id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2002-0669
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows administrators to cause a denial of service by modifying the SIP_AUTHENTICATE_SCHEME value to force authentication of incoming calls, which does not notify the user when an authentication failure occurs.
[ "cpe:2.3:h:pingtel:xpressa:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:h:pingtel:xpressa:1.2.7.4:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-9ppf-383x-3hmv
Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6.
[]
null
7.5
null
null
null
GHSA-28xr-mwxg-3qc8
Command injection in simple-git
`simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.5.0.
[]
null
8.1
null
null
null
GHSA-crvj-53j9-v9xw
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to iOS 12.1, macOS Mojave 10.14.1, tvOS 12.1, watchOS 5.1, iTunes 12.9.1.
[]
null
null
7.8
null
null
GHSA-8cxw-wvhc-p4x4
Jenkins NUnit Plugin vulnerable to Protection Mechanism Failure
Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller. NUnit Plugin 0.28 changes the message type from agent-to-controller to controller-to-agent, preventing execution on the controller.
[]
null
5.3
null
null
null
GHSA-6394-jqhh-rg8r
The WP Social Sharing WordPress plugin through 2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
null
CVE-2008-6838
Cross-site scripting (XSS) vulnerability in search.php in Zoph 0.7.2.1 allows remote attackers to inject arbitrary web script or HTML via the _off parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:zoph:zoph:0.7.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-698m-g6fr-27mg
Dell EMC OpenManage Enterprise (OME) versions prior to 3.2 and OpenManage Enterprise-Modular (OME-M) versions prior to 1.10.00 contain an injection vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability to gain access to sensitive information or cause denial-of-service.
[]
null
8.1
null
null
null
CVE-2016-2178
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
[ "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" ]
null
5.5
null
2.1
null
CVE-1999-0392
Buffer overflow in Thomas Boutell's cgic library version up to 1.05.
[ "cpe:2.3:a:thomas_boutell:cgic_library:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2023-20581
Improper access control in the IOMMU may allow a privileged attacker to bypass RMP checks, potentially leading to a loss of guest memory integrity.
[]
null
2.5
null
null
null
CVE-2022-0011
PAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering
PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL category. This is done by creating a custom URL category list or by using an external dynamic list (EDL) in a URL Filtering profile. When the entries in these lists have a hostname pattern that does not end with a forward slash (/) or a hostname pattern that ends with an asterisk (*), any URL that starts with the specified pattern is considered a match. Entries with a caret (^) at the end of a hostname pattern match any top level domain. This may inadvertently allow or block more URLs than intended and allowing more URLs than intended represents a security risk. For example: example.com will match example.com.website.test example.com.* will match example.com.website.test example.com.^ will match example.com.test You should take special care when using such entries in policy rules that allow traffic. Where possible, use the exact list of hostname names ending with a forward slash (/) instead of using wildcards. PAN-OS 10.1 versions earlier than PAN-OS 10.1.3; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 9.1 versions earlier than PAN-OS 9.1.12; all PAN-OS 9.0 versions; PAN-OS 8.1 versions earlier than PAN-OS 8.1.21, and Prisma Access 2.2 and 2.1 versions do not allow customers to change this behavior without changing the URL category list or EDL.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_access:2.1:*:*:*:innovation:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_access:2.1:*:*:*:preferred:*:*:*", "cpe:2.3:a:paloaltonetworks:prisma_access:2.2:*:*:*:preferred:*:*:*" ]
null
6.5
null
null
null
GHSA-rq9v-pgww-544v
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
[]
null
null
null
null
null
GHSA-435m-534h-fq69
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter enable_band_steering.
[]
null
9.8
null
null
null
GHSA-c5wv-fh3j-8jqv
Mozilla Developer Nicolas Silva found that when using WebRender, Firefox would under certain conditions leak arbitrary GPU memory to the visible screen. The leaked memory content was visible to the user, but not observable from web content. This vulnerability affects Firefox < 77.
[]
null
null
null
null
null
CVE-2025-7174
code-projects Library System teacher-issue-book.php sql injection
A vulnerability was found in code-projects Library System 1.0 and classified as critical. This issue affects some unknown processing of the file /teacher-issue-book.php. The manipulation of the argument idn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-7542-2wqc-jc3v
The Events Made Easy WordPress plugin before 2.2.36 does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks
[]
null
null
null
null
null
GHSA-v5xf-cfj4-rv57
A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
[]
null
null
7.8
null
null
CVE-2019-19366
A cross-site scripting (XSS) vulnerability in app/xml_cdr/xml_cdr_search.php in FusionPBX 4.4.1 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter.
[ "cpe:2.3:a:fusionpbx:fusionpbx:4.4.1:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2022-36728
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the RollNo parameter at /staff/delstu.php.
[ "cpe:2.3:a:library_management_system_project:library_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2024-25575
A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-352j-rqv2-cp9f
phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id parameter in a cmd.php?cmd=login_form request, or a crafted username and password in the login panel.
[]
null
9.8
null
null
null
CVE-2000-0094
procfs in BSD systems allows local users to gain root privileges by modifying the /proc/pid/mem interface via a modified file descriptor for stderr.
[ "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-39f7-5vm3-jfxg
The udpServerSys service in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to initiate firmware upgrades and alter device settings.
[]
null
7.5
null
null
null
CVE-2006-7245
Monkey's Audio before 4.01b2 allows remote attackers to cause a denial of service (application crash) via an APX file that lacks NULL termination.
[ "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:*:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.53:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.60:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.61:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.62:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.63:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.70:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.71:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.72:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.80:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.81:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.82:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.83:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.90:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.91:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.00:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.30:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.31:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.40:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.41:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.60:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.70:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.80:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.90:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.30:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.31:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.40:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.41:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.51:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.60:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.70:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.71:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.80:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.81:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.82:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.83:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.84:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.85:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.86:beta1:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.86:beta2:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.87:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.87:beta2:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.88:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.89:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.90:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.91:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.92:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.94:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.95:beta:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.96:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.97:*:*:*:*:*:*:*", "cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.99:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-1847
Multiple vulnerabilities exist in file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.
[ "cpe:2.3:a:3ds:edrawings:2023:sp0:*:*:*:*:*:*", "cpe:2.3:a:3ds:edrawings:2024:sp0:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-cpxr-x8w8-p34j
Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface.
[]
null
null
null
null
null
GHSA-p7fj-hjc3-prwh
Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.
[]
null
null
null
null
null
GHSA-4vgq-w9w2-q5g7
Cross-site scripting (XSS) vulnerability in signinform.php in Zeeways eBay Clone Auction Script allows remote attackers to inject arbitrary web script or HTML via the msg parameter. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2008-1863
SQL injection vulnerability in view_reviews.php in Prozilla Cheat Script (aka Cheats) 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:prozilla:cheats:2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-53098
Roo Code Vulnerable to Potential Remote Code Execution via Model Context Protocol
Roo Code is an AI-powered autonomous coding agent. The project-specific MCP configuration for the Roo Code agent is stored in the `.roo/mcp.json` file within the VS Code workspace. Because the MCP configuration format allows for execution of arbitrary commands, prior to version 3.20.3, it would have been possible for an attacker with access to craft a prompt to ask the agent to write a malicious command to the MCP configuration file. If the user had opted-in to auto-approving file writes within the project, this would have led to arbitrary command execution. This issue is of moderate severity, since it requires the attacker to already be able to submit prompts to the agent (for instance through a prompt injection attack), for the user to have MCP enabled (on by default), and for the user to have enabled auto-approved file writes (off by default). Version 3.20.3 fixes the issue by adding an additional layer of opt-in configuration for auto-approving writing to Roo's configuration files, including all files within the `.roo/` folder.
[]
null
8.1
null
null
null
CVE-2019-19781
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
[ "cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:application_delivery_controller_firmware:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2008-4613
SQL injection vulnerability in forums.asp in PortalApp 4.0 allows remote attackers to execute arbitrary SQL commands via the sortby parameter.
[ "cpe:2.3:a:portalapp:portalapp:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-hw39-2f47-g9hg
The Bluetooth Classic implementation on JBL TUNE500BT devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown a device by flooding the target device with LMP Feature Response data.
[]
null
null
null
null
null
GHSA-986v-gc7p-69fc
Windows Common Log File System Driver Elevation of Privilege Vulnerability
[]
null
7.8
null
null
null
CVE-2016-0419
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2016-0431.
[ "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
GHSA-fhxg-444p-h63x
Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
[]
null
6.1
null
null
null
GHSA-c6fg-jhfr-pxqg
Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI.
[]
null
null
null
null
null
CVE-2023-25474
WordPress About Me 3000 widget Plugin <= 2.2.6 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Csaba Kissi About Me 3000 widget plugin <= 2.2.6 versions.
[ "cpe:2.3:a:about_me_3000_widget_project:about_me_3000_widget:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2020-12782
Openfind MailGates - Command Injection
Openfind MailGates contains a Command Injection flaw, when receiving email with specific strings, malicious code in the mail attachment will be triggered and gain unauthorized access to system files.
[ "cpe:2.3:a:openfind:mailaudit:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:openfind:mailgates:5.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-53835
there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
null
RHSA-2024:0028
Red Hat Security Advisory: thunderbird security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
null
CVE-2022-28855
Adobe InDesign 2022 Out-of-Bound Read Memory leak
Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2000-1171
Directory traversal vulnerability in cgiforum.pl script in CGIForum 1.0 allows remote attackers to ready arbitrary files via a .. (dot dot) attack in the "thesection" parameter.
[ "cpe:2.3:a:markus_triska:cgiforum:1.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-38299
An issue in the Elasticsearch plugin of Appsmith v1.7.11 allows attackers to connect disallowed hosts to the AWS/GCP internal metadata endpoint.
[ "cpe:2.3:a:appsmith:appsmith:1.7.11:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-gj45-4cxg-gg5m
Pearson eSIS (Enterprise Student Information System) message board has stored XSS due to improper validation of user input
[]
null
null
null
null
null
CVE-2022-4822
FlatPress Setup main.lib.php cross site scripting
A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability.
[ "cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*" ]
null
2.4
2.4
null
https://github.com/flatpressblog/flatpress/commit/5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1
CVE-2015-1105
The TCP implementation in the kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 does not properly implement the Urgent (aka out-of-band data) mechanism, which allows remote attackers to cause a denial of service via crafted packets.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-3981
Icegram Express < 5.5.1 - Subscriber+ SQLi
The Icegram Express WordPress plugin before 5.5.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscriber
[ "cpe:2.3:a:icegram:email_subscribers_\\&_newsletters:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
null
PYSEC-2019-249
null
An issue was discovered in Exiv2 0.27. There is infinite recursion at BigTiffImage::printIFD in the file bigtiffimage.cpp. This can be triggered by a crafted file. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
[]
null
null
8.8
null
null
CVE-2019-14731
An issue was discovered in ZenTao 11.5.1. There is an XSS (stored) vulnerability that leads to the capture of other people's cookies via the Rich Text Box.
[ "cpe:2.3:a:cnezsoft:zentao:11.5.1:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2021-22973
On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.5, and all 12.1.x versions, JSON parser function does not protect against out-of-bounds memory accesses or writes. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-86c3-9x8j-mgp2
SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE); Microsoft Data Engine (MSDE) 1.0 SP4; and Internal Database (WYukon) SP2 does not initialize memory pages when reallocating memory, which allows database operators to obtain sensitive information (database contents) via unknown vectors related to memory page reuse.
[]
null
null
null
null
null
GHSA-wxg9-7gqq-wxgf
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
[]
null
7.5
null
null
null
GHSA-vc4c-pfw2-x65r
Multiple SQL injection vulnerabilities in the admin panel in PHPEcho CMS before 1.6 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
GHSA-m5cg-qjmp-pw59
Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.
[]
null
6.1
null
null
null
CVE-2024-56622
scsi: ufs: core: sysfs: Prevent div by zero
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: sysfs: Prevent div by zero Prevent a division by 0 when monitoring is not enabled.
[]
null
5.5
null
null
null
CVE-2005-3290
SQL injection vulnerability in Accelerated Mortgage Manager allows remote attackers to execute arbitrary SQL commands via the password field.
[ "cpe:2.3:a:accelerated_enterprise_solutions:accelerated_mortgage_manager:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2019-7085
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-cqvp-q99g-6w6c
Vulnerability in the PeopleSoft Enterprise FSCM component of Oracle PeopleSoft Products (subcomponent: Staffing Front Office). The supported version that is affected is 9.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FSCM. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise FSCM accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
2.7
null
null
CVE-2024-42991
MCMS v5.4.1 has front-end file upload vulnerability which can lead to remote command execution.
[ "cpe:2.3:a:mingsoft:mcms:5.4.1:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-fwc2-m759-47pp
Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language, a different vulnerability than CVE-2013-2395.
[]
null
null
null
null
null
CVE-2016-1856
WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1857.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
RHSA-2003:218
Red Hat Security Advisory: : : : Updated unzip and tar packages that fix vulnerabilities are now available
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
null
RHSA-2023:3583
Red Hat Security Advisory: c-ares security update
c-ares: 0-byte UDP payload Denial of Service
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.5
null
null
null
CVE-2014-5827
The Ibotta - Better than Coupons. (aka com.ibotta.android) application 2.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:ibotta:ibotta_-_better_than_coupons.:2.5.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-3m3x-cxhv-x999
The ThirstyAffiliates Affiliate Link Manager WordPress plugin before 3.10.5 lacks authorization checks in the ta_insert_external_image action, allowing a low-privilege user (with a role as low as Subscriber) to add an image from an external URL to an affiliate link. Further the plugin lacks csrf checks, allowing an attacker to trick a logged in user to perform the action by crafting a special request.
[]
null
4.3
null
null
null
GHSA-qj86-hq7c-367x
Multiple cross-site scripting (XSS) vulnerabilities in Pure Software Lore before 1.7.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the (1) article comments feature and the (2) search log feature.
[]
null
null
null
null
null
GHSA-cq55-h3qw-j4hc
A logic issue was addressed with improved checks. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges.
[]
null
7.8
null
null
null
GHSA-j2gr-q67w-xgf5
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology). Supported versions that are affected are 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
6.1
null
null
GHSA-mcjh-xvx4-fph7
cPanel before 64.0.21 allows code execution via Rails configuration files (SEC-259).
[]
null
null
6.7
null
null
GHSA-hj36-mw8h-wwjc
An issue in PARK DANDAN mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[]
null
5.3
null
null
null
GHSA-wf3q-987m-hfcv
/etc/rc.d/rc.local on the D-Link DCS-2121 camera with firmware 1.04 configures a hardcoded password of admin for the root account, which makes it easier for remote attackers to obtain shell access by leveraging a running telnetd server.
[]
null
null
null
null
null
GHSA-wf2p-c7pp-qfjr
The client and server of Chaser 1.50 and earlier allow remote attackers to cause a denial of service (crash via exception) via a UDP packet with a length field that is greater than the actual data length, which causes Chaser to read unexpected memory.
[]
null
null
null
null
null
RHSA-2022:5459
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.24 security update
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
8.8
null
null
null
GHSA-vg3q-9wvx-mqjh
The Qualcomm video driver in Android before 2016-06-01 on Nexus 5, 5X, 6, and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 27407629.
[]
null
null
7.8
null
null
CVE-2024-0748
A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2004-1263
changepassword.cgi in ChangePassword 0.8, when installed setuid, allows local users to execute arbitrary code by modifying the PATH environment variable to point to a malicious "make" program.
[ "cpe:2.3:a:changepassword:changepassword:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:changepassword:changepassword:0.8:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-q2m4-jgq9-q8vh
Subversion's mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation.
[]
null
null
7.5
null
null
GHSA-674v-8jwc-qm6f
ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted ps file.
[]
null
null
5.5
null
null
GHSA-x5g3-cgwm-f6mx
Under certain conditions SAP Business Client 6.5 allows an attacker to access information which would otherwise be restricted.
[]
null
null
7.5
null
null
CVE-2014-6977
The eLearn (aka com.desire2learn.campuslife.chattanoogastate.edu.directory) application 1.0.649.1194 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:chattanoogastate:elearn:1.0.649.1194:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-566w-735r-v996
IBM Rational ClearQuest 7.1.x before 7.1.2.7 and 8.x before 8.0.0.3, when ClearQuest Authentication is enabled, allows remote authenticated users to read password hashes via a user query.
[]
null
null
null
null
null
RHSA-2011:0261
Red Hat Security Advisory: bash security and bug fix update
bash: Insecure temporary file use in aliasconv.sh, aliasconv.bash, cshtobash (symlink attack)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
null
CVE-2016-10844
The chcpass script in cPanel before 11.54.0.4 reveals a password hash (SEC-77).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
6.5
4
null
CVE-2022-1191
SSRF on index.php/cobrowse/proxycss/ in livehelperchat/livehelperchat
SSRF on index.php/cobrowse/proxycss/ in GitHub repository livehelperchat/livehelperchat prior to 3.96.
[ "cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*" ]
null
null
8.7
null
null
RHSA-2020:0630
Red Hat Security Advisory: ppp security update
ppp: Buffer overflow in the eap_request and eap_response functions in eap.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
null
CVE-2019-2931
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
null
GHSA-2qxc-rcjp-37j2
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
null
7.5
null
null
null
CVE-2024-49251
WordPress Maan Addons For Elementor plugin <= 1.0.1 - Local File Inclusion vulnerability
: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Maantheme Maan Addons For Elementor allows Local Code Inclusion.This issue affects Maan Addons For Elementor: from n/a through 1.0.1.
[ "cpe:2.3:a:maantheme:maan_addons_for_elementor:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-9hh6-wxjm-j7jw
SQL injection vulnerability in Cash Back Comparison Script 1.0 allows remote attackers to execute arbitrary SQL commands via the PATH_INFO to search/.
[]
null
null
9.8
null
null
GHSA-3wxh-43c2-qm9r
In NatHack between 3.6.0 and 3.6.3, a buffer overflow issue exists when reading very long lines from a NetHack configuration file (usually named .nethackrc). This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files. All users are urged to upgrade to NetHack 3.6.4 as soon as possible.
[]
null
null
null
null
null
GHSA-4hf6-q6vm-9g38
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote attackers to affect confidentiality via unknown vectors related to Integration Broker.
[]
null
null
null
null
null
CVE-2004-0258
Multiple buffer overflows in RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, and RealPlayer Enterprise allow remote attackers to execute arbitrary code via malformed (1) .RP, (2) .RT, (3) .RAM, (4) .RPM or (5) .SMIL files.
[ "cpe:2.3:a:realnetworks:realone_desktop_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_enterprise_desktop:6.0.11.774:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:2.0:*:win:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:6.0.11.818:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:6.0.11.830:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:6.0.11.841:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:6.0.11.853:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realone_player:6.0.11.868:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:8.0:*:mac_os:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:8.0:*:unix:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*" ]
null
null
null
7.6
null
GHSA-gc7m-596h-x57r
frappejs was discovered to contain a prototype pollution via the function registerView
airvertco frappejs v0.0.11 was discovered to contain a prototype pollution via the function registerView. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
[]
null
8.8
null
null
null
CVE-2024-10070
ESAFENET CDG PolicyPushControlAction.java actionPolicyPush sql injection
A vulnerability classified as critical has been found in ESAFENET CDG 5. This affects the function actionPolicyPush of the file /com/esafenet/policy/action/PolicyPushControlAction.java. The manipulation of the argument policyId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
GHSA-rjxr-p6mg-hvgf
The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).
[]
null
null
null
null
null
CVE-2025-3331
codeprojects Online Restaurant Management System payment_save.php sql injection
A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. This issue affects some unknown processing of the file /payment_save.php. The manipulation of the argument mode leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
CVE-2017-0372
Parameters injection in SyntaxHighlight results in multiple vulnerabilities
Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.27.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.27.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.27.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.28.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-2mcw-74cw-v9cj
Absolute path traversal vulnerability in the 3D Graph ActiveX control in cw3dgrph.ocx in National Instruments LabWindows/CVI 2012 SP1 and earlier, LabVIEW 2012 SP1 and earlier, and other products allows remote attackers to create and execute arbitrary files via a full pathname in an argument to the ExportStyle method, in conjunction with file content in the (1) Caption or (2) FormatString property value.
[]
null
null
null
null
null