id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-47445
|
WordPress Be POPIA Compliant Plugin <= 1.2.0 is vulnerable to SQL Injection
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Web-X Be POPIA Compliant be-popia-compliant allows SQL Injection.This issue affects Be POPIA Compliant: from n/a through 1.2.0.
|
[
"cpe:2.3:a:web-x:be_popia_compliant:*:*:*:*:*:*:*:*",
"cpe:2.3:a:web-x:be-popia-compliant:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
CVE-2025-30946
|
WordPress Custom Bulk/Quick Edit <= 1.6.10 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Michael Cannon Custom Bulk/Quick Edit allows Cross Site Request Forgery. This issue affects Custom Bulk/Quick Edit: from n/a through 1.6.10.
|
[] | null | 4.3 | null | null | null |
GHSA-q8mj-f7wj-v66h
|
An issue was discovered in certain Apple products. iOS before 11.1 is affected. The issue involves the "Messages" component. It allows physically proximate attackers to view arbitrary photos via a Reply With Message action in the lock-screen state.
|
[] | null | null | 2.4 | null | null |
|
GHSA-5jv4-93fg-hvqc
|
In the Linux kernel, the following vulnerability has been resolved:ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to networkWhen copying a `struct ifaddrlblmsg` to the network, __ifal_reserved
remained uninitialized, resulting in a 1-byte infoleak:BUG: KMSAN: kernel-network-infoleak in __netdev_start_xmit ./include/linux/netdevice.h:4841
__netdev_start_xmit ./include/linux/netdevice.h:4841
netdev_start_xmit ./include/linux/netdevice.h:4857
xmit_one net/core/dev.c:3590
dev_hard_start_xmit+0x1dc/0x800 net/core/dev.c:3606
__dev_queue_xmit+0x17e8/0x4350 net/core/dev.c:4256
dev_queue_xmit ./include/linux/netdevice.h:3009
__netlink_deliver_tap_skb net/netlink/af_netlink.c:307
__netlink_deliver_tap+0x728/0xad0 net/netlink/af_netlink.c:325
netlink_deliver_tap net/netlink/af_netlink.c:338
__netlink_sendskb net/netlink/af_netlink.c:1263
netlink_sendskb+0x1d9/0x200 net/netlink/af_netlink.c:1272
netlink_unicast+0x56d/0xf50 net/netlink/af_netlink.c:1360
nlmsg_unicast ./include/net/netlink.h:1061
rtnl_unicast+0x5a/0x80 net/core/rtnetlink.c:758
ip6addrlbl_get+0xfad/0x10f0 net/ipv6/addrlabel.c:628
rtnetlink_rcv_msg+0xb33/0x1570 net/core/rtnetlink.c:6082
...
Uninit was created at:
slab_post_alloc_hook+0x118/0xb00 mm/slab.h:742
slab_alloc_node mm/slub.c:3398
__kmem_cache_alloc_node+0x4f2/0x930 mm/slub.c:3437
__do_kmalloc_node mm/slab_common.c:954
__kmalloc_node_track_caller+0x117/0x3d0 mm/slab_common.c:975
kmalloc_reserve net/core/skbuff.c:437
__alloc_skb+0x27a/0xab0 net/core/skbuff.c:509
alloc_skb ./include/linux/skbuff.h:1267
nlmsg_new ./include/net/netlink.h:964
ip6addrlbl_get+0x490/0x10f0 net/ipv6/addrlabel.c:608
rtnetlink_rcv_msg+0xb33/0x1570 net/core/rtnetlink.c:6082
netlink_rcv_skb+0x299/0x550 net/netlink/af_netlink.c:2540
rtnetlink_rcv+0x26/0x30 net/core/rtnetlink.c:6109
netlink_unicast_kernel net/netlink/af_netlink.c:1319
netlink_unicast+0x9ab/0xf50 net/netlink/af_netlink.c:1345
netlink_sendmsg+0xebc/0x10f0 net/netlink/af_netlink.c:1921
...This patch ensures that the reserved field is always initialized.
|
[] | null | null | null | null | null |
|
CVE-2019-12645
|
Cisco Jabber Client Framework for Mac Code Execution Vulnerability
|
A vulnerability in Cisco Jabber Client Framework (JCF) for Mac Software, installed as part of the Cisco Jabber for Mac client, could allow an authenticated, local attacker to execute arbitrary code on an affected device The vulnerability is due to improper file level permissions on an affected device when it is running Cisco JCF for Mac Software. An attacker could exploit this vulnerability by authenticating to the affected device and executing arbitrary code or potentially modifying certain configuration files. A successful exploit could allow the attacker to execute arbitrary code or modify certain configuration files on the device using the privileges of the installed Cisco JCF for Mac Software.
|
[
"cpe:2.3:a:cisco:jabber:*:*:*:*:*:macos:*:*"
] | null | null | 6.7 | null | null |
RHSA-2013:0132
|
Red Hat Security Advisory: autofs security, bug fix, and enhancement update
|
autofs: denial of service when using an LDAP-based automount map
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-f52w-ff63-7f4c
|
A vulnerability, found in EdgeRouters Version 2.0.9-hotfix.5 and earlier and UniFi Security Gateways (USG) Version 4.4.56 and earlier with their DHCPv6 prefix delegation set to dhcpv6-stateless or dhcpv6-stateful, allows a malicious actor directly connected to the WAN interface of an affected device to create a remote code execution vulnerability.
|
[] | null | 8.8 | null | null | null |
|
GHSA-hfqw-6jv9-j568
|
F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF1; BIG-IP AAM 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF1; BIG-IP DNS 12.x before 12.0.0 HF1; BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0; BIG-IP GTM 11.3.x, 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, and 11.6.x before 11.6.1; BIG-IP PSM 11.3.x and 11.4.x before 11.4.1 HF10; Enterprise Manager 3.0.0 through 3.1.1; BIG-IQ Cloud and BIG-IQ Security 4.0.0 through 4.5.0; BIG-IQ Device 4.2.0 through 4.5.0; BIG-IQ ADC 4.5.0; BIG-IQ Centralized Management 4.6.0; and BIG-IQ Cloud and Orchestration 1.0.0 on the 3900, 6900, 8900, 8950, 11000, 11050, PB100 and PB200 platforms, when software SYN cookies are configured on virtual servers, allow remote attackers to cause a denial of service (High-Speed Bridge hang) via an invalid TCP segment.
|
[] | null | null | 5.9 | null | null |
|
CVE-2023-1606
|
novel-plus DictController.java sql injection
|
A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223736.
|
[
"cpe:2.3:a:xxyopen:novel-plus:3.6.2:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
GHSA-3w9v-g7vm-2m73
|
BasiliX 1.1.0 saves attachments in a world readable /tmp/BasiliX directory, which allows local users to read other users' attachments.
|
[] | null | null | null | null | null |
|
CVE-2013-2126
|
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
|
[
"cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libraw:libraw:0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2011-0262
|
Buffer overflow in the stringToSeconds function in ovutil.dll in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via large values of variables to jovgraph.exe.
|
[
"cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-c959-gjgp-27w6
|
The server in CollabNet ScrumWorks Pro before 6.0 allows remote authenticated users to gain privileges and obtain sensitive information via a modified desktop client.
|
[] | null | null | null | null | null |
|
GHSA-367x-pccg-fc8h
|
Cross-site scripting (XSS) vulnerability in the W3 Total Cache plugin before 0.9.4.1 for WordPress, when debug mode is enabled, allows remote attackers to inject arbitrary web script or HTML via the "Cache key" in the HTML-Comments, as demonstrated by the PATH_INFO to the default URI.
|
[] | null | null | null | null | null |
|
RHSA-2023:7334
|
Red Hat Security Advisory: rh-varnish6-varnish security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null | null |
GHSA-8v59-c3c4-wrrr
|
In the Linux kernel, the following vulnerability has been resolved:usb: typec: class: Invalidate USB device pointers on partner unregistrationTo avoid using invalid USB device pointers after a Type-C partner
disconnects, this patch clears the pointers upon partner unregistration.
This ensures a clean state for future connections.
|
[] | null | null | null | null | null |
|
GHSA-pgvp-qh2c-78r2
|
The Condor S.E. (aka com.app_condorsoutheast.layout) application 1.399 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-5g2m-vp9w-hprq
|
The option-tree plugin before 2.6.0 for WordPress has XSS via an add_list_item or add_social_links AJAX request.
|
[] | null | null | 6.1 | null | null |
|
GHSA-wm3q-jwqr-f6r7
|
The leakage of channel access token in DRAGON FAMILY Line 13.6.1 allows remote attackers to send malicious notifications to victims.
|
[] | null | 6.5 | null | null | null |
|
GHSA-7h3x-gchg-chhg
|
Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.
|
[] | null | null | null | null | null |
|
CVE-2022-25203
|
Jenkins Team Views Plugin 0.9.0 and earlier does not escape team names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Read permission.
|
[
"cpe:2.3:a:jenkins:team_views:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2025-30614
|
WordPress Google Font Fix plugin <= 2.3.1 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Haozhe Xie Google Font Fix allows Reflected XSS. This issue affects Google Font Fix: from n/a through 2.3.1.
|
[] | null | 7.1 | null | null | null |
CVE-2017-7656
|
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
|
[
"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2017-11908
|
ChakraCore and Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
|
[
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
CVE-2023-6401
|
NotePad++ dbghelp.exe uncontrolled search path
|
A vulnerability classified as problematic was found in NotePad++ up to 8.1. Affected by this vulnerability is an unknown functionality of the file dbghelp.exe. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The identifier VDB-246421 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:notepad-plus-plus:notepad\\+\\+:*:*:*:*:*:*:*:*"
] | null | 5.3 | 5.3 | 4.3 | null |
CVE-2011-1055
|
SQL injection vulnerability in api/ice_media.cfc in Lingxia I.C.E CMS 1.0 allows remote attackers to execute arbitrary SQL commands via the session.user_id parameter to media.cfm.
|
[
"cpe:2.3:a:lingxia273:lingxia_i.c.e_cms:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-mpqx-63fh-p5mj
|
cgi-bin/userprefs.cgi in Plixer International Scrutinizer NetFlow & sFlow Analyzer before 9.0.1.19899 does not validate user permissions, which allow remote attackers to add user accounts with administrator privileges via the newuser, pwd, and selectedUserGroup parameters.
|
[] | null | null | null | null | null |
|
GHSA-rpph-wv52-9mgp
|
IBM Business Automation Workflow 22.0.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 239427.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-6201
|
HaloITSM - Emailing Template Injection
|
HaloITSM versions up to 2.146.1 are affected by a Template Injection vulnerability within the engine used to generate emails. This can lead to the leakage of potentially sensitive information. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
|
[
"cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-xp26-p53h-6h2p
|
Improper Neutralization of Input During Web Page Generation in LXML
|
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
|
[] | 5.3 | null | 6.1 | null | null |
GHSA-2r3p-7g4x-2m8x
|
The Thank You Page Customizer for WooCommerce – Increase Your Sales plugin for WordPress is vulnerable to missing authorization e in all versions up to, and including, 1.1.2 via the apply_layout function due to a missing capability check. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve arbitrary order data which may contain PII.
|
[] | null | 5.3 | null | null | null |
|
GHSA-j4pw-hgvj-fq4w
|
The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
|
[] | null | null | 5.5 | null | null |
|
GHSA-922f-j548-hrpp
|
Cross-site scripting (XSS) vulnerability in base_local_rules.php in Basic Analysis and Security Engine (BASE) before 1.4.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-0399
|
An information disclosure vulnerability in lvm/wrapper/Bundle/EffectBundle.cpp in libeffects in the Qualcomm audio post processor could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32588756.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2019-15520
|
comelz Quark before 2019-03-26 allows directory traversal to locations outside of the project directory.
|
[
"cpe:2.3:a:comelz:quark:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2022-35170
|
SAP NetWeaver Enterprise Portal does - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, not sufficiently encode user-controlled inputs over the network, resulting in reflected Cross-Site Scripting (XSS) vulnerability, therefore changing the scope of the attack. This leads to limited impact on confidentiality and integrity of data.
|
[
"cpe:2.3:a:sap:netweaver_enterprise_portal:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_enterprise_portal:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_enterprise_portal:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_enterprise_portal:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_enterprise_portal:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_enterprise_portal:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_enterprise_portal:7.50:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-282h-xw4x-7x34
|
A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to gain root privileges.
|
[] | null | null | null | null | null |
|
CVE-2013-2865
|
Multiple unspecified vulnerabilities in Google Chrome before 27.0.1453.110 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.94:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.102:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.103:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.105:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.106:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.107:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.108:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-25053
|
An issue was discovered on Samsung mobile devices with Q(10.0) (exynos9830 chipsets) software. RKP allows arbitrary code execution. The Samsung ID is SVE-2020-17435 (August 2020).
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_9830:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-jf6g-4gpq-f62c
|
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-13162
|
The mintToken function of a smart contract implementation for ALEX, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:alex_project:alex:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-9646-qh5v-2ffc
|
A stored cross site scripting (XSS) vulnerability in the web_copyright field of Eyoucms v1.4.1 allows authenticated attackers to execute arbitrary web scripts or HTML.
|
[] | null | null | null | null | null |
|
CVE-2025-43295
|
A denial-of-service issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26, iOS 18.7 and iPadOS 18.7. An app may be able to cause a denial-of-service.
|
[] | null | 5.5 | null | null | null |
|
GHSA-h8p9-2q3j-5c34
|
In XS 9.0.0 in Moddable SDK OS180329, there is a heap-based buffer overflow in fxBeginHost in xsAPI.c when called from fxRunDefine in xsRun.c, as demonstrated by crafted JavaScript code to xst.
|
[] | null | null | null | null | null |
|
CVE-2023-30747
|
WordPress WooCommerce Easy Duplicate Product Plugin <= 0.3.0.0 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPGem WooCommerce Easy Duplicate Product plugin <= 0.3.0.0 versions.
|
[
"cpe:2.3:a:wpgem:woocommerce_easy_duplicate_product:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
GHSA-938p-2whj-rv48
|
The Content Provider in the MovatwiTouch application before 1.793 and MovatwiTouch Paid application before 1.793 for Android does not properly restrict access to authorization information, which allows attackers to hijack Twitter accounts via a crafted application.
|
[] | null | null | null | null | null |
|
RHSA-2017:3456
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
|
Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Any local users can connect to jboss-cli admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 5.5 | null | null |
GHSA-26pm-x559-r4h2
|
Multiple cross-site scripting (XSS) vulnerabilities in common.php in Post Revolution before 0.8.0c-2 allow remote attackers to inject arbitrary web script or HTML via an attribute of a (1) P, a (2) STRONG, a (3) A, a (4) EM, a (5) I, a (6) IMG, a (7) LI, an (8) OL, a (9) VIDEO, or a (10) BLOCKQUOTE element.
|
[] | null | null | null | null | null |
|
GHSA-r4wh-4ppv-fgx5
|
An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "Multi-Touch" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[] | null | null | 7.8 | null | null |
|
CVE-2017-7987
|
In Joomla! 3.2.0 through 3.6.5 (fixed in 3.7.0), inadequate escaping of file and folder names leads to XSS vulnerabilities in the template manager component.
|
[
"cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.8:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.1:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.5:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-8jxx-qvw2-rx6p
|
Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.149 allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension.
|
[] | null | 5.4 | null | null | null |
|
GHSA-7vqx-fpjm-pj2j
|
In the Linux kernel, the following vulnerability has been resolved:scsi: advansys: Fix kernel pointer leakPointers should be printed with %p or %px rather than cast to 'unsigned
long' and printed with %lx.Change %lx to %p to print the hashed pointer.
|
[] | null | 5.5 | null | null | null |
|
GHSA-3crj-j3hg-7v57
|
If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-20223
|
In Support Incident Tracker (SiT!) 3.67, the id parameter is affected by XSS on all endpoints that use this parameter, a related issue to CVE-2012-2235.
|
[
"cpe:2.3:a:sitracker:support_incident_tracker:3.67:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2025-46909
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
CVE-2021-33582
|
Cyrus IMAP before 3.4.2 allows remote attackers to cause a denial of service (multiple-minute daemon hang) via input that is mishandled during hash-table interaction. Because there are many insertions into a single bucket, strcmp becomes slow. This is fixed in 3.4.2, 3.2.8, and 3.0.16.
|
[
"cpe:2.3:a:cyrus:imap:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-rj55-jv57-g48f
|
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
|
[] | null | null | null | null | null |
|
CVE-1999-0116
|
Denial of service when an attacker sends many SYN packets to create multiple connections without ever sending an ACK to complete the connection, aka SYN flood.
|
[
"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2019-11810
|
An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
CVE-2008-5797
|
SQL injection vulnerability in the advCalendar extension 0.3.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:typo3:advcalendar_extension:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-pwpw-3559-9w42
|
Unspecified vulnerability in the device driver in Kingsoft Internet Security 2011 allows local users to cause a denial of service via a crafted application.
|
[] | null | null | null | null | null |
|
CVE-2024-50677
|
A cross-site scripting (XSS) vulnerability in OroPlatform CMS v5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search parameter.
|
[
"cpe:2.3:a:oroinc:orocommerce:5.1.0:-:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-gj8m-5m4r-84j8
|
A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. Stack-based buffer overflow vulnerabilities caused by processing specially crafted .dpb files may allow an attacker to remotely execute arbitrary code.
|
[] | null | null | 7.8 | null | null |
|
GHSA-98hf-m87w-cq6h
|
Mellium allows Authentication Bypass by Spoofing
|
Mellium mellium.im/xmpp 0.0.1 through 0.21.4 allows response spoofing because the stanza type is not checked. This is fixed in 0.22.0.
|
[] | 9.3 | 9.8 | null | null | null |
GHSA-24p2-hmff-5vm2
|
Multiple untrusted search path vulnerabilities in the Java Service in Sun Microsystems SunScreen Firewall on SunOS 5.9 allow local users to execute arbitrary code via a modified (1) PATH or (2) LD_LIBRARY_PATH environment variable.
|
[] | null | null | null | null | null |
|
GHSA-cghx-9gcr-r42x
|
Path Traversal in the Java Kubernetes Client
|
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.
|
[] | null | 7.5 | null | null | null |
CVE-2007-6363
|
IBM Tivoli Netcool Security Manager 1.3.0 before Interim Fix 1, when using Active Directory (AD) LDAP authentication, allows remote attackers to obtain login access via unspecified vectors without entering a password.
|
[
"cpe:2.3:a:ibm:tivoli_netcool_security_manager:1.3.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2008-4518
|
Multiple SQL injection vulnerabilities in Fastpublish CMS 1.9.9.9.9 d (1.9999 d) allow remote attackers to execute arbitrary SQL commands via the (1) sprache parameter to index2.php and the (2) artikel parameter to index.php.
|
[
"cpe:2.3:a:fastpublish:fastpublish_cms:1.9.9.9.9d:*:*:*:*:*:*:*",
"cpe:2.3:a:fastpublish:fastpublish_cms:1.9999d:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-2xr7-wx8r-phrv
|
Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing the Flash Video container file format. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-22845
|
An out-of-bounds read vulnerability exists in the TGAInput::decode_pixel() functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted targa file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.
|
[
"cpe:2.3:a:openimageio:openimageio:2.4.7.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2021-36042
|
Magento Commerce API File Option Upload Extension Improper Input Validation Vulnerability Could Lead To Remote Code Execution
|
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability in the API File Option Upload Extension. An attacker with Admin privileges can achieve unrestricted file upload which can result in remote code execution.
|
[
"cpe:2.3:a:adobe:adobe_commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_commerce:2.4.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento_open_source:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento_open_source:2.4.2:p1:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
GHSA-8x27-9ppr-w79j
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ChatGPT Open AI Images & Content for WooCommerce allows Reflected XSS. This issue affects ChatGPT Open AI Images & Content for WooCommerce: from n/a through 2.2.0.
|
[] | null | 7.1 | null | null | null |
|
CVE-2015-6408
|
Cross-site request forgery (CSRF) vulnerability in Cisco Unity Connection 11.5(0.98) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCux24578.
|
[
"cpe:2.3:a:cisco:unity_connection:11.5\\(0.98\\):*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-rgq8-25qc-h54q
|
Directory Traversal in myserver.alexcthomas18
|
Affected versions of `myserver.alexcthomas18` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
[] | null | null | 7.5 | null | null |
GHSA-x6c3-g3xg-w487
|
Dell EMC Data Protection Advisor versions 6.4, 6.5 and 18.1 contain an undocumented account with limited privileges that is protected with a hard-coded password. A remote unauthenticated malicious user with the knowledge of the hard-coded password may login to the system and gain read-only privileges.
|
[] | null | 7.5 | null | null | null |
|
PYSEC-2012-37
| null |
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions.
|
[] | null | null | null | null | null |
GHSA-cgq6-65fg-2fvf
|
Use after free in Vulkan in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-54201
|
Substance3D - Modeler | Out-of-bounds Read (CWE-125)
|
Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
GHSA-86pj-mwrp-p73h
|
The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sensitive information via an unspecified linear-time attack.
|
[] | null | null | null | null | null |
|
GHSA-p4wc-mgqq-6w5h
|
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'.
|
[] | null | null | null | null | null |
|
CVE-2015-3333
|
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
|
[
"cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2008-3782
|
Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in ACG-PTP 1.0.6 allow remote authenticated administrators to inject arbitrary web script or HTML via the (1) Category name field under Advertisement Packages, the (2) Reason field under Credit/Debit Users, and the (3) FAQ question and (4) FAQ answer fields under Add New FAQ Entry.
|
[
"cpe:2.3:a:discountedscripts:acg_ptp:1.0.6:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2005-3167
|
Incomplete blacklist vulnerability in MediaWiki before 1.4.11 does not properly remove certain CSS inputs (HTML inline style attributes) that are processed as active content by Internet Explorer, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
|
[
"cpe:2.3:a:mediawiki:mediawiki:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-6m9q-p58f-wq5w
|
A cross-site scripting (XSS) vulnerability has been reported to affect QTS, QuTS hero and QuTScloud. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of QTS, QuTS hero and QuTScloud: QuTS hero h4.5.4.1771 build 20210825 and later QTS 4.5.4.1787 build 20210910 and later QuTScloud c4.5.7.1864 and later
|
[] | null | null | null | null | null |
|
CVE-2016-1490
|
The Wifi hotspot in Lenovo SHAREit before 3.2.0 for Windows allows remote attackers to obtain sensitive file names via a crafted file request to /list.
|
[
"cpe:2.3:a:lenovo:shareit:*:*:*:*:*:windows:*:*"
] | null | null | 4.1 | 2.7 | null |
|
CVE-2024-52434
|
WordPress Popup by Supsystic plugin <= 1.10.29 - Remote Code Execution (RCE) vulnerability
|
Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Popup by Supsystic allows Command Injection.This issue affects Popup by Supsystic: from n/a through 1.10.29.
|
[
"cpe:2.3:a:supsystic:popup:*:*:*:*:*:wordpress:*:*"
] | null | 9.1 | null | null | null |
CVE-2022-37392
|
Apache Traffic Server: Improperly reading the client requests
|
Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
|
[
"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-f8v6-4mr6-mw8q
|
Buffer overflow in RemoteCommand.DLL in Symantec Norton Ghost 12.0 allows remote attackers to execute arbitrary code via the Connect function.
|
[] | null | null | null | null | null |
|
CVE-2014-3492
|
Multiple cross-site scripting (XSS) vulnerabilities in the host YAML view in Foreman before 1.4.5 and 1.5.x before 1.5.1 allow remote attackers to inject arbitrary web script or HTML via a parameter (1) name or (2) value related to the host.
|
[
"cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*",
"cpe:2.3:a:theforeman:foreman:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:theforeman:foreman:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:theforeman:foreman:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:theforeman:foreman:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:theforeman:foreman:1.5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-5qp8-2ph4-rx2p
|
Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26433, CVE-2021-36926, CVE-2021-36933.
|
[] | null | 7.5 | null | null | null |
|
GHSA-525m-xhw8-m6pr
|
SQL injection vulnerability in index.php in WebSPELL 4.01.01 and earlier allows remote attackers to execute arbitrary SQL commands via the getsquad parameter, a different vector than CVE-2006-4783.
|
[] | null | null | null | null | null |
|
CVE-2025-27444
|
Extension - rsjoomla.com - A reflected XSS vulnerability RSform!Pro component 3.0.0 - 3.3.13 for Joomla
|
A reflected XSS vulnerability in RSform!Pro component 3.0.0 - 3.3.13 for Joomla was discovered. The issue arises from the improper handling of the filter[dateFrom] GET parameter, which is reflected unescaped in the administrative backend interface. This allows an authenticated attacker with admin or editor privileges to inject arbitrary JavaScript code by crafting a malicious URL.
|
[] | null | 4.8 | null | null | null |
CVE-2024-49370
|
Change-Password via Portal-Profile sets PimcoreBackendUser password without hashing
|
Pimcore is an open source data and experience management platform. When a PortalUserObject is connected to a PimcoreUser and "Use Pimcore Backend Password" is set to true, the change password function in Portal Profile sets the new password. Prior to Pimcore portal engine versions 4.1.7 and 3.1.16, the password is then set without hashing so it can be read by everyone. Everyone who combines PortalUser to PimcoreUsers and change passwords via profile settings could be affected. Versions 4.1.7 and 3.1.16 of the Pimcore portal engine fix the issue.
|
[
"cpe:2.3:a:pimcore:pimcore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | 8.7 | null | null | null | null |
GHSA-jf2c-8v4p-mgg2
|
Improper Restriction of Excessive Authentication Attempts vulnerability in Drupal Mail Login allows Brute Force.This issue affects Mail Login: from 3.0.0 before 3.2.0, from 4.0.0 before 4.2.0.
|
[] | null | 9.8 | null | null | null |
|
GHSA-mqqj-fx8h-437j
|
PrivateBin allows shortening of URLs for other domains
|
In [v1.5](https://github.com/PrivateBin/PrivateBin/blob/master/CHANGELOG.md#15-2022-12-11) we introduced the YOURLS server-side proxy. The idea was to allow using the YOURLs URL shortener without running the YOURLs instance without authentication and/or exposing the authentication token to the public, allowing anyone to shorten any URL. With the proxy mechanism, anyone can shorten any URL pointing to the configured PrivateBin instance. The vulnerability allowed other URLs to be shortened, as long as they contain the PrivateBin instance, defeating the limit imposed by the proxy.Neither the confidentially of existing pastes on the server nor the configuration options including the YOURLs token are affected.ImpactThis issue only affects non-standard configurations of PrivateBin. Instances are affected if all of the following conditions are met:The PrivateBin instance enables URL shortening.A YOURLs URL shortener is used and it is configured not to be public and require authentication to shorten URLs.A basepath, the YOURLs proxy mechanism and an authentication token is configured in PrivateBin to use the non-public YOURLs instance.A crafted URL is sent to PrivateBins' YOURLs proxy endpoint with a URL that contains the PrivateBin instance URL as a GET-parameter or as part of the URL-fragment, but doesn't start with the instance URL (a third-party URL)The root cause is, [that the guard clause checking whether the URL to be shortened belongs to your own PrivateBin domain only checks if the PrivateBin instance is contained in the URL](https://github.com/PrivateBin/PrivateBin/blob/3cba170f3255de21bbebb77f6c565519ef33e8c1/lib/YourlsProxy.php#L50-L53) but not if it starts with it.This is a kind of authentication bypass due to incomplete filtering. This [has a similar impact like an open redirect](https://cwe.mitre.org/data/definitions/601.html) except it does not directly redirect, but allows a further hiding of the target URL as is common and known for URL shorteners. If the URL shortener domain used is trusted by it's users, this allows hiding a malicious URL.The highest impact may be that this can be used for phishing campaigns, by routing users to some kind of fake site mimicking the trusted shortener or PrivateBin domain, which could then extract sensitive data from entered data or similar. That said, this is a general concern with URL shorteners and users are advised to follow general phishing prevention attempts like verifying the domain of the site they are using and [using a trusted PrivateBin instance](https://github.com/PrivateBin/PrivateBin?tab=readme-ov-file#what-it-doesnt-provide).Indicators of exploitationCheck your YOURLs proxy for shortened domains that do not start with your own PrivateBin instance. Also note, that for this to be a result of an exploitation of this vulnerability, somewhere in the URL the `base path + ?` e.g. `https://privatebin.example/?` has to appear in the destination URL, as this is what the guard checked for.PatchesThe problem has been patched in version 1.7.4 of PrivateBin. In addition to upgrading, users of the YOURLs proxy feature should check for the indicators of exploitation, as outlined above.WorkaroundsDisable URL shortening, if you have been using it.Only the YOURLs proxy is affected. Other URL shortening options either require a public, un-authenticated shortener, or expose the token to the client, which by design allows shortening any URL.Proof of conceptSee [the unit test that got introduced](https://github.com/PrivateBin/PrivateBin/blob/2c711e9d3ca21230fc68f5b4dba2a7a0592b963b/tst/YourlsProxyTest.php#L57-L62) to prevent similar regressions for an example of a URL that would circumvent the configured basepath.Here is an example of how a manual exploitation would work:In a PrivateBin instance hosted on `https://privatebin.example/`, with a valid URL YOURLs shortening proxy configuration using a token to prevent un-authenticated short-URL creation, send a URL shortening request for the domain `https://attacker.example.com/?q=https://privatebin.example/?foo#bar`. `attacker.example.com` is any attacker controlled, arbitrary domain.You can do this by sending a GET request to `https://privatebin.example/shortenviayourls?link=https%3A%2F%2Fattacker.example.com%2F%3Fq%3Dhttps%3A%2F%2Fprivatebin.example%2F%3Ffoo%23bar`, without URL encoding this looks as follows: `https://privatebin.example/shortenviayourls?link=https://attacker.example.com/?q=https://privatebin.example/?foo#bar`.On an affected setup, you will get a valid short URL, which when accessed, leads to `https://attacker.example.com/?foo#bar`, the attackers domain. On a patched system your request will get rejected and only URLs starting with `https://privatebin.example/?[...]` are allowed for shortening.Post-mortemFrom our limited analysis, the issue [has been introduced in commit `0dc9ab7` while refactoring](https://github.com/PrivateBin/PrivateBin/commit/0dc9ab7576d5a1296debeb788afb2ae9c72d137c). The use of [`substr`](http://php.net/manual/function.substr.php) got replaced by [`strpos`](https://www.php.net/manual/function.strpos). The [initial contribution](https://github.com/PrivateBin/PrivateBin/commit/b0f17f0a91cdebbfd6732781943f1e04ce3311f7) contained no tests, but an implementation without this flaw. All these changes got introduced [in a single pull request](https://github.com/PrivateBin/PrivateBin/pull/997). This follows many best practices, as tests were added and the refactoring was done in close collaboration with the original author.In the future, [we plan to switch to the more obvious, readable and understandable](https://github.com/PrivateBin/PrivateBin/issues/1373) [`str_starts_with`](https://www.php.net/manual/function.str-starts-with.php), which is available since PHP v8. Such a better function naming and insisting on using modern functions would not only result in a better code quality, but would possibly have prevented the issue, but for backwards-compatibility with PHP 7.3, we stay on the old function for now.Final ThoughtsThe project maintainers have always discouraged the use of URL shorteners and **users are always safer sharing the complete, long URL to a paste**, see [our FAQ](https://github.com/PrivateBin/PrivateBin/wiki/FAQ#the-url-is-so-long-cant-i-just-use-an-url-shortener).If you need or want to provide a URL shortener option as a PrivateBin instance administrator, YOURLs is the _best option_ available to use with PrivateBin, because it is the only shortener supported, through the proxy mechanism, preventing arbitrarily shortening any URLs. Running a public URL shortener instance and allowing anonymous users shortening arbitrary domains invites the shortener getting abused.ReferencesPR to fix the vulnerability: https://github.com/PrivateBin/PrivateBin/pull/1370Timeline2024-06-28 Issue report by @nbxiglk via email2024-06-29 Vulnerability reproduced by @elrido, mitigation created and shared with maintainers and issue reporter for review2024-07-06 Pull request with mitigation raised
|
[] | 6.9 | 5.3 | null | null | null |
CVE-2015-4506
|
Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2025-4362
|
itsourcecode Gym Management System ajax.php sql injection
|
A vulnerability classified as critical was found in itsourcecode Gym Management System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=save_membership. The manipulation of the argument member_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
PYSEC-2022-43056
| null |
The keep for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.
|
[] | null | 9.8 | null | null | null |
GHSA-wf24-4m95-7wjm
|
Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.
|
[] | null | 5.9 | null | null | null |
|
GHSA-fgg4-8h2g-hcc2
|
In the Linux kernel, the following vulnerability has been resolved:soundwire: cadence: fix invalid PDI offsetFor some reason, we add an offset to the PDI, presumably to skip the
PDI0 and PDI1 which are reserved for BPT.This code is however completely wrong and leads to an out-of-bounds
access. We were just lucky so far since we used only a couple of PDIs
and remained within the PDI array bounds.A Fixes: tag is not provided since there are no known platforms where
the out-of-bounds would be accessed, and the initial code had problems
as well.A follow-up patch completely removes this useless offset.
|
[] | null | 7.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.