id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2019-6257
|
A Server Side Request Forgery (SSRF) vulnerability in elFinder before 2.1.46 could allow a malicious user to access the content of internal network resources. This occurs in get_remote_contents() in php/elFinder.class.php.
|
[
"cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*"
] | null | 7.7
| null | 4
| null |
|
GHSA-ffcj-m49c-v7qj
|
The PoDoFo::PdfPainter::ExpandTabs function in PdfPainter.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PDF document.
|
[] | null | null | 5.5
| null | null |
|
GHSA-3rqp-wp5p-mhrc
|
The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF.
|
[] | null | 9.8
| null | null | null |
|
CVE-2023-43746
|
BIG-IP Appliance mode external monitor vulnerability
|
When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*"
] | null | 8.7
| null | null | null |
CVE-2022-37434
|
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
|
[
"cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
CVE-2024-54215
|
WordPress Revy plugin <= 1.18 - Unauthenticated SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Roninwp Revy.This issue affects Revy: from n/a through 1.18.
|
[
"cpe:2.3:a:roninwp:revy:*:*:*:*:*:*:*:*"
] | null | 9.3
| null | null | null |
GHSA-h525-4hh6-xpp5
|
The ultimate-member plugin before 2.0.52 for WordPress has XSS related to UM Roles create and edit operations.
|
[] | null | null | 5.4
| null | null |
|
GHSA-c7j3-xxqh-xjh7
|
SQL injection vulnerability in comments.php in Piwigo before 2.0.3 allows remote attackers to execute arbitrary SQL commands via the items_number parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-30866
|
netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /3g/menu.php.
|
[
"cpe:2.3:h:netentsec:ns-asg:6.3:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
|
CVE-2021-30509
|
Out of bounds write in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page and a crafted Chrome extension.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
CVE-2024-54391
|
WordPress WordPress Filter plugin <= 1.4.1 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Matt Walters WordPress Filter allows Stored XSS.This issue affects WordPress Filter: from n/a through 1.4.1.
|
[] | null | 7.1
| null | null | null |
RHSA-2025:1154
|
Red Hat Security Advisory: Red Hat Integration Camel K 1.10.9 release and security update.
|
bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). graalvm: Unauthorized Read Access graalvm: unauthorized ability to cause a partial denial of service libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict openjdk: Enhance array handling (Oracle CPU 2025-01)
|
[
"cpe:/a:redhat:camel_k:1.10.9"
] | null | 4.8
| null | null | null |
CVE-2025-31177
|
Gnuplot: gnuplot heap-buffer overflow on utf8_copy_one
|
gnuplot is affected by a heap buffer overflow at function utf8_copy_one.
|
[
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8"
] | null | 6.2
| null | null | null |
CVE-2020-23069
|
Path Traversal vulneraility exists in webTareas 2.0 via the extpath parameter in general_serv.php, which could let a malicious user read arbitrary files.
|
[
"cpe:2.3:a:webtareas_project:webtareas:2.0:-:*:*:*:*:*:*"
] | null | 6.5
| null | 4
| null |
|
GHSA-4v76-pc3g-jgg8
|
The Management Software application in GarrettCom Magnum MNS-6K before 4.4.0, and 14.x before 14.4.0, has a hardcoded password for an administrative account, which allows local users to gain privileges via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2012-1032
|
Cross-site scripting (XSS) vulnerability in the Euroling SiteSeeker module 3.x before 3.4.5 for EPiServer allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:siteseeker:euroling_siteseeker:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:episerver:episerver:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-gw2q-qw9j-rgv7
|
LiteLLM Vulnerable to Denial of Service (DoS)
|
A vulnerability in BerriAI/litellm, as of commit 26c03c9, allows unauthenticated users to cause a Denial of Service (DoS) by exploiting the use of ast.literal_eval to parse user input. This function is not safe and is prone to DoS attacks, which can crash the litellm Python server.
|
[] | null | null | 7.5
| null | null |
CVE-2022-1005
|
WP Statistics < 13.2.2 - Reflected Cross-Site Scripting
|
The WP Statistics WordPress plugin before 13.2.2 does not sanitise the REQUEST_URI parameter before outputting it back in the rendered page, leading to Cross-Site Scripting (XSS) in web browsers which do not encode characters
|
[
"cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*"
] | null | 6.1
| null | 4.3
| null |
CVE-2018-18788
|
An issue was discovered in zzcms 8.3. SQL Injection exists in admin/classmanage.php via the tablename parameter. (This needs an admin user login.)
|
[
"cpe:2.3:a:zzcms:zzcms:8.3:*:*:*:*:*:*:*"
] | null | null | 7.2
| 6.5
| null |
|
GHSA-q53p-4g44-275h
|
AKABEi SOFT2 games allow remote attackers to execute arbitrary OS commands via crafted saved data, as demonstrated by Happy Wardrobe.
|
[] | null | null | 7.8
| null | null |
|
CVE-2014-0221
|
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-994c-3jcg-fx29
|
Cross-site scripting (XSS) vulnerability in ownCloud before 6.0.1 allows remote authenticated users to inject arbitrary web script or HTML via the filename of an uploaded file.
|
[] | null | null | 5.4
| null | null |
|
CVE-2011-2214
|
Unspecified vulnerability in the Open Database Connectivity (ODBC) component in 7T Interactive Graphical SCADA System (IGSS) before 9.0.0.11143 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 20222, which triggers memory corruption related to an "invalid structure being used."
|
[
"cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*",
"cpe:2.3:a:7t:igss:8:*:*:*:*:*:*:*",
"cpe:2.3:a:7t:igss:9:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
CVE-2025-55224
|
Windows Hyper-V Remote Code Execution Vulnerability
|
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally.
|
[] | null | 7.8
| null | null | null |
GHSA-h9g7-2mx6-j576
|
The decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg before 2.8.2 does not validate uncompressed runs, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted CCITT FAX data.
|
[] | null | null | null | null | null |
|
CVE-2022-40407
|
A zip slip vulnerability in the file upload function of Chamilo v1.11 allows attackers to execute arbitrary code via a crafted Zip file.
|
[
"cpe:2.3:a:chamilo:chamilo:1.11:*:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
|
GHSA-p9p3-pvmx-pxrh
|
COMFAST CF-XR11 V2.7.2 has a command injection vulnerability in function sub_424CB4. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter iface.
|
[] | null | 9.8
| null | null | null |
|
GHSA-mhww-7vf3-c57h
|
PHP remote file inclusion vulnerability in index.php in phpDVD 1.0.4 allows remote attackers to execute arbitrary PHP code via a URL in the dvd_config_file parameter.
|
[] | null | null | null | null | null |
|
CVE-2016-4359
|
Stack-based buffer overflow in mchan.dll in the agent in HPE LoadRunner 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.02 through patch 2, and 12.50 through patch 3 and Performance Center 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.20 through patch 2, and 12.50 through patch 1 allows remote attackers to execute arbitrary code via a long -server_name value, aka ZDI-CAN-3516.
|
[
"cpe:2.3:a:hp:loadrunner:11.52:p3:*:*:*:*:*:*",
"cpe:2.3:a:hp:loadrunner:12.00:p1:*:*:*:*:*:*",
"cpe:2.3:a:hp:loadrunner:12.01:p3:*:*:*:*:*:*",
"cpe:2.3:a:hp:loadrunner:12.02:p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:loadrunner:12.50:p1:*:*:*:*:*:*",
"cpe:2.3:a:hp:performance_center:11.52:p3:*:*:*:*:*:*",
"cpe:2.3:a:hp:performance_center:12.00:p1:*:*:*:*:*:*",
"cpe:2.3:a:hp:performance_center:12.01:p3:*:*:*:*:*:*",
"cpe:2.3:a:hp:performance_center:12.20:p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:performance_center:12.50:p1:*:*:*:*:*:*"
] | null | null | 9.8
| 7.5
| null |
|
GHSA-gxqf-7m4c-8r95
|
The chk_mem_access function in cpu/nes6502/nes6502.c in libnosefart.a in Nosefart 2.9-mls allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted nsf file.
|
[] | null | null | 5.5
| null | null |
|
GHSA-xr5q-jxhc-42xj
|
OX App Suite 7.10.5 allows Information Exposure because a caching mechanism can caused a Modified By response to show a person's name.
|
[] | null | 4.3
| null | null | null |
|
GHSA-pc7f-4968-m375
|
The Category Posts Widget WordPress plugin before 4.9.17, term-and-category-based-posts-widget WordPress plugin before 4.9.13 does not validate and escape some of its "Category Posts" widget settings before outputting them back in a page/post where the Widget is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 4.8
| null | null | null |
|
CVE-2010-1108
|
Cross-site scripting (XSS) vulnerability in the Control Panel module 5.x through 5.x-1.5 and 6.x through 6.x-1.2 for Drupal allows remote authenticated users, with "administer blocks" privileges, to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:hashmarkconsulting:controlpanel:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:5.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:6.x-1.0-beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:6.x-1.0-beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hashmarkconsulting:controlpanel:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5
| null |
|
CVE-2016-3292
|
Microsoft Internet Explorer 10 and 11 mishandles integrity settings and zone settings, which allows remote attackers to bypass a sandbox protection mechanism via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | 5
| 5.1
| null |
|
GHSA-q5wq-8g35-qxj4
|
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
|
[] | null | 7.5
| null | null | null |
|
CVE-2015-0392
|
Unspecified vulnerability in the Siebel Core - Server BizLogic Script component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Config - Scripting.
|
[
"cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.6
| null |
|
GHSA-2f88-5hg8-9x2x
|
Origin Validation Error in Apache Maven
|
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
|
[] | null | 9.1
| null | null | null |
GHSA-fmf6-phgj-r49v
|
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Mobile Application Platform). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS v3.0 Base Score 6.1 (Confidentiality and Integrity impacts).
|
[] | null | null | 6.1
| null | null |
|
GHSA-vc4c-h2fv-5cq2
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9624.
|
[] | null | null | null | null | null |
|
GHSA-pv2g-vm98-vjxf
|
Jenkins Config File Provider Plugin improper credential masking vulnerability
|
Jenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they’re written to the build log.Config File Provider Plugin 953.v0432a_802e4d2 masks credentials configured in configuration files if they appear in the build log.
|
[] | null | 4.3
| null | null | null |
CVE-2021-22960
|
The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
|
[
"cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.5
| null | 5.8
| null |
|
GHSA-39vq-3f5w-q742
|
Mozilla Firefox 1.5.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FTP response, when attempting to connect with a username and password via the FTP URI.
|
[] | null | null | null | null | null |
|
CVE-2024-33494
|
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). Affected components do not properly authenticate heartbeat messages. This could allow an unauthenticated remote attacker to affected the availability of secondary RTLS systems configured using a TeeRevProxy service and potentially cause loss of data generated during the time the attack is ongoing.
|
[
"cpe:2.3:a:siemens:simatic_rtls_locating_manager:*:*:*:*:*:*:*:*"
] | 6.9
| 6.5
| null | null | null |
|
CVE-2024-3725
|
The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Post Grid widget in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping on user supplied attributes such as 'titleTag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4
| null | null | null |
|
CVE-2017-11417
|
Fiyo CMS 2.0.7 has SQL injection in dapur/apps/app_article/controller/article_status.php via $_GET['id'].
|
[
"cpe:2.3:a:fiyo:fiyo_cms:2.0.7:*:*:*:*:*:*:*"
] | null | null | 9.8
| 7.5
| null |
|
CVE-2015-4020
|
RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.
|
[
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.7:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2025-11614
|
SourceCodester Best Salon Management System edit-appointment.php sql injection
|
A vulnerability was identified in SourceCodester Best Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /panel/edit-appointment.php. Such manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
GHSA-jjm3-8267-chq9
|
An null-pointer-derefrence in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed xar file to crash the application during file processing.
|
[] | null | 5.1
| null | null | null |
|
CVE-2014-10037
|
Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php.
|
[
"cpe:2.3:a:domphp:domphp:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-83v9-mgr3-47mm
|
IBM API Connect 5.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138079.
|
[] | null | null | 5.4
| null | null |
|
GHSA-6mv5-3jxx-rprv
|
In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
|
[] | null | null | 7.8
| null | null |
|
CVE-2023-36511
|
WordPress WooCommerce Order Barcodes Plugin <= 1.6.4 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Order Barcodes plugin <= 1.6.4 versions.
|
[
"cpe:2.3:a:woocommerce:woocommerce_order_barcodes:*:*:*:*:*:wordpress:*:*"
] | null | 4.3
| null | null | null |
CVE-2022-24862
|
Server-Side Request Forgery in Databasir
|
Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC driver the corresponding JDBC driver download address will be downloaded first, but this address will return a response page with complete error information when accessing a non-existent URL. Attackers can take advantage of this feature for SSRF.
|
[
"cpe:2.3:a:databasir_project:databasir:1.0.1:*:*:*:*:*:*:*"
] | null | 7.7
| null | null | null |
CVE-2024-42733
|
An issue in Docmosis Tornado v.2.9.7 and before allows a remote attacker to execute arbitrary code via a crafted script to the UNC path input
|
[] | null | 9.8
| null | null | null |
|
GHSA-5hfg-5x9r-f4cr
|
SQL injection vulnerability in index.php in Zorum Forum 3.5 allows remote attackers to execute arbitrary SQL commands via the (1) offset, (2) tid, (3) fromid, (4) sortby, (5) fromfrommethod, and (6) fromfromlist parameters.
|
[] | null | null | null | null | null |
|
GHSA-pphf-qgjw-p8w7
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btnxpuart: Fix btnxpuart_closeFix scheduling while atomic BUG in btnxpuart_close(), properly
purge the transmit queue and free the receive skb.[ 10.973809] BUG: scheduling while atomic: kworker/u9:0/80/0x00000002
...
[ 10.980740] CPU: 3 PID: 80 Comm: kworker/u9:0 Not tainted 6.8.0-rc7-0.0.0-devel-00005-g61fdfceacf09 #1
[ 10.980751] Hardware name: Toradex Verdin AM62 WB on Dahlia Board (DT)
[ 10.980760] Workqueue: hci0 hci_power_off [bluetooth]
[ 10.981169] Call trace:
...
[ 10.981363] uart_update_mctrl+0x58/0x78
[ 10.981373] uart_dtr_rts+0x104/0x114
[ 10.981381] tty_port_shutdown+0xd4/0xdc
[ 10.981396] tty_port_close+0x40/0xbc
[ 10.981407] uart_close+0x34/0x9c
[ 10.981414] ttyport_close+0x50/0x94
[ 10.981430] serdev_device_close+0x40/0x50
[ 10.981442] btnxpuart_close+0x24/0x98 [btnxpuart]
[ 10.981469] hci_dev_close_sync+0x2d8/0x718 [bluetooth]
[ 10.981728] hci_dev_do_close+0x2c/0x70 [bluetooth]
[ 10.981862] hci_power_off+0x20/0x64 [bluetooth]
|
[] | null | 5.5
| null | null | null |
|
GHSA-2gfx-5m5m-qcxg
|
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
|
[] | null | 3.8
| null | null | null |
|
GHSA-gc36-7fp5-p893
|
Incorrect use of privileged API vulnerability in registerBatteryStatsCallback in BatteryStatsService prior to SMR Jun-2024 Release 1 allows local attackers to use privileged API.
|
[] | null | 6.2
| null | null | null |
|
GHSA-26fh-vr24-q829
|
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
|
[] | null | null | 6.5
| null | null |
|
GHSA-frcg-47mh-pj2g
|
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.
|
[] | null | 5.3
| null | null | null |
|
CVE-2003-0072
|
The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes an out-of-bounds read of an array (aka "array overrun").
|
[
"cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:1.2.2.beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2025-62038
|
WordPress MeetingHub plugin <= 1.23.9 - Sensitive Data Exposure vulnerability
|
Insertion of Sensitive Information Into Sent Data vulnerability in Sovlix MeetingHub meetinghub allows Retrieve Embedded Sensitive Data.This issue affects MeetingHub: from n/a through <= 1.23.9.
|
[] | null | 6.5
| null | null | null |
GHSA-c66c-c4c3-hgxf
|
The do_set_password function in modules/chanserv/set.c in IRC Services before 5.0.60 preserves channel founder privileges across a channel password change (ChanServ SET PASSWORD), which allows remote authenticated users to obtain the new password through automated e-mail, or perform privileged actions without knowing the new password.
|
[] | null | null | null | null | null |
|
GHSA-c86q-px74-v8w3
|
Unknown vulnerability in Webmail in iPlanet Messaging Server 5.2 Patch 1 and Sun ONE Messaging Server 6.2 allows remote attackers to execute arbitrary Javascript, possibly due to a cross-site scripting (XSS) vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2024-29169
|
Dell SCG, versions prior to 5.22.00.00, contain a SQL Injection Vulnerability in the SCG UI for an internal audit REST API. A remote authenticated attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing potential unauthorized access and modification of application data.
|
[
"cpe:2.3:a:dell:secure_connect_gateway_application:5.18.00.20:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:secure_connect_gateway_appliance:5.18.00.20:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
|
GHSA-9859-7vpf-8wx3
|
Stack-based buffer overflow in agentdpv.dll 2.0.0.3425 in Microsoft Agent on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a crafted URL to the Agent (Agent.Control) ActiveX control, which triggers an overflow within the Agent Service (agentsrv.exe) process, a different issue than CVE-2007-1205.
|
[] | null | null | null | null | null |
|
CVE-2020-8868
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Quest Foglight Evolve 9.0.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the __service__ user account. The product contains a hard-coded password for this account. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-9553.
|
[
"cpe:2.3:a:quest:foglight_evolve:9.0.0:*:*:*:*:*:*:*"
] | null | null | 9.8
| null | null |
|
ICSA-25-063-05
|
Hitachi Energy UNEM/ECST
|
Hitachi Energy is aware of a vulnerability that affects the UNEM/ECST versions listed below. If exploited an attacker could potentially intercept or falsify data exchanges between the client and the server. Please refer to the “Recommended Immediate Actions” for information about the remediation.
|
[] | null | 4.9
| null | null | null |
GHSA-m543-w5cq-4vwh
|
Secure Elements Class 5 AVR server and client (aka C5 EVM) before 2.8.1 send messages in cleartext, which allows remote attackers to read sensitive vulnerability information.
|
[] | null | null | null | null | null |
|
CVE-2007-3966
|
SQL injection vulnerability in Munch Pro allows remote attackers to execute arbitrary SQL commands via the login field to /admin, a different vulnerability than CVE-2006-5880.
|
[
"cpe:2.3:a:iexpress:munch_pro:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-gfj5-hxvx-qj62
|
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge.
|
[] | null | null | 7.5
| null | null |
|
GHSA-qcm9-87fm-rgpf
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | 2.7
| null | null | null |
|
GHSA-868x-9f95-m4c9
|
In the ffghbn function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
|
[] | null | 8.8
| null | null | null |
|
CVE-2013-5149
|
The Push Notifications subsystem in Apple iOS before 7 provides the push-notification token to an app without user approval, which allows attackers to obtain sensitive information via an app that employs a crafted push-notification registration process.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-7hcc-qmpc-f7xq
|
client/NmdcHub.cpp in Linux DC++ (linuxdcpp) before 0.707 allows remote attackers to cause a denial of service (crash) via an empty private message, which triggers an out-of-bounds read.
|
[] | null | null | null | null | null |
|
GHSA-q7qh-f4pw-5h53
|
A vulnerability classified as critical has been found in Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310. Affected is the function Sign of the file pkg/token/token.go. The manipulation of the argument config.key leads to hard-coded credentials. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f. It is recommended to apply a patch to fix this issue.
|
[] | 5.3
| 6.3
| null | null | null |
|
GHSA-2ch6-g4cg-g5ph
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ByteLabX Pdf Embedder Fay allows DOM-Based XSS.This issue affects Pdf Embedder Fay: from n/a through 1.10.1.
|
[] | null | 6.5
| null | null | null |
|
GHSA-mrr5-9q84-93pr
|
The WP Dark Mode WordPress plugin before 4.0.8 does not properly sanitize the style parameter in shortcodes before using it to load a PHP template. This leads to Local File Inclusion on servers where non-existent directories may be traversed, or when chained with another vulnerability allowing arbitrary directory creation.
|
[] | null | 4.3
| null | null | null |
|
GHSA-p2r9-wq4f-9f7m
|
KMSoft Guestbook (aka GBook) 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/db.mdb.
|
[] | null | null | null | null | null |
|
GHSA-c2gh-mqcp-5944
|
iScripts EasyCreate 3.2.1 has Stored Cross-Site Scripting in the "Site Description" field.
|
[] | null | null | 5.4
| null | null |
|
CVE-2024-13038
|
CodeAstro Simple Loan Management System Login index.php sql injection
|
A vulnerability was found in CodeAstro Simple Loan Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
GHSA-26jf-gmgg-9m8f
|
The Elementor Website Builder WordPress plugin before 3.1.4 does not sanitise or escape user input appended to the DOM via a malicious hash, resulting in a DOM Cross-Site Scripting issue
|
[] | null | null | null | null | null |
|
GHSA-372x-vcpr-vjq9
|
The Admin Notices Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the handle_ajax_call() function in all versions up to, and including, 1.4.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve a list of registered user emails.
|
[] | null | 4.3
| null | null | null |
|
GHSA-wj3h-4j27-9x6q
|
Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | 8.8
| null | null | null |
|
GHSA-rv95-4wxj-6fqq
|
Pylons Colander Denial of Service vulnerability
|
In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis.
|
[] | 8.7
| null | 7.5
| null | null |
GHSA-cwfr-r8vc-gxjq
|
Server-Side Request Forgery (SSRF) vulnerability in Yannick Lefebvre Link Library link-library allows Server Side Request Forgery.This issue affects Link Library: from n/a through <= 7.8.4.
|
[] | null | 9.1
| null | null | null |
|
CVE-2023-38344
|
An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.
|
[
"cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*"
] | null | 6.5
| null | null | null |
|
CVE-2021-28913
|
BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /webif/SecurityModule to validate the so called and hard coded unique 'eibPort String' which acts as the root SSH key passphrase. This is usable and part of an attack chain to gain SSH root access.
|
[
"cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
GHSA-jf76-7xpm-4gc7
|
Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211.
|
[] | null | null | null | null | null |
|
CVE-2002-1199
|
The getdbm procedure in ypxfrd allows local users to read arbitrary files, and remote attackers to read databases outside /var/yp, via a directory traversal and symlink attack on the domain and map arguments.
|
[
"cpe:2.3:o:caldera:openlinux:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2022-1433
|
An issue has been discovered in GitLab affecting all versions starting from 14.4 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. Missing invalidation of Markdown caching causes potential payloads from a previously exploitable XSS vulnerability (CVE-2022-1175) to persist and execute.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:enterprise:*:*:*"
] | null | 2.6
| null | null | null |
|
GHSA-fm3h-p9wm-h74h
|
Directus's webhook trigger flows can leak sensitive data
|
Describe the BugIn Directus, when a **Flow** with the "_Webhook_" trigger and the "_Data of Last Operation_" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data.This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse.

To Reproduce**Steps to Reproduce:**Create a Flow in Directus with:Trigger: WebhookResponse Body: Data of Last OperationAdd a condition that is likely to fail.Trigger the Flow with any input data that will fail the condition.Observe the API response, which includes sensitive information like:Environmental variables (`$env`)Authorization headersUser details under `$accountability`Previous operational data.**Expected Behavior:**
In the event of a ValidationError, the API response should only contain relevant error messages and details, avoiding the exposure of sensitive data.**Actual Behavior:**
The API response includes sensitive information such as:Environment keys (`FLOWS_ENV_ALLOW_LIST`)User accountability (`role`, `user`, etc.)Operational logs (`current_payments`, `$last`), which might contain private details.
|
[] | null | 8.6
| null | null | null |
GHSA-cm93-2632-9m2q
|
In the Linux kernel, the following vulnerability has been resolved:kernel/printk/index.c: fix memory leak with using debugfs_lookup()When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
|
[] | null | 5.5
| null | null | null |
|
CVE-1999-1102
|
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times.
|
[
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:a_ux:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1
| null |
|
GHSA-35c4-gvfc-x7q2
|
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677.
|
[] | null | 6.5
| null | null | null |
|
GHSA-hc8m-3g48-3jgm
|
Improper input validation in the Intel(R) Administrative Tools for Intel(R) Network Adapters driver for Windows before version 1.4.0.15, may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
CVE-2025-54542
|
Sending Password in GET Request
|
QuickCMS sends password and login via GET Request. This allows a local attacker with access to the victim's browser history to obtain the necessary credentials to log in as the user.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
|
[] | 6.9
| null | null | null | null |
GHSA-vmf7-x639-h3q3
|
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0715, CVE-2020-0745.
|
[] | null | null | null | null | null |
|
GHSA-94w9-xvpc-rm9j
|
IPSSH (aka the SSH server) in Wind River VxWorks 6.5 through 6.9 allows remote authenticated users to cause a denial of service (daemon outage) via a crafted packet.
|
[] | null | null | null | null | null |
|
CVE-2018-25083
|
The pullit package before 1.4.0 for Node.js allows OS Command Injection because eval is used on an attacker-supplied Git branch name.
|
[
"cpe:2.3:a:pull_it_project:pull_it:*:*:*:*:*:node.js:*:*"
] | null | 9.8
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.