id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2002-0669
|
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows administrators to cause a denial of service by modifying the SIP_AUTHENTICATE_SCHEME value to force authentication of incoming calls, which does not notify the user when an authentication failure occurs.
|
[
"cpe:2.3:h:pingtel:xpressa:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:h:pingtel:xpressa:1.2.7.4:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-9ppf-383x-3hmv
|
Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6.
|
[] | null | 7.5
| null | null | null |
|
GHSA-28xr-mwxg-3qc8
|
Command injection in simple-git
|
`simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.5.0.
|
[] | null | 8.1
| null | null | null |
GHSA-crvj-53j9-v9xw
|
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to iOS 12.1, macOS Mojave 10.14.1, tvOS 12.1, watchOS 5.1, iTunes 12.9.1.
|
[] | null | null | 7.8
| null | null |
|
GHSA-8cxw-wvhc-p4x4
|
Jenkins NUnit Plugin vulnerable to Protection Mechanism Failure
|
Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller. NUnit Plugin 0.28 changes the message type from agent-to-controller to controller-to-agent, preventing execution on the controller.
|
[] | null | 5.3
| null | null | null |
GHSA-6394-jqhh-rg8r
|
The WP Social Sharing WordPress plugin through 2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8
| null | null | null |
|
CVE-2008-6838
|
Cross-site scripting (XSS) vulnerability in search.php in Zoph 0.7.2.1 allows remote attackers to inject arbitrary web script or HTML via the _off parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:zoph:zoph:0.7.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-698m-g6fr-27mg
|
Dell EMC OpenManage Enterprise (OME) versions prior to 3.2 and OpenManage Enterprise-Modular (OME-M) versions prior to 1.10.00 contain an injection vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability to gain access to sensitive information or cause denial-of-service.
|
[] | null | 8.1
| null | null | null |
|
CVE-2016-2178
|
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
|
[
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
] | null | 5.5
| null | 2.1
| null |
|
CVE-1999-0392
|
Buffer overflow in Thomas Boutell's cgic library version up to 1.05.
|
[
"cpe:2.3:a:thomas_boutell:cgic_library:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2023-20581
|
Improper access control in the IOMMU may allow a privileged attacker to bypass RMP checks, potentially leading to a loss of guest memory integrity.
|
[] | null | 2.5
| null | null | null |
|
CVE-2022-0011
|
PAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering
|
PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL category. This is done by creating a custom URL category list or by using an external dynamic list (EDL) in a URL Filtering profile. When the entries in these lists have a hostname pattern that does not end with a forward slash (/) or a hostname pattern that ends with an asterisk (*), any URL that starts with the specified pattern is considered a match. Entries with a caret (^) at the end of a hostname pattern match any top level domain. This may inadvertently allow or block more URLs than intended and allowing more URLs than intended represents a security risk. For example: example.com will match example.com.website.test example.com.* will match example.com.website.test example.com.^ will match example.com.test You should take special care when using such entries in policy rules that allow traffic. Where possible, use the exact list of hostname names ending with a forward slash (/) instead of using wildcards. PAN-OS 10.1 versions earlier than PAN-OS 10.1.3; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 9.1 versions earlier than PAN-OS 9.1.12; all PAN-OS 9.0 versions; PAN-OS 8.1 versions earlier than PAN-OS 8.1.21, and Prisma Access 2.2 and 2.1 versions do not allow customers to change this behavior without changing the URL category list or EDL.
|
[
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paloaltonetworks:prisma_access:2.1:*:*:*:innovation:*:*:*",
"cpe:2.3:a:paloaltonetworks:prisma_access:2.1:*:*:*:preferred:*:*:*",
"cpe:2.3:a:paloaltonetworks:prisma_access:2.2:*:*:*:preferred:*:*:*"
] | null | 6.5
| null | null | null |
GHSA-rq9v-pgww-544v
|
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
|
[] | null | null | null | null | null |
|
GHSA-435m-534h-fq69
|
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter enable_band_steering.
|
[] | null | 9.8
| null | null | null |
|
GHSA-c5wv-fh3j-8jqv
|
Mozilla Developer Nicolas Silva found that when using WebRender, Firefox would under certain conditions leak arbitrary GPU memory to the visible screen. The leaked memory content was visible to the user, but not observable from web content. This vulnerability affects Firefox < 77.
|
[] | null | null | null | null | null |
|
CVE-2025-7174
|
code-projects Library System teacher-issue-book.php sql injection
|
A vulnerability was found in code-projects Library System 1.0 and classified as critical. This issue affects some unknown processing of the file /teacher-issue-book.php. The manipulation of the argument idn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
GHSA-7542-2wqc-jc3v
|
The Events Made Easy WordPress plugin before 2.2.36 does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks
|
[] | null | null | null | null | null |
|
GHSA-v5xf-cfj4-rv57
|
A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
|
[] | null | null | 7.8
| null | null |
|
CVE-2019-19366
|
A cross-site scripting (XSS) vulnerability in app/xml_cdr/xml_cdr_search.php in FusionPBX 4.4.1 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter.
|
[
"cpe:2.3:a:fusionpbx:fusionpbx:4.4.1:*:*:*:*:*:*:*"
] | null | 6.1
| null | 4.3
| null |
|
CVE-2022-36728
|
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the RollNo parameter at /staff/delstu.php.
|
[
"cpe:2.3:a:library_management_system_project:library_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
CVE-2024-25575
|
A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
|
GHSA-352j-rqv2-cp9f
|
phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id parameter in a cmd.php?cmd=login_form request, or a crafted username and password in the login panel.
|
[] | null | 9.8
| null | null | null |
|
CVE-2000-0094
|
procfs in BSD systems allows local users to gain root privileges by modifying the /proc/pid/mem interface via a modified file descriptor for stderr.
|
[
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
GHSA-39f7-5vm3-jfxg
|
The udpServerSys service in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to initiate firmware upgrades and alter device settings.
|
[] | null | 7.5
| null | null | null |
|
CVE-2006-7245
|
Monkey's Audio before 4.01b2 allows remote attackers to cause a denial of service (application crash) via an APX file that lacks NULL termination.
|
[
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:*:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.53:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.60:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.62:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.63:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.71:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.72:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.80:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.81:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.82:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.83:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:1.91:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.40:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.70:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.31:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.40:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.41:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.70:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.71:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.80:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.81:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.82:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.83:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.84:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.85:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.86:beta1:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.86:beta2:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.87:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.87:beta2:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.88:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.89:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.90:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.91:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.92:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.94:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.95:beta:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.96:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.97:*:*:*:*:*:*:*",
"cpe:2.3:a:monkeysaudio:monkey\\'s_audio:3.99:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2024-1847
|
Multiple vulnerabilities exist in file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024
|
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.
|
[
"cpe:2.3:a:3ds:edrawings:2023:sp0:*:*:*:*:*:*",
"cpe:2.3:a:3ds:edrawings:2024:sp0:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
GHSA-cpxr-x8w8-p34j
|
Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface.
|
[] | null | null | null | null | null |
|
GHSA-p7fj-hjc3-prwh
|
Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.
|
[] | null | null | null | null | null |
|
GHSA-4vgq-w9w2-q5g7
|
Cross-site scripting (XSS) vulnerability in signinform.php in Zeeways eBay Clone Auction Script allows remote attackers to inject arbitrary web script or HTML via the msg parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2008-1863
|
SQL injection vulnerability in view_reviews.php in Prozilla Cheat Script (aka Cheats) 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:prozilla:cheats:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2025-53098
|
Roo Code Vulnerable to Potential Remote Code Execution via Model Context Protocol
|
Roo Code is an AI-powered autonomous coding agent. The project-specific MCP configuration for the Roo Code agent is stored in the `.roo/mcp.json` file within the VS Code workspace. Because the MCP configuration format allows for execution of arbitrary commands, prior to version 3.20.3, it would have been possible for an attacker with access to craft a prompt to ask the agent to write a malicious command to the MCP configuration file. If the user had opted-in to auto-approving file writes within the project, this would have led to arbitrary command execution. This issue is of moderate severity, since it requires the attacker to already be able to submit prompts to the agent (for instance through a prompt injection attack), for the user to have MCP enabled (on by default), and for the user to have enabled auto-approved file writes (off by default). Version 3.20.3 fixes the issue by adding an additional layer of opt-in configuration for auto-approving writing to Roo's configuration files, including all files within the `.roo/` folder.
|
[] | null | 8.1
| null | null | null |
CVE-2019-19781
|
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
|
[
"cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
CVE-2008-4613
|
SQL injection vulnerability in forums.asp in PortalApp 4.0 allows remote attackers to execute arbitrary SQL commands via the sortby parameter.
|
[
"cpe:2.3:a:portalapp:portalapp:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-hw39-2f47-g9hg
|
The Bluetooth Classic implementation on JBL TUNE500BT devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown a device by flooding the target device with LMP Feature Response data.
|
[] | null | null | null | null | null |
|
GHSA-986v-gc7p-69fc
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
[] | null | 7.8
| null | null | null |
|
CVE-2016-0419
|
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2016-0431.
|
[
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
] | null | null | null | 4.9
| null |
|
GHSA-fhxg-444p-h63x
|
Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
|
[] | null | 6.1
| null | null | null |
|
GHSA-c6fg-jhfr-pxqg
|
Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI.
|
[] | null | null | null | null | null |
|
CVE-2023-25474
|
WordPress About Me 3000 widget Plugin <= 2.2.6 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Csaba Kissi About Me 3000 widget plugin <= 2.2.6 versions.
|
[
"cpe:2.3:a:about_me_3000_widget_project:about_me_3000_widget:*:*:*:*:*:wordpress:*:*"
] | null | 4.3
| null | null | null |
CVE-2020-12782
|
Openfind MailGates - Command Injection
|
Openfind MailGates contains a Command Injection flaw, when receiving email with specific strings, malicious code in the mail attachment will be triggered and gain unauthorized access to system files.
|
[
"cpe:2.3:a:openfind:mailaudit:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openfind:mailgates:5.0:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
CVE-2024-53835
|
there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.8
| null | null | null |
|
RHSA-2024:0028
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5
| null | null | null |
CVE-2022-28855
|
Adobe InDesign 2022 Out-of-Bound Read Memory leak
|
Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
CVE-2000-1171
|
Directory traversal vulnerability in cgiforum.pl script in CGIForum 1.0 allows remote attackers to ready arbitrary files via a .. (dot dot) attack in the "thesection" parameter.
|
[
"cpe:2.3:a:markus_triska:cgiforum:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2022-38299
|
An issue in the Elasticsearch plugin of Appsmith v1.7.11 allows attackers to connect disallowed hosts to the AWS/GCP internal metadata endpoint.
|
[
"cpe:2.3:a:appsmith:appsmith:1.7.11:*:*:*:*:*:*:*"
] | null | 4.3
| null | null | null |
|
GHSA-gj45-4cxg-gg5m
|
Pearson eSIS (Enterprise Student Information System) message board has stored XSS due to improper validation of user input
|
[] | null | null | null | null | null |
|
CVE-2022-4822
|
FlatPress Setup main.lib.php cross site scripting
|
A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability.
|
[
"cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*"
] | null | 2.4
| 2.4
| null |
https://github.com/flatpressblog/flatpress/commit/5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1
|
CVE-2015-1105
|
The TCP implementation in the kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 does not properly implement the Urgent (aka out-of-band data) mechanism, which allows remote attackers to cause a denial of service via crafted packets.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2022-3981
|
Icegram Express < 5.5.1 - Subscriber+ SQLi
|
The Icegram Express WordPress plugin before 5.5.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscriber
|
[
"cpe:2.3:a:icegram:email_subscribers_\\&_newsletters:*:*:*:*:*:wordpress:*:*"
] | null | 8.8
| null | null | null |
PYSEC-2019-249
| null |
An issue was discovered in Exiv2 0.27. There is infinite recursion at BigTiffImage::printIFD in the file bigtiffimage.cpp. This can be triggered by a crafted file. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
|
[] | null | null | 8.8
| null | null |
CVE-2019-14731
|
An issue was discovered in ZenTao 11.5.1. There is an XSS (stored) vulnerability that leads to the capture of other people's cookies via the Rich Text Box.
|
[
"cpe:2.3:a:cnezsoft:zentao:11.5.1:*:*:*:*:*:*:*"
] | null | null | 5.4
| 3.5
| null |
|
CVE-2021-22973
|
On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.5, and all 12.1.x versions, JSON parser function does not protect against out-of-bounds memory accesses or writes. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
GHSA-86c3-9x8j-mgp2
|
SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE); Microsoft Data Engine (MSDE) 1.0 SP4; and Internal Database (WYukon) SP2 does not initialize memory pages when reallocating memory, which allows database operators to obtain sensitive information (database contents) via unknown vectors related to memory page reuse.
|
[] | null | null | null | null | null |
|
GHSA-wxg9-7gqq-wxgf
|
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
|
[] | null | 7.5
| null | null | null |
|
GHSA-vc4c-pfw2-x65r
|
Multiple SQL injection vulnerabilities in the admin panel in PHPEcho CMS before 1.6 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-m5cg-qjmp-pw59
|
Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.
|
[] | null | 6.1
| null | null | null |
|
CVE-2024-56622
|
scsi: ufs: core: sysfs: Prevent div by zero
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: sysfs: Prevent div by zero
Prevent a division by 0 when monitoring is not enabled.
|
[] | null | 5.5
| null | null | null |
CVE-2005-3290
|
SQL injection vulnerability in Accelerated Mortgage Manager allows remote attackers to execute arbitrary SQL commands via the password field.
|
[
"cpe:2.3:a:accelerated_enterprise_solutions:accelerated_mortgage_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2019-7085
|
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8
| 10
| null |
|
GHSA-cqvp-q99g-6w6c
|
Vulnerability in the PeopleSoft Enterprise FSCM component of Oracle PeopleSoft Products (subcomponent: Staffing Front Office). The supported version that is affected is 9.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FSCM. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise FSCM accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | 2.7
| null | null |
|
CVE-2024-42991
|
MCMS v5.4.1 has front-end file upload vulnerability which can lead to remote command execution.
|
[
"cpe:2.3:a:mingsoft:mcms:5.4.1:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
|
GHSA-fwc2-m759-47pp
|
Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language, a different vulnerability than CVE-2013-2395.
|
[] | null | null | null | null | null |
|
CVE-2016-1856
|
WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1857.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.8
| null |
|
RHSA-2003:218
|
Red Hat Security Advisory: : : : Updated unzip and tar packages that fix vulnerabilities are now available
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null | null |
RHSA-2023:3583
|
Red Hat Security Advisory: c-ares security update
|
c-ares: 0-byte UDP payload Denial of Service
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5
| null | null | null |
CVE-2014-5827
|
The Ibotta - Better than Coupons. (aka com.ibotta.android) application 2.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:ibotta:ibotta_-_better_than_coupons.:2.5.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
GHSA-3m3x-cxhv-x999
|
The ThirstyAffiliates Affiliate Link Manager WordPress plugin before 3.10.5 lacks authorization checks in the ta_insert_external_image action, allowing a low-privilege user (with a role as low as Subscriber) to add an image from an external URL to an affiliate link. Further the plugin lacks csrf checks, allowing an attacker to trick a logged in user to perform the action by crafting a special request.
|
[] | null | 4.3
| null | null | null |
|
GHSA-qj86-hq7c-367x
|
Multiple cross-site scripting (XSS) vulnerabilities in Pure Software Lore before 1.7.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the (1) article comments feature and the (2) search log feature.
|
[] | null | null | null | null | null |
|
GHSA-cq55-h3qw-j4hc
|
A logic issue was addressed with improved checks. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges.
|
[] | null | 7.8
| null | null | null |
|
GHSA-j2gr-q67w-xgf5
|
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology). Supported versions that are affected are 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | null | 6.1
| null | null |
|
GHSA-mcjh-xvx4-fph7
|
cPanel before 64.0.21 allows code execution via Rails configuration files (SEC-259).
|
[] | null | null | 6.7
| null | null |
|
GHSA-hj36-mw8h-wwjc
|
An issue in PARK DANDAN mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
[] | null | 5.3
| null | null | null |
|
GHSA-wf3q-987m-hfcv
|
/etc/rc.d/rc.local on the D-Link DCS-2121 camera with firmware 1.04 configures a hardcoded password of admin for the root account, which makes it easier for remote attackers to obtain shell access by leveraging a running telnetd server.
|
[] | null | null | null | null | null |
|
GHSA-wf2p-c7pp-qfjr
|
The client and server of Chaser 1.50 and earlier allow remote attackers to cause a denial of service (crash via exception) via a UDP packet with a length field that is greater than the actual data length, which causes Chaser to read unexpected memory.
|
[] | null | null | null | null | null |
|
RHSA-2022:5459
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.24 security update
|
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | 8.8
| null | null | null |
GHSA-vg3q-9wvx-mqjh
|
The Qualcomm video driver in Android before 2016-06-01 on Nexus 5, 5X, 6, and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 27407629.
|
[] | null | null | 7.8
| null | null |
|
CVE-2024-0748
|
A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 4.3
| null | null | null |
|
CVE-2004-1263
|
changepassword.cgi in ChangePassword 0.8, when installed setuid, allows local users to execute arbitrary code by modifying the PATH environment variable to point to a malicious "make" program.
|
[
"cpe:2.3:a:changepassword:changepassword:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:changepassword:changepassword:0.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
GHSA-q2m4-jgq9-q8vh
|
Subversion's mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation.
|
[] | null | null | 7.5
| null | null |
|
GHSA-674v-8jwc-qm6f
|
ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted ps file.
|
[] | null | null | 5.5
| null | null |
|
GHSA-x5g3-cgwm-f6mx
|
Under certain conditions SAP Business Client 6.5 allows an attacker to access information which would otherwise be restricted.
|
[] | null | null | 7.5
| null | null |
|
CVE-2014-6977
|
The eLearn (aka com.desire2learn.campuslife.chattanoogastate.edu.directory) application 1.0.649.1194 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:chattanoogastate:elearn:1.0.649.1194:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
GHSA-566w-735r-v996
|
IBM Rational ClearQuest 7.1.x before 7.1.2.7 and 8.x before 8.0.0.3, when ClearQuest Authentication is enabled, allows remote authenticated users to read password hashes via a user query.
|
[] | null | null | null | null | null |
|
RHSA-2011:0261
|
Red Hat Security Advisory: bash security and bug fix update
|
bash: Insecure temporary file use in aliasconv.sh, aliasconv.bash, cshtobash (symlink attack)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2016-10844
|
The chcpass script in cPanel before 11.54.0.4 reveals a password hash (SEC-77).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4
| null |
|
CVE-2022-1191
|
SSRF on index.php/cobrowse/proxycss/ in livehelperchat/livehelperchat
|
SSRF on index.php/cobrowse/proxycss/ in GitHub repository livehelperchat/livehelperchat prior to 3.96.
|
[
"cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*"
] | null | null | 8.7
| null | null |
RHSA-2020:0630
|
Red Hat Security Advisory: ppp security update
|
ppp: Buffer overflow in the eap_request and eap_response functions in eap.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8
| null | null | null |
CVE-2019-2931
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"
] | null | 6.1
| null | 5.8
| null |
|
GHSA-2qxc-rcjp-37j2
|
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | null | 7.5
| null | null | null |
|
CVE-2024-49251
|
WordPress Maan Addons For Elementor plugin <= 1.0.1 - Local File Inclusion vulnerability
|
: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Maantheme Maan Addons For Elementor allows Local Code Inclusion.This issue affects Maan Addons For Elementor: from n/a through 1.0.1.
|
[
"cpe:2.3:a:maantheme:maan_addons_for_elementor:*:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
GHSA-9hh6-wxjm-j7jw
|
SQL injection vulnerability in Cash Back Comparison Script 1.0 allows remote attackers to execute arbitrary SQL commands via the PATH_INFO to search/.
|
[] | null | null | 9.8
| null | null |
|
GHSA-3wxh-43c2-qm9r
|
In NatHack between 3.6.0 and 3.6.3, a buffer overflow issue exists when reading very long lines from a NetHack configuration file (usually named .nethackrc). This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files. All users are urged to upgrade to NetHack 3.6.4 as soon as possible.
|
[] | null | null | null | null | null |
|
GHSA-4hf6-q6vm-9g38
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote attackers to affect confidentiality via unknown vectors related to Integration Broker.
|
[] | null | null | null | null | null |
|
CVE-2004-0258
|
Multiple buffer overflows in RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, and RealPlayer Enterprise allow remote attackers to execute arbitrary code via malformed (1) .RP, (2) .RT, (3) .RAM, (4) .RPM or (5) .SMIL files.
|
[
"cpe:2.3:a:realnetworks:realone_desktop_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_enterprise_desktop:6.0.11.774:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:2.0:*:win:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:6.0.11.818:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:6.0.11.830:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:6.0.11.841:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:6.0.11.853:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:6.0.11.868:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:8.0:*:mac_os:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:8.0:*:unix:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:8.0:*:win32:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*"
] | null | null | null | 7.6
| null |
|
GHSA-gc7m-596h-x57r
|
frappejs was discovered to contain a prototype pollution via the function registerView
|
airvertco frappejs v0.0.11 was discovered to contain a prototype pollution via the function registerView. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
|
[] | null | 8.8
| null | null | null |
CVE-2024-10070
|
ESAFENET CDG PolicyPushControlAction.java actionPolicyPush sql injection
|
A vulnerability classified as critical has been found in ESAFENET CDG 5. This affects the function actionPolicyPush of the file /com/esafenet/policy/action/PolicyPushControlAction.java. The manipulation of the argument policyId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*"
] | 5.3
| 6.3
| 6.3
| 6.5
| null |
GHSA-rjxr-p6mg-hvgf
|
The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).
|
[] | null | null | null | null | null |
|
CVE-2025-3331
|
codeprojects Online Restaurant Management System payment_save.php sql injection
|
A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. This issue affects some unknown processing of the file /payment_save.php. The manipulation of the argument mode leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
CVE-2017-0372
|
Parameters injection in SyntaxHighlight results in multiple vulnerabilities
|
Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.27.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.27.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.28.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 9.8
| 7.5
| null |
GHSA-2mcw-74cw-v9cj
|
Absolute path traversal vulnerability in the 3D Graph ActiveX control in cw3dgrph.ocx in National Instruments LabWindows/CVI 2012 SP1 and earlier, LabVIEW 2012 SP1 and earlier, and other products allows remote attackers to create and execute arbitrary files via a full pathname in an argument to the ExportStyle method, in conjunction with file content in the (1) Caption or (2) FormatString property value.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.