id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-p25g-qrm9-c6cx
|
Meeting Maker uses weak encryption (a polyalphabetic substitution cipher) for passwords, which allows remote attackers to sniff and decrypt passwords for Meeting Maker accounts.
|
[] | null | null | null | null | null |
|
CVE-2025-30967
|
WordPress WPJobBoard plugin < 5.11.1 - CSRF to Remote Code Execution (RCE) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in NotFound WPJobBoard allows Upload a Web Shell to a Web Server. This issue affects WPJobBoard: from n/a through n/a.
|
[] | null | 9.6
| null | null | null |
CVE-2019-7096
|
Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
CVE-2021-32775
|
Any user can see any fields (including mailbox password) with GroupBy Dashlet
|
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, a non admin user can get access to many class/field values through GroupBy Dashlet error message. This issue is fixed in versions 2.7.4 and 3.0.0.
|
[
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:beta2:*:*:*:*:*:*"
] | null | 7.7
| null | null | null |
CVE-2021-41837
|
An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.
|
[
"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*"
] | null | 8.2
| null | 7.2
| null |
|
GHSA-h95h-vwpr-fwvm
|
Unspecified vulnerability in mso.dll in Microsoft PowerPoint 2003 allows user-assisted attackers to execute arbitrary code via a crafted PowerPoint file. NOTE: due to the lack of available details as of 20060717, it is unclear how this is related to CVE-2006-3656, CVE-2006-3660, and CVE-2006-3590, although it is possible that they are all different.
|
[] | null | null | null | null | null |
|
GHSA-hhm4-h29c-6mcv
|
The Windows GDI+ component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly discloses kernel memory addresses, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8681, and CVE-2017-8687.
|
[] | null | null | 5.5
| null | null |
|
GHSA-qxjj-wxg4-3fhm
|
Mikrotik RouterOs before 6.47 (stable tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/route process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
|
[] | null | 6.5
| null | null | null |
|
CVE-2018-10136
|
iScripts UberforX 2.2 has Stored XSS in the "manage_settings" section of the Admin Panel via a value field to the /cms?section=manage_settings&action=edit URI.
|
[
"cpe:2.3:a:iscripts:uberforx:2.2:*:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
GHSA-hjjv-mh56-25f6
|
Buffer overflow in the whois client, which is not setuid but is sometimes called from within CGI programs, may allow remote attackers to execute arbitrary code via a long command line option.
|
[] | null | null | null | null | null |
|
CVE-2025-36525
|
BIG-IP APM PingAccess Virtual Server Vulnerability
|
When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[] | 8.7
| 7.5
| null | null | null |
GHSA-x659-43vv-626r
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9591.
|
[] | null | null | null | null | null |
|
CVE-2023-0661
|
Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.
|
[
"cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | null | null |
|
CVE-2004-1431
|
FormMail.php 5.0, and possibly other versions, allows remote attackers to read arbitrary files via a full pathname in the ar_file (auto-reply) parameter.
|
[
"cpe:2.3:a:joe_lumbroso:jacks_formmail.php:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joe_lumbroso:jacks_formmail.php:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-8fxv-494j-gqxv
|
A vulnerability was found in baseweb JSite 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /a/sys/user/save. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1
| 3.5
| null | null | null |
|
GHSA-843q-mqjv-hhh4
|
Cross Site Scripting (XSS) vulnerability in Netgate pfSense v.2.7.0 allows a remote attacker to gain privileges via a crafted URL to the getserviceproviders.php page.
|
[] | null | 5.4
| null | null | null |
|
RHSA-2024:0801
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 for OpenShift image enhancement update
|
guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 6.5
| null | null | null |
CVE-2021-24820
|
Cost Calculator <= 1.6 - Authenticated Local File Inclusion
|
The Cost Calculator WordPress plugin through 1.6 allows authenticated users (Contributor+ in versions < 1.5, and Admin+ in versions <= 1.6) to perform path traversal and local PHP file inclusion on Windows Web Servers via the Cost Calculator post's Layout
|
[
"cpe:2.3:a:bold-themes:cost_calculator:*:*:*:*:*:wordpress:*:*"
] | null | 6.5
| null | 4
| null |
GHSA-7cxg-92qx-7whp
|
Multiple PHP remote file inclusion vulnerabilities in template.php in Phpmymanga 0.8.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) actionsPage or (2) formPage parameter.
|
[] | null | null | null | null | null |
|
GHSA-2f8j-m7px-v4p9
|
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, due to a race condition, a Use After Free condition can occur in the WLAN driver.
|
[] | null | null | 5.9
| null | null |
|
CVE-2007-2417
|
Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491.
|
[
"cpe:2.3:h:rsa:securid:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:10.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:10.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:progress:9.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:ace_server:5.2:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-gvxv-5fp2-358q
|
Incorrect Resource Transfer Between Spheres in eclipse-wtp
|
In all versions prior to version 3.9.6 for eclipse-wtp, all versions prior to version 9.4.4 for eclipse-cdt, and all versions prior to version 3.0.1 for eclipse-groovy, Spotless was resolving dependencies over an insecure channel (http). If the build occurred over an insecure connection, a malicious user could have perform a Man-in-the-Middle attack during the build and alter the build artifacts that were produced. In case that any of these artifacts were compromised, any developers using these could be altered. **Note:** In order to validate that this artifact was not compromised, the maintainer would need to confirm that none of the artifacts published to the registry were not altered with. Until this happens, we can not guarantee that this artifact was not compromised even though the probability that this happened is low.
|
[] | null | null | 5.9
| null | null |
GHSA-pj39-g3x7-52h4
|
Qolsys IQ Panel (aka QOL) before 1.5.1 does not verify the digital signatures of software updates, which allows man-in-the-middle attackers to bypass intended access restrictions via a modified update.
|
[] | null | null | null | null | null |
|
GHSA-j2wr-3798-89rx
|
Geary before 0.6.3 does not present the user with a warning when a TLS certificate error is detected, which makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-93px-8x98-j7p2
|
A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.
|
[] | null | 8.8
| null | null | null |
|
CVE-2024-4485
|
The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce <= 5.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘button_custom_attributes’ parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4
| null | null | null |
RHSA-2019:3575
|
Red Hat Security Advisory: elfutils security, bug fix, and enhancement update
|
elfutils: buffer over-read in the ebl_object_note function in eblobjnote.c in libebl elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 3.3
| null | null |
CVE-2025-26412
|
Undocumented Root Shell Access in SIMCom SIM7600G Modem
|
The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands.
|
[] | null | 6.8
| null | null | null |
GHSA-vf8f-23mh-9x3q
|
The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x before 2.5 MR6 on Windows, and 2.x before 2.5 MR6 and 3.x before 3.0 MR8 on Mac OS X and Linux, does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug ID CSCtw47523.
|
[] | null | null | null | null | null |
|
GHSA-47rf-v46m-rchf
|
Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the admin panel.
|
[] | null | 6.1
| null | null | null |
|
RHSA-2020:3832
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8
| 6.1
| null | null |
CVE-2024-27842
|
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
|
GHSA-pw4q-58pr-v79g
|
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.
|
[] | null | null | 8.8
| null | null |
|
CVE-2017-7089
|
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
CVE-2016-4748
|
Perl in Apple OS X before 10.12 allows local users to bypass the taint-mode protection mechanism via a crafted environment variable.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.3
| 4.6
| null |
|
CVE-2020-14982
|
A Blind SQL Injection vulnerability in Kronos WebTA 3.8.x and later before 4.0 (affecting the com.threeis.webta.H352premPayRequest servlet's SortBy parameter) allows an attacker with the Employee, Supervisor, or Timekeeper role to read sensitive data from the database.
|
[
"cpe:2.3:a:kronos:web_time_and_attendance:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | 4
| null |
|
GHSA-hq8v-m2gf-pmhf
|
DataWizard Technologies FtpXQ FTP Server 3.0 allows remote authenticated users to cause a denial of service (crash) via a long ABOR command.
|
[] | null | null | null | null | null |
|
GHSA-f775-4rjm-m64p
|
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite and Server before 6.22.0 rev16, 6.22.1 before rev19, 7.0.1 before rev7, 7.0.2 before rev11, and 7.2.0 before rev8 allows remote authenticated users to inject arbitrary web script or HTML via a delivery=view action, aka Bug ID 26373, a different vulnerability than CVE-2013-3106.
|
[] | null | null | null | null | null |
|
GHSA-r292-8vw9-293g
|
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have access to the router control panel with administrator privileges.
|
[] | null | 9.8
| null | null | null |
|
cisco-sa-stealth-rce-BDwXFK9C
|
Cisco Secure Network Analytics Remote Code Execution Vulnerability
|
A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device.
This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 4.9
| null | null | null |
CVE-2025-25891
|
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
|
[] | null | 5.7
| null | null | null |
|
CVE-2023-4926
|
The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulk_delete_products function. This makes it possible for unauthenticated attackers to delete products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*"
] | null | 5.4
| null | null | null |
|
GHSA-8c9h-4q7g-fp7h
|
Out-of-bounds Read in iText
|
iText v7.1.17 was discovered to contain an out-of-bounds exception via the component ARCFOUREncryption.encryptARCFOUR, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. NOTE: Vendor does not view this as a vulnerability and has not found it to be exploitable.
|
[] | null | 6.5
| null | null | null |
CVE-2020-24914
|
A PHP object injection bug in profile.php in qcubed (all versions including 3.1.1) unserializes the untrusted data of the POST-variable "strProfileData" and allows an unauthenticated attacker to execute code via a crafted POST request.
|
[
"cpe:2.3:a:qcubed:qcubed:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
GHSA-44vh-5qrj-pfch
|
Improper buffer restrictions for some Intel(R) NUC 9 Extreme Laptop Kit drivers before version 2.2.0.22 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 7.8
| null | null | null |
|
GHSA-37wv-xpm8-wf7h
|
The TI WooCommerce Wishlist WordPress plugin through 2.8.2 is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 5.9
| null | null | null |
|
GHSA-vj9h-96jc-p8c6
|
The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
|
[] | null | null | 8.8
| null | null |
|
GHSA-ggfp-x753-xxvw
|
dedecms <=V5.7.102 is vulnerable to SQL Injection. In sys_ sql_ n query.php there are no restrictions on the sql query.
|
[] | null | 9.8
| null | null | null |
|
GHSA-jwww-cgxp-76hp
|
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_grp, at 0x9d01758c, the value for the `grp` key is copied using `strcpy` to the buffer at `$sp+0x1b4`.This buffer is 8 bytes large, sending anything longer will cause a buffer overflow.
|
[] | null | 9.9
| null | null | null |
|
CVE-2020-18723
|
Stored cross-site scripting (XSS) in file attachment field in MDaemon webmail 19.5.5 allows an attacker to execute code on the email recipient side while forwarding an email to perform potentially malicious activities.
|
[
"cpe:2.3:a:altn:mdaemon_webmail:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | 3.5
| null |
|
GHSA-jc82-2cpg-hfg5
|
The PSFTPd 10.0.4 Build 729 server stores its configuration inside PSFTPd.dat. This file is a Microsoft Access Database and can be extracted. The application sets the encrypt flag with the password "ITsILLEGAL"; however, this password is not required to extract the data. Cleartext is used for a user password.
|
[] | null | null | 5.3
| null | null |
|
CVE-2008-6757
|
Cross-site scripting (XSS) vulnerability in manuals_search.php in ViArt Shop (aka Shopping Cart) 3.5 allows remote attackers to inject arbitrary web script or HTML via the manuals_search parameter.
|
[
"cpe:2.3:a:viart:viart_shop:3.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2018-11174
|
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 32 of 46).
|
[
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.5
| null |
|
GHSA-937f-qh3w-6g87
|
OctoPrint vulnerable to Insufficient Session Expiration.
|
If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists. This issue is fixed in version 1.8.3.
|
[] | 5.3
| 4.4
| null | null | null |
CVE-2018-4173
|
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. The issue involves the "Status Bar" component. It allows invisible microphone access via a crafted app.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5
| 4.3
| null |
|
CVE-2020-20392
|
SQL Injection vulnerability in imcat v5.2 via the fm[auser] parameters in coms/add_coms.php.
|
[
"cpe:2.3:a:txjia:imcat:5.2:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
GHSA-4p62-4q7w-qmcg
|
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
|
[] | null | 7.5
| null | null | null |
|
CVE-2009-1765
|
Multiple directory traversal vulnerabilities in pluck 4.6.2, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the langpref parameter to (1) data/modules/contactform/module_info.php, (2) data/modules/blog/module_info.php, and (3) data/modules/albums/module_info.php, different vectors than CVE-2008-3194.
|
[
"cpe:2.3:a:pluck-cms:pluck:4.6.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2007-1049
|
Cross-site scripting (XSS) vulnerability in the wp_explain_nonce function in the nonce AYS functionality (wp-includes/functions.php) for WordPress 2.0 before 2.0.9 and 2.1 before 2.1.1 allows remote attackers to inject arbitrary web script or HTML via the file parameter to wp-admin/templates.php, and possibly other vectors involving the action variable.
|
[
"cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2024-8773
|
Protocol Downgrade in SIMPLE.ERP
|
SIMPLE.ERP client is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification.
This issue affect SIMPLE.ERP from 6.20 to 6.30. Only the 6.30 version received a patch 6.30@a03.9, which make it possible for an administrator to enforce encrypted communication. Versions 6.20 and 6.25 remain unpatched.
|
[] | 8.3
| null | null | null | null |
GHSA-2mfh-qqrx-9f28
|
Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
|
[] | null | null | null | null | null |
|
GHSA-3gwq-43rx-mfrg
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Youtube Vimeo Video Player and Slider allows Reflected XSS. This issue affects Youtube Vimeo Video Player and Slider: from n/a through 3.8.
|
[] | null | 7.1
| null | null | null |
|
CVE-2012-3938
|
Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code via a crafted WRF file, aka Bug ID CSCtz73583.
|
[
"cpe:2.3:a:cisco:webex_recording_format_player:27.11.26:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.21.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.25.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.32.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:28.0.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-wrg4-57jc-pph7
|
A memory corruption bug in WebAssembly could lead to out of bounds read and write through V8 in WebAssembly in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
|
[] | null | null | 8.8
| null | null |
|
CVE-2023-30267
|
CLTPHP <=6.0 is vulnerable to Cross Site Scripting (XSS) via application/home/controller/Changyan.php.
|
[
"cpe:2.3:a:cltphp:cltphp:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | null | null |
|
CVE-2001-0458
|
Multiple buffer overflows in ePerl before 2.2.14-0.7 allow local and remote attackers to execute arbitrary commands.
|
[
"cpe:2.3:a:ralf_s._engelschall:eperl:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ralf_s._engelschall:eperl:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2022-35879
|
Four format string injection vulnerabilities exist in the UPnP logging functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted UPnP negotiation can lead to memory corruption, information disclosure, and denial of service. An attacker can host a malicious UPnP service to trigger these vulnerabilities.This vulnerability arises from format string injection via `controlURL` XML tag, as used within the `DoUpdateUPnPbyService` action handler.
|
[
"cpe:2.3:o:goabode:iota_all-in-one_security_kit_firmware:6.9x:*:*:*:*:*:*:*",
"cpe:2.3:o:goabode:iota_all-in-one_security_kit_firmware:6.9z:*:*:*:*:*:*:*"
] | null | null | 7.1
| null | null |
|
CVE-2001-1377
|
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
|
[
"cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:radius:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:radius:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:radius:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:radius:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:icradius:icradius:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:icradius:icradius:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:icradius:icradius:0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:icradius:icradius:0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:icradius:icradius:0.17b:*:*:*:*:*:*:*",
"cpe:2.3:a:icradius:icradius:0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:icradius:icradius:0.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:livingston:radius:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:livingston:radius:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:livingston:radius:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lucent:radius:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lucent:radius:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lucent:radius:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:miquel_van_smoorenburg_cistron:radius:1.6_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openradius:openradius:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openradius:openradius:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openradius:openradius:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openradius:openradius:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openradius:openradius:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:radiusclient:radiusclient:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xtradius:xtradius:1.1_pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:xtradius:xtradius:1.1_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:yard_radius:yard_radius:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:yard_radius:yard_radius:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:yard_radius:yard_radius:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:yard_radius:yard_radius:1.0_pre13:*:*:*:*:*:*:*",
"cpe:2.3:a:yard_radius:yard_radius:1.0_pre14:*:*:*:*:*:*:*",
"cpe:2.3:a:yard_radius:yard_radius:1.0_pre15:*:*:*:*:*:*:*",
"cpe:2.3:a:yard_radius_project:yard_radius:1.0.16:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
ICSA-21-021-02
|
Delta Electronics TPEditor
|
An untrusted pointer dereference has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.CVE-2020-27288 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to two out-of-bounds write instances in the way it processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.CVE-2020-27284 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8
| null | null |
GHSA-g9pm-vppm-577q
|
A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V5.6.0), RUGGEDCOM ROS RMC8388 devices (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0). The third-party component in its TFTP functionality fails to check for null terminations in file names. If an attacker were to exploit this, it could result in data corruption, and possibly a hard-fault of the application.
|
[] | null | 7.5
| null | null | null |
|
GHSA-v5c3-jphg-rffx
|
Rejected reason: This is unused.
|
[] | null | null | null | null | null |
|
CVE-2025-39550
|
WordPress FluentCommunity <= 1.2.15 - PHP Object Injection Vulnerability
|
Deserialization of Untrusted Data vulnerability in Shahjahan Jewel FluentCommunity allows Object Injection. This issue affects FluentCommunity: from n/a through 1.2.15.
|
[] | null | 9.8
| null | null | null |
CVE-2020-25157
|
The R-SeeNet webpage (1.5.1 through 2.4.10) suffers from SQL injection, which allows a remote attacker to invoke queries on the database and retrieve sensitive information.
|
[
"cpe:2.3:a:advantech:r-seenet:*:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
GHSA-gr3w-p7mm-8pcq
|
In the Linux kernel, the following vulnerability has been resolved:gpio: pca953x: fix pca953x_irq_bus_sync_unlock raceEnsure that `i2c_lock' is held when setting interrupt latch and mask in
pca953x_irq_bus_sync_unlock() in order to avoid races.The other (non-probe) call site pca953x_gpio_set_multiple() ensures the
lock is held before calling pca953x_write_regs().The problem occurred when a request raced against irq_bus_sync_unlock()
approximately once per thousand reboots on an i.MX8MP based system.Normal case0-0022: write register AI|3a {03,02,00,00,01} Input latch P0
0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
0-0022: write register AI|08 {ff,00,00,00,00} Output P3
0-0022: write register AI|12 {fc,00,00,00,00} Config P3Race case0-0022: write register AI|08 {ff,00,00,00,00} Output P3
0-0022: write register AI|08 {03,02,00,00,01} *** Wrong register ***
0-0022: write register AI|12 {fc,00,00,00,00} Config P3
0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
|
[] | null | 4.7
| null | null | null |
|
CVE-2007-5842
|
Multiple PHP remote file inclusion vulnerabilities in Vortex Portal 1.0.42 allow remote attackers to execute arbitrary PHP code via a URL in the cfgProgDir parameter to (1) admincp/auth/secure.php or (2) admincp/auth/checklogin.php.
|
[
"cpe:2.3:a:vortex_portal:vortex_portal:1.0.42:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2005-4481
|
Cross-site scripting (XSS) vulnerability in Polopoly 9 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters. NOTE: the vendor has disputed this vulnerability, stating that the "XSS flaw was only part of the custom implementation of the [polopoly] site". As of 20061003, CVE has no further information on this issue, except that the original researcher has a history of testing live sites and assuming that discoveries indicate vulnerabilities in the associated package
|
[
"cpe:2.3:a:polopoly:polopoly:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
GHSA-v2vw-5x7p-xwcr
|
cPanel before 82.0.18 allows self-XSS because JSON string escaping is mishandled (SEC-520).
|
[] | null | null | null | null | null |
|
CVE-2023-36876
|
Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability
|
Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.26664:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
] | null | 7.1
| null | null | null |
GHSA-j37c-fr9j-g7mj
|
Cross-site scripting (XSS) vulnerability in the Activity and Events Viewer for Newtelligence DasBlog allows remote attackers to inject arbitrary web script or HTML via the (1) User Agent or (2) Referrer HTTP headers.
|
[] | null | null | null | null | null |
|
CVE-2008-5681
|
Opera before 9.63 does not block unspecified "scripted URLs" during the feed preview, which allows remote attackers to read existing subscriptions and force subscriptions to arbitrary feed URLs.
|
[
"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-fpv7-hx6r-9vcx
|
Mezzanine Cross Site Scripting (XSS) vulnerability
|
Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the `Description` field of the component `admin/blog/blogpost/add/`. This issue is different than CVE-2018-16632.
|
[] | 5.1
| 6.1
| null | null | null |
GHSA-xmfr-f53v-mxcp
|
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3.0. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Outside In Technology executes to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 5.7
| null | null |
|
CVE-2024-9112
|
FastStone Image Viewer PSD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
FastStone Image Viewer PSD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FastStone Image Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25102.
|
[
"cpe:2.3:a:faststone:image_viewer:7.8:*:*:*:*:*:*:*"
] | null | null | 7.8
| null | null |
CVE-2006-4468
|
Multiple unspecified vulnerabilities in Joomla! before 1.0.11, related to unvalidated input, allow attackers to have an unknown impact via unspecified vectors involving the (1) mosMail, (2) JosIsValidEmail, and (3) josSpoofValue functions; (4) the lack of inclusion of globals.php in administrator/index.php; (5) the Admin User Manager; and (6) the poll module.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2021-0063
|
Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[
"cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:7265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:7265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac1550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ac1550:-:*:*:*:*:*:*:*"
] | null | 6.5
| null | 6.1
| null |
|
CVE-2025-3428
|
3DPrint Lite <=2.1.3.6 - Authenticated (Admin+) SQL Injection via 'coating_text'
|
The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'coating_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 4.9
| null | null | null |
GHSA-9pfh-48x6-ffh3
|
Buffer overflow in AOL Instant Messenger (AIM) 4.2 and later allows remote attackers to execute arbitrary code via a long AddExternalApp request and a TLV type greater than 0x2711.
|
[] | null | null | null | null | null |
|
CVE-2025-54126
|
WebAssembly Micro Runtime's `--addr-pool` option allows all IPv4 addresses when subnet mask is not specified
|
The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. In versions 2.4.0 and below, iwasm uses --addr-pool with an IPv4 address that lacks a subnet mask, allowing the system to accept all IP addresses. This can unintentionally expose the service to all incoming connections and bypass intended access restrictions. Services relying on --addr-pool for restricting access by IP may unintentionally become open to all external connections. This may lead to unauthorized access in production deployments, especially when users assume that specifying an IP without a subnet mask implies a default secure configuration. This is fixed in version 2.4.1.
|
[] | 6.9
| null | null | null | null |
GHSA-f8v8-jqrr-5mhq
|
An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases.
|
[] | null | 7.3
| null | null | null |
|
CVE-2014-9025
|
The default checkout completion rule in the commerce_order module in the Drupal Commerce module 7.x-1.x before 7.x-1.10 for Drupal uses the email address as the username for new accounts created at checkout, which allows remote attackers to obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:alpha1:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:alpha2:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:alpha3:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:alpha4:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:alpha5:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:beta1:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:beta2:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:beta3:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:beta4:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:rc1:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:rc2:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.0:rc3:*:*:*:drupal:*:*",
"cpe:2.3:a:commerceguys:commerce:7.x-1.1:*:*:*:*:drupal:*:*"
] | null | null | null | 5
| null |
|
GHSA-h5fc-v3m2-vpp2
|
Uncontrolled search path element in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 6.7
| null | null | null |
|
GHSA-rq58-69p3-w9px
|
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. Disconnect param is not object. An attacker can send an HTTP request to trigger this vulnerability.
|
[] | null | 6.5
| null | null | null |
|
CVE-2000-1068
|
pollit.cgi in Poll It 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the poll_options parameter.
|
[
"cpe:2.3:a:cgi-world:poll_it:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi-world:poll_it_pro:1.6:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
CVE-2024-33577
|
A vulnerability has been identified in Simcenter Femap (All versions < V2406). The affected applications contain a stack overflow vulnerability while parsing specially strings as argument for one of the application binaries. This could allow an attacker to execute code in the context of the current process.
|
[
"cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*"
] | 7.3
| 7.8
| null | null | null |
|
GHSA-7gmh-9h47-r2x3
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: fix BUG_ON condition in btrfs_cancel_balancePausing and canceling balance can race to interrupt balance lead to BUG_ON
panic in btrfs_cancel_balance. The BUG_ON condition in btrfs_cancel_balance
does not take this race scenario into account.However, the race condition has no other side effects. We can fix that.Reproducing it with panic trace like this:kernel BUG at fs/btrfs/volumes.c:4618!
RIP: 0010:btrfs_cancel_balance+0x5cf/0x6a0
Call Trace:
<TASK>
? do_nanosleep+0x60/0x120
? hrtimer_nanosleep+0xb7/0x1a0
? sched_core_clone_cookie+0x70/0x70
btrfs_ioctl_balance_ctl+0x55/0x70
btrfs_ioctl+0xa46/0xd20
__x64_sys_ioctl+0x7d/0xa0
do_syscall_64+0x38/0x80
entry_SYSCALL_64_after_hwframe+0x63/0xcdRace scenario as follows:mutex_unlock(&fs_info->balance_mutex);.......issue pause and cancel req in another threadret = __btrfs_balance(fs_info);mutex_lock(&fs_info->balance_mutex);
if (ret == -ECANCELED && atomic_read(&fs_info->balance_pause_req)) {
btrfs_info(fs_info, "balance: paused");
btrfs_exclop_balance(fs_info, BTRFS_EXCLOP_BALANCE_PAUSED);
}
|
[] | null | null | null | null | null |
|
CVE-2020-12124
|
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
|
[
"cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
RHSA-2003:161
|
Red Hat Security Advisory: xinetd security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
GHSA-h5r8-fvh2-9qxg
|
In the AAC parser, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-131430997
|
[] | null | 6.5
| null | null | null |
|
GHSA-rvxv-g474-q6qc
|
Multiple SQL injection vulnerabilities in PowerPortal, possibly 1.1 beta through 1.3, allow remote attackers to execute arbitrary SQL commands via the search parameter in (1) index.php and (2) search.php. NOTE: This issue might overlap CVE-2004-0663.2.
|
[] | null | null | null | null | null |
|
CVE-2019-2107
|
In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-130024844.
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8
| 9.3
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.