates-reports-details.php. The manipulation of the argument fromdate/todate results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
RHSA-2019:2503
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins security update
|
jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424) jenkins: CSRF protection tokens did not expire (SECURITY-626) jenkins: Unauthorized view fragment access (SECURITY-534)
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 4.3
| null | null |
GHSA-r36f-f47x-637q
|
wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure:--enable-all CFLAGS="-DWOLFSSL_STATIC_RSA"The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6. Therefore the default build since 3.6.6, even with "--enable-all", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent.The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.
|
[] | null | 5.9
| null | null | null |
|
CVE-2020-13156
|
modules\users\admin\add_user.php in NukeViet 4.4 allows CSRF to add a user account via the admin/index.php?nv=users&op=user_add URI.
|
[
"cpe:2.3:a:nukeviet:nukeviet:4.4:*:*:*:*:*:*:*"
] | null | 6.5
| null | 4.3
| null |
|
GHSA-xh73-mcmv-h45w
|
ZoneMinder before 1.32.3 has SQL Injection via the ajax/status.php sort parameter.
|
[] | null | null | 9.8
| null | null |
|
GHSA-4rg7-8mp3-c7wh
|
DHCP Server Service Denial of Service Vulnerability
|
[] | null | 7.5
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.