id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2014-6313
|
Cross-site scripting (XSS) vulnerability in the WooCommerce plugin before 2.2.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the range parameter on the wc-reports page to wp-admin/admin.php.
|
[
"cpe:2.3:a:woothemes:woocommerce_plugin:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.10:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.11:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.12:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.2.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.2.1:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-23x3-vhwf-vxrj
|
Windows Win32k Elevation of Privilege Vulnerability.
|
[] | null | 7.8
| null | null | null |
|
GHSA-mg7j-7xcr-99h7
|
The 10WebAnalytics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.8. This is due to missing or incorrect nonce validation on the create_csv_file() function. This makes it possible for unauthenticated attackers to create a CSV file via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3
| null | null | null |
|
GHSA-6qwx-8695-88pj
|
Cross-site scripting (XSS) vulnerability on I-O DATA DEVICE WN-G300R devices with firmware 1.12 and earlier, WN-G300R2 devices with firmware 1.12 and earlier, and WN-G300R3 devices with firmware 1.01 and earlier allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | 5.4
| null | null |
|
GHSA-34x9-x6hh-cvvw
|
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575.
|
[] | null | 6.7
| null | null | null |
|
RHSA-2025:16981
|
Red Hat Security Advisory: RHOAI 2.16.3 - Red Hat OpenShift AI
|
openshift-ai: Overly Permissive ClusterRole Allows Authenticated Users to Escalate Privileges to Cluster Admin openshift-ai: privilege escalation via excessive /etc/passwd permissions
|
[
"cpe:/a:redhat:openshift_ai:2.16::el8"
] | null | 5.2
| null | null | null |
GHSA-7mwg-rc7q-hj2v
|
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the size of an input buffer is not validated which may lead to denial of service or potential escalation of privileges
|
[] | null | null | 7.8
| null | null |
|
GHSA-989p-xhj8-3ff8
|
Phpgurukul Human Metapneumovirus (HMPV) – Testing Management System v1.0 is vulnerable to SQL Injection in /patient-report.php via the parameter searchdata..
|
[] | null | 5.4
| null | null | null |
|
CVE-2021-39205
|
DOM-based XSS/Content Spoofing via Prototype Pollution
|
Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
|
[
"cpe:2.3:a:8x8:jitsi_meet:*:*:*:*:*:*:*:*"
] | null | 6.8
| null | null | null |
CVE-2025-24958
|
SQL Injection endpoint 'salvar_tag.php' parameter 'id_tag' in WeGIA
|
WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_tag.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] | 9.4
| null | null | null | null |
GHSA-wwrr-4jp4-58wg
|
CSRF vulnerability in Jenkins Mantis Plugin
|
A cross-site request forgery vulnerability in Jenkins Mantis Plugin 0.26 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials.
|
[] | null | 4.3
| null | null | null |
CVE-2025-25428
|
TRENDnet TEW-929DRU 1.0.0.10 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
|
[] | null | 8
| null | null | null |
|
CVE-2025-27015
|
WordPress Hostiko Theme < 30.1 - Local File Inclusion vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in designingmedia Hostiko allows PHP Local File Inclusion.This issue affects Hostiko: from n/a before 30.1.
|
[] | null | 7.5
| null | null | null |
GHSA-xxrg-cc44-fcvc
|
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka 'Microsoft Edge Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0645, CVE-2019-0650.
|
[] | null | null | 7.5
| null | null |
|
GHSA-4wxw-3vrc-3hmh
|
A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn't properly set an ERRNO value. This issue may lead to a NULL pointer access.
|
[] | null | 4.4
| null | null | null |
|
CVE-2022-42395
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. Crafted data in an XPS file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18274.
|
[
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| null | null |
|
GHSA-m8w6-47jc-f78c
|
A security vulnerability has been detected in Tenda CH22 up to 1.0.0.1. This issue affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset of the component HTTP Request Handler. The manipulation of the argument mit_ssid_index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
|
[] | 8.9
| 9.8
| null | null | null |
|
GHSA-mc5g-g767-pr48
|
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory, aka 'Media Foundation Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0937, CVE-2020-0939, CVE-2020-0946, CVE-2020-0947.
|
[] | null | null | null | null | null |
|
GHSA-7p6h-mxvv-phmp
|
The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2022-3533
|
Linux Kernel BPF usdt.c parse_usdt_arg memory leak
|
A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects the function parse_usdt_arg of the file tools/lib/bpf/usdt.c of the component BPF. The manipulation of the argument reg_name leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211031.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 3.5
| null | null | null |
CVE-2014-5590
|
The Snake Evolution (aka com.btwgames.snake) application 1.3.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:snake_evolution_project:snake_evolution:1.3.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
CVE-2021-22454
|
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump.
|
[
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] | null | 5.5
| null | 2.1
| null |
|
GHSA-c5g6-7q93-3g2v
|
SQL injection vulnerability in wpdatatables.php in the wpDataTables plugin 1.5.3 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the table_id parameter in a get_wdtable action to wp-admin/admin-ajax.php.
|
[] | null | null | null | null | null |
|
CVE-2025-61763
|
Vulnerability in Oracle Essbase (component: Essbase Web Platform). The supported version that is affected is 21.7.3.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Essbase accessible data as well as unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[] | null | 8.1
| null | null | null |
|
GHSA-gpxc-hjqg-f39p
|
Windows Server Service Tampering Vulnerability.
|
[] | null | 8.8
| null | null | null |
|
CVE-2009-3731
|
Multiple cross-site scripting (XSS) vulnerabilities in WebWorks Help 2.0 through 5.0 in VMware vCenter 4.0 before Update 1 Build 208156; VMware Server 2.0.2; VMware ESX 4.0; VMware Lab Manager 2.x; VMware vCenter Lab Manager 3.x and 4.x before 4.0.1; VMware Stage Manager 1.x before 4.0.1; WebWorks Publisher 6.x through 8.x; WebWorks Publisher 2003; and WebWorks ePublisher 9.0.x through 9.3, 2008.1 through 2008.4, and 2009.x before 2009.3 allow remote attackers to inject arbitrary web script or HTML via (1) wwhelp_entry.html, reachable through index.html and wwhsec.htm, (2) wwhelp/wwhimpl/api.htm, (3) wwhelp/wwhimpl/common/html/frameset.htm, (4) wwhelp/wwhimpl/common/scripts/switch.js, or (5) the window.opener component in wwhelp/wwhimpl/common/html/bookmark.htm, related to (a) unspecified parameters and (b) messages used in topic links for the bookmarking functionality.
|
[
"cpe:2.3:a:webworks:epublisher:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:2008.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:2008.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:2008.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:2008.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:2009.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:epublisher:2009.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:help:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:help:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:help:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:help:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:publisher:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:publisher:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:publisher:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webworks:publisher:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:esx_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:lab_manager:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:stage_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:stage_manager:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_lab_manager:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_lab_manager:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_lab_manager:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_lab_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_stage_manager:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2020-26820
|
SAP NetWeaver AS JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it.
|
[
"cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*"
] | null | null | 9.1
| null | null |
|
CVE-2013-5178
|
LaunchServices in Apple Mac OS X before 10.9 does not properly restrict Unicode characters in filenames, which allows context-dependent attackers to spoof file extensions via a crafted character sequence.
|
[
"cpe:2.3:o:apple:mac_os_x:*:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2017-9712
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, if userspace provides a too-large IE length in wlan_hdd_cfg80211_set_ie, a buffer over-read occurs.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2009-3314
|
SQL injection vulnerability in ladders.php in Elite Gaming Ladders 3.2 allows remote attackers to execute arbitrary SQL commands via the platform parameter.
|
[
"cpe:2.3:a:eliteladders:elite_gaming_ladders:3.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-f9hx-6968-9wf3
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2020-14162
|
An issue was discovered in Pi-Hole through 5.0. The local www-data user has sudo privileges to execute the pihole core script as root without a password, which could allow an attacker to obtain root access via shell metacharacters to this script's setdns command.
|
[
"cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*"
] | null | 7.8
| null | 7.2
| null |
|
CVE-2021-29953
|
A malicious webpage could have forced a Firefox for Android user into executing attacker-controlled JavaScript in the context of another domain, resulting in a Universal Cross-Site Scripting vulnerability. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected. Further details are being temporarily withheld to allow users an opportunity to update.*. This vulnerability affects Firefox < 88.0.1 and Firefox for Android < 88.1.3.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:-:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*"
] | null | 6.1
| null | 4.3
| null |
|
GHSA-c32x-wpfc-fr3r
|
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
|
[] | null | 8.8
| null | null | null |
|
CVE-2022-38755
|
Filr Remote unauthenticated user enumeration for versions prior to 4.3.1.1
|
A vulnerability has been identified in Micro Focus Filr in versions prior to 4.3.1.1. The vulnerability could be exploited to allow a remote unauthenticated attacker to enumerate valid users of the system. Remote unauthenticated user enumeration. This issue affects: Micro Focus Filr versions prior to 4.3.1.1.
|
[
"cpe:2.3:a:microfocus:filr:*:*:*:*:*:*:*:*"
] | null | 5.3
| null | null | null |
GHSA-ppcc-8c3j-x247
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in clicklabs® Medienagentur Download Button for Elementor allows Stored XSS.This issue affects Download Button for Elementor: from n/a through 1.2.1.
|
[] | null | 6.5
| null | null | null |
|
CVE-2025-11945
|
toeverything AFFiNE Avatar Upload Image Endpoint cross site scripting
|
A vulnerability was identified in toeverything AFFiNE up to 0.24.1. This vulnerability affects unknown code of the component Avatar Upload Image Endpoint. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1
| 3.5
| 3.5
| 4
| null |
CVE-2009-3625
|
Directory traversal vulnerability in www/index.php in Sahana 0.6.2.2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the mod parameter.
|
[
"cpe:2.3:a:sahana:sahana:0.6.2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2024-53865
|
Python package "zhmcclient" has passwords in clear text in its HMC and API logs
|
zhmcclient is a pure Python client library for the IBM Z HMC Web Services API. In affected versions the Python package "zhmcclient" writes password-like properties in clear text into its HMC and API logs in the following cases: 1. The 'boot-ftp-password' and 'ssc-master-pw' properties when creating or updating a partition in DPM mode, in the zhmcclient API and HMC logs. 2. The 'ssc-master-pw' and 'zaware-master-pw' properties when updating an LPAR in classic mode, in the zhmcclient API and HMC logs. 3. The 'ssc-master-pw' and 'zaware-master-pw' properties when creating or updating an image activation profile in classic mode, in the zhmcclient API and HMC logs. 4. The 'password' property when creating or updating an HMC user, in the zhmcclient API log. 5. The 'bind-password' property when creating or updating an LDAP server definition, in the zhmcclient API and HMC logs. This issue affects only users of the zhmcclient package that have enabled the Python loggers named "zhmcclient.api" (for the API log) or "zhmcclient.hmc" (for the HMC log) and that use the functions listed above. This issue has been fixed in zhmcclient version 1.18.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] | null | 8.3
| null | null | null |
GHSA-57j9-gjq8-q2vw
|
PHP remote file inclusion vulnerability in index.php in Mp3 ToolBox 1.0 beta 5 allows remote attackers to execute arbitrary PHP code via a URL in the skin_file parameter.
|
[] | null | null | null | null | null |
|
RHSA-2025:1211
|
Red Hat Security Advisory: tbb security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 6.1
| null | null | null |
CVE-2017-18125
|
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835, SD 845, SD 850, when secure camera is activated it stores captured data in protected buffers. The TEE application which uses secure camera expects those buffers to contain data captured during the current camera session. It is possible though for HLOS to put aside and reuse one or more of the protected buffers with previously captured data during next camera session. Such data reuse must be prevented as the TEE applications expects to receive valid data captured during the current session only.
|
[
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2025-21184
|
Windows Core Messaging Elevation of Privileges Vulnerability
|
Windows Core Messaging Elevation of Privileges Vulnerability
|
[] | null | 7
| null | null | null |
GHSA-6m4c-8qj7-8252
|
SQL injection vulnerability in search.results.php in HiveMail 1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the fields[] parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-30521
|
The LAN-side Web-Configuration Interface has Stack-based Buffer Overflow vulnerability in the D-Link Wi-Fi router firmware DIR-890L DIR890LA1_FW107b09.bin and previous versions. The function created at 0x17958 of /htdocs/cgibin will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by users easily. The attackers can exploit the vulnerability to carry out arbitrary code by means of sending a specially constructed payload to port 49152.
|
[
"cpe:2.3:o:dlink:dir-890l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-890l:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
GHSA-w7jw-whgf-5mgf
|
Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4 build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users to gain privileges via a library path option in a configuration file.
|
[] | null | null | null | null | null |
|
CVE-2019-3410
|
All versions up to UKBB_WF820+_1.0.0B06 of ZTE WF820+ LTE Outdoor CPE product are impacted by Cross-Site Request Forgery vulnerability,which stems from the fact that WEB applications do not adequately verify whether requests come from trusted users. An attacker can exploit this vulnerability to send unexpected requests to the server through the affected client.
|
[
"cpe:2.3:o:zte:wf820\\+_lte_outdoor_cpe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:wf820\\+_lte_outdoor_cpe:-:*:*:*:*:*:*:*"
] | null | null | 4.6
| null | null |
|
GHSA-9cc8-cjgw-8qwx
|
Dell PowerProtect Data Domain BoostFS for Linux Ubuntu systems of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.
|
[] | null | 7.5
| null | null | null |
|
CVE-2024-52362
|
IBM App Connect Enterprise Certified Container denial of service
|
IBM App Connect Enterprise Certified Container 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, and 12.8 could allow an authenticated user to cause a denial of service in the App Connect flow due to improper validation of server-side input.
|
[
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.8:*:*:*:*:*:*:*"
] | null | 4.3
| null | null | null |
CVE-2021-39672
|
In fastboot, there is a possible secure boot bypass due to a configuration error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android SoC Android ID: A-202018701
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | 7.2
| null |
|
GHSA-qmh3-9c6m-3722
|
Foxit PDF Reader Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21292.
|
[] | null | null | 3.3
| null | null |
|
CVE-2025-46264
|
WordPress PowerPress Podcasting <= 11.12.5 - Arbitrary File Upload Vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in Angelo Mandato PowerPress Podcasting allows Upload a Web Shell to a Web Server. This issue affects PowerPress Podcasting: from n/a through 11.12.5.
|
[] | null | 9.9
| null | null | null |
CVE-2025-27434
|
Cross-Site Scripting (XSS) vulnerability in SAP Commerce (Swagger UI)
|
Due to insufficient input validation, SAP Commerce (Swagger UI) allows an unauthenticated attacker to inject the malicious code from remote sources, which can be leveraged by an attacker to execute a cross-site scripting (XSS) attack. This could lead to a high impact on the confidentiality, integrity, and availability of data in SAP Commerce.
|
[] | null | 8.8
| null | null | null |
CVE-2025-32946
|
PeerTube Arbitrary Playlist Creation via ActivityPub Protocol
|
This vulnerability allows any attacker to add playlists to a different user’s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user.
|
[] | null | 5.3
| null | null |
https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1
|
GHSA-8hm9-q4jc-h7f2
|
IBM Content Navigator & CMIS 2.0.3, 3.0.0, and 3.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 129577.
|
[] | null | null | 5.4
| null | null |
|
GHSA-rmqp-6x5x-g7fg
|
In the Linux kernel, the following vulnerability has been resolved:can: j1939: fix Use-after-Free, hold skb ref while in useThis patch fixes a Use-after-Free found by the syzbot.The problem is that a skb is taken from the per-session skb queue,
without incrementing the ref count. This leads to a Use-after-Free if
the skb is taken concurrently from the session queue due to a CTS.
|
[] | null | 8.4
| null | null | null |
|
CVE-2017-5830
|
Revive Adserver before 4.0.1 allows remote attackers to execute arbitrary code via serialized data in the cookies related to the delivery scripts.
|
[
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*"
] | null | null | 9.8
| 7.5
| null |
|
CVE-2024-38312
|
When browsing private tabs, some data related to location history or webpage thumbnails could be persisted incorrectly within the sandboxed app bundle after app termination This vulnerability affects Firefox for iOS < 127.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*"
] | null | 6.5
| null | null | null |
|
CVE-2005-4309
|
SQL injection vulnerability in ezUpload Pro 2.2 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified search module parameters.
|
[
"cpe:2.3:a:scriptscenter:ezupload_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:scriptscenter:ezupload_pro:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:scriptscenter:ezupload_pro:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:scriptscenter:ezupload_pro:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:scriptscenter:ezupload_pro:2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2023-20679
|
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588453.
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*"
] | null | 4.4
| null | null | null |
|
CVE-2012-0951
|
A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry.
|
[
"cpe:2.3:a:nvidia:display_driver:*:*:*:*:*:linux:*:*"
] | null | 7.8
| null | 4.6
| null |
|
CVE-2018-10504
|
The WebDorado "Form Maker by WD" plugin before 1.12.24 for WordPress allows CSV injection.
|
[
"cpe:2.3:a:web-dorado:form_maker:*:*:*:*:*:wordpress:*:*"
] | null | null | 7.8
| 6.8
| null |
|
CVE-2023-44283
|
In Dell SupportAssist for Home PCs (between v3.0 and v3.14.1) and SupportAssist for Business PCs (between v3.0 and v3.4.1), a security concern has been identified, impacting locally authenticated users on their respective PCs. This issue may potentially enable privilege escalation and the execution of arbitrary code, in the Windows system context, and confined to that specific local PC.
|
[
"cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:supportassist_for_business_pcs:*:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
GHSA-8vwm-pgcm-457g
|
Buffer overflow in Paul Rombouts pdnsd before 1.2.4 has unknown impact and attack vectors. NOTE: this issue might be related to the OUSPG PROTOS DNS test suite.
|
[] | null | null | null | null | null |
|
CVE-2013-5375
|
Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, 6.0.0 before SR15, and 5.0.0 before SR16 FP4 allows remote attackers to access restricted classes via unspecified vectors related to XML and XSL.
|
[
"cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2023-21775
|
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
|
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 8.3
| null | null | null |
CVE-2025-11565
|
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST /REST/UpdateJRE request payload.
|
[] | 7.3
| null | null | null | null |
|
RHSA-2023:4494
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 9.8
| null | null | null |
GHSA-p59g-6cqr-m73w
|
Malicious Package in bmap
|
Version 1.0.3 of `bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationIf version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
|
[] | null | 9.8
| null | null | null |
GHSA-wc8f-g43g-pgxv
|
The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
|
[] | null | null | null | null | null |
|
CVE-2016-6744
|
An elevation of privilege vulnerability in the Synaptics touchscreen driver in Android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Android ID: A-30970485.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 9.3
| null |
|
GHSA-m3hh-f9gh-74c2
|
quiche connection ID retirement can trigger an infinite loop
|
ImpactCloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames.QUIC connections possess a set of connection identifiers (IDs); see [Section 5.1 of RFC 9000](https://datatracker.ietf.org/doc/html/rfc9000#section-5.1). Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Each Connection ID has a sequence number to ensure synchronization between peersAn unauthenticated remote attacker can exploit this vulnerability by first completing a handshake and then sending a specially-crafted set of frames that trigger a connection ID retirement in the victim. When the victim attempts to send a packet containing RETIRE_CONNECTION_ID frames, [Section 19.16 of RFC 9000](https://datatracker.ietf.org/doc/html/rfc9000#section-19.16) requires that the sequence number of the retired connection ID must not be the same as the sequence number of the connection ID used by the packet. In other words, a packet cannot contain a frame that retires itself. In scenarios such as path migration, it is possible for there to be multiple active paths with different active connection IDs that could be used to retire each other. The exploit triggered an unintentional behaviour of a quiche design feature that supports retirement across paths while maintaining full connection ID synchronization, leading to an infinite loop.Patchesquiche 0.24.5 is the earliest version containing the fix for the issue
|
[] | 8.7
| null | null | null | null |
GHSA-7m2r-r8f2-p7vc
|
Mozilla Firefox 2.0 before 2.0.0.8 allows remote attackers to obtain sensitive system information by using the addMicrosummaryGenerator sidebar method to access file: URIs.
|
[] | null | null | null | null | null |
|
RHSA-2018:0110
|
Red Hat Security Advisory: libvirt security update
|
An update for libvirt is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | null | null | null |
GHSA-jxwh-w46f-545j
|
Windows Hyper-V Elevation of Privilege Vulnerability
|
[] | null | 7
| null | null | null |
|
GHSA-h8j4-8q54-qmm9
|
An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.6, visionOS 2.3, iPadOS 17.7.7, watchOS 11.3, macOS Ventura 13.7.6, iOS 18.3 and iPadOS 18.3, tvOS 18.3. An app may be able to leak sensitive kernel state.
|
[] | null | 5.5
| null | null | null |
|
GHSA-66g2-r73r-39w9
|
A vulnerability, which was classified as critical, was found in pmTicket Project-Management-Software up to 2ef379da2075f4761a2c9029cf91d073474e7486. This affects the function getUserLanguage of the file classes/class.database.php. The manipulation of the argument user_id leads to sql injection. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.5
| 7.3
| null | null | null |
|
GHSA-xv5r-44m2-6q3g
|
An Cross site scripting vulnerability in the EDR XConsole before this release allowed an attacker to potentially leverage an XSS/HTML-Injection using command line variables. A malicious threat actor could execute commands on the victim's browser for sending carefully crafted malicious links to the EDR XConsole end user.
|
[] | null | 4.1
| null | null | null |
|
GHSA-gx96-485q-hr9j
|
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the startip parameter in the SetPptpServerCfg function.
|
[] | null | 9.8
| null | null | null |
|
GHSA-fp9m-phr9-853c
|
An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information.
|
[] | 9.3
| null | null | null | null |
|
CVE-2023-20785
|
In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628524; Issue ID: ALPS07628524.
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 6.4
| null | null | null |
|
GHSA-6r8v-ww3c-grvh
|
Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server.
|
[] | null | 9.1
| null | null | null |
|
CVE-2022-0824
|
Improper Access Control to Remote Code Execution in webmin/webmin
|
Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.
|
[
"cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*"
] | null | null | 8.3
| null | null |
CVE-2024-34226
|
SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in SourceCodester Visitor Management System 1.0 allow attackers to execute arbitrary SQL commands via the id parameters.
|
[
"cpe:2.3:a:oretnom23:visitor_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.4
| null | null | null |
|
GHSA-2jcq-2g28-r229
|
Cross-site scripting (XSS) vulnerability in Dragonfly CMS 9.0.6.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the search field.
|
[] | null | null | null | null | null |
|
CVE-2020-7623
|
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.
|
[
"cpe:2.3:a:jscover_project:jscover:*:*:*:*:*:node.js:*:*"
] | null | 9.8
| null | 7.5
| null |
|
CVE-2024-41481
|
Typora before 1.9.3 Markdown editor has a cross-site scripting (XSS) vulnerability via the Mermaid component.
|
[
"cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | null | null |
|
GHSA-775m-xqx8-53cp
|
Escalation of privilege vulnerability in the Palo Alto Networks Twistlock console 19.07.358 and earlier allows a Twistlock user with Operator capabilities to escalate privileges to that of another user. Active interaction with an affected component is required for the payload to execute on the victim.
|
[] | null | null | null | null | null |
|
GHSA-63g9-mfrc-j793
|
Windows Installer Elevation of Privilege Vulnerability.
|
[] | null | 7
| null | null | null |
|
CVE-2010-3466
|
Cross-site scripting (XSS) vulnerability in index.php in the hosted_signup module in NetArt Media iBoutique.MALL 1.2 allows remote attackers to inject arbitrary web script or HTML via the tmpl parameter. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:netartmedia:iboutique.mall:1.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-5pqf-rvm7-3wgw
|
collective.contact.widget is vulnerable to cross-site scripting
|
collective.contact.widget is an add-on is part of the collective.contact.* suite. A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 5da36305ca7ed433782be8901c47387406fcda12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216496.
|
[] | 5.3
| 6.1
| null | null | null |
GHSA-4297-fx5c-x987
|
Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 8.8
| null | null | null |
|
RHSA-2022:0669
|
Red Hat Security Advisory: python-pillow security update
|
python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8
| null | null | null |
CVE-2019-7213
|
SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories.
|
[
"cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*"
] | null | null | 6.5
| 5.5
| null |
|
CVE-2018-13649
|
The mintToken function of a smart contract implementation for Deploy, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:tokitdeployer_project:tokitdeployer:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2023-48746
|
WordPress Community by PeepSo Plugin <= 6.2.6.0 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PeepSo Community by PeepSo – Social Network, Membership, Registration, User Profiles allows Reflected XSS.This issue affects Community by PeepSo – Social Network, Membership, Registration, User Profiles: from n/a through 6.2.6.0.
|
[
"cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*"
] | null | 7.1
| null | null | null |
GHSA-g2jm-8mm3-8fg4
|
An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.
|
[] | null | null | 6.8
| null | null |
|
CVE-2023-52612
|
crypto: scomp - fix req->dst buffer overflow
|
In the Linux kernel, the following vulnerability has been resolved:
crypto: scomp - fix req->dst buffer overflow
The req->dst buffer size should be checked before copying from the
scomp_scratch->dst to avoid req->dst buffer overflow problem.
|
[] | null | 7.8
| null | null | null |
CVE-2024-7800
|
SourceCodester Simple Online Bidding System ajax.php sql injection
|
A vulnerability classified as critical has been found in SourceCodester Simple Online Bidding System 1.0. This affects an unknown part of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=delete_product. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:sourcecodester:simple_online_bidding_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:simple_online_bidding_system:1.0:*:*:*:*:*:*:*"
] | 5.3
| 6.3
| 6.3
| 6.5
| null |
CVE-2023-39329
|
Openjpeg: resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c
|
A flaw was found in OpenJPEG. A resource exhaustion can occur in the opj_t1_decode_cblks function in tcd.c through a crafted image file, causing a denial of service.
|
[
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9"
] | null | 6.5
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.