id
stringlengths
12
45
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2008-5989
Directory traversal vulnerability in defs.php in PHPcounter 1.3.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the l parameter.
[ "cpe:2.3:a:phpcounter:phpcounter:*:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpcounter:phpcounter:1.3.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2024-6243
HTML Forms < 1.3.33 - Admin+ Stored XSS
The HTML Forms WordPress plugin before 1.3.33 does not sanitize and escape the form message inputs, allowing high-privilege users, such as administrators, to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disabled.
[ "cpe:2.3:a:htmlforms:html_forms:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibericode:html_forms:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
CVE-2025-3682
PCMan FTP Server PASV Command buffer overflow
A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as critical. This affects an unknown part of the component PASV Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
CVE-2023-47616
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system.
[ "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*" ]
null
2.4
null
null
null
RHSA-2023:5933
Red Hat Security Advisory: Openshift Secondary Scheduler Operator 1.1.3 security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8" ]
null
7.5
null
null
null
CVE-2005-4338
announcement.pl in Blackboard Learning and Community Portal System in Academic Suite 6.3.1.424, 6.2.3.23, and other versions before 6 allows remote attackers to gain administrator privileges by setting the context parameter to "admin".
[ "cpe:2.3:a:blackboard:academic_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:blackboard:academic_suite:6.2.3.23:*:*:*:*:*:*:*", "cpe:2.3:a:blackboard:academic_suite:6.3.1.424:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2020-2278
Jenkins Storable Configs Plugin 1.0 and earlier does not restrict the user-specified file name, allowing attackers with Job/Configure permission to replace any other '.xml' file on the Jenkins controller with a job config.xml file's content.
[ "cpe:2.3:a:jenkins:storable_configs:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
null
GHSA-pfw8-43jj-c4g3
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 2.6.0-pl2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the PmaAbsoluteUri parameter, (2) the zero_rows parameter in read_dump.php, (3) the confirm form, or (4) an error message generated by the internal phpMyAdmin parser.
[]
null
null
null
null
null
GHSA-6r3w-c7h6-wfhg
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
[]
null
5.4
null
null
null
GHSA-q5mv-5g22-rg38
Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability.
[]
null
6.6
null
null
null
GHSA-7cf8-v985-h6fc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound OK Poster Group allows Reflected XSS. This issue affects OK Poster Group: from n/a through 1.1.
[]
null
7.1
null
null
null
CVE-2010-5023
SQL injection vulnerability in index.asp in Digital Interchange Calendar 5.8.5 allows remote attackers to execute arbitrary SQL commands via the intDivisionID parameter.
[ "cpe:2.3:a:cramerdev:digital_interchange_calendar:5.8.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2025:23235
Red Hat Security Advisory: rsync security update
rsync: Path traversal vulnerability in rsync
[ "cpe:/a:redhat:rhel_e4s:9.2::appstream", "cpe:/o:redhat:rhel_e4s:9.2::baseos" ]
null
6.5
null
null
null
CVE-2024-58045
Multi-concurrency vulnerability in the media digital copyright protection module Impact: Successful exploitation of this vulnerability may affect availability.
[]
null
8.6
null
null
null
GHSA-hhg8-rc52-c9mv
The WP Test Email plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2020-5991
NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure.
[ "cpe:2.3:a:nvidia:cuda_toolkit:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-h6c3-73mq-5cp9
The Elementor Website Builder – More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter of the Icon widget in all versions up to, and including, 3.25.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-85q4-v37c-wfpc
Malicious Package in bitcion-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
null
9.1
null
null
null
CVE-2006-4230
Multiple PHP remote file inclusion vulnerabilities in index.php in Lizge V.20 Web Portal allow remote attackers to execute arbitrary PHP code via a URL in the (1) lizge or (2) bade parameters.
[ "cpe:2.3:a:lizge:lizge_web_portal:0.20:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-46f9-rmg7-hh9m
Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading to privilege escalation.
[]
null
7.8
null
null
null
GHSA-fj8f-56wc-q36r
rabbitmq-connector plugin module in Apache EventMesh platforms allows attackers to send controlled message
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message andremote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, the new version is set to be released as soon as possible.
[]
null
9.8
null
null
null
CVE-2006-1970
Cross-site scripting (XSS) vulnerability in classifieds/viewcat.cgi in KCScripts Classifieds, distributed individually and as part of Portal Pack 6.0 and earlier, allows remote attackers to inject arbitrary web script or HTML via the cat_id parameter.
[ "cpe:2.3:a:kcscripts:portal_pack:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2017:2832
Red Hat Security Advisory: nss security update
nss: Potential use-after-free in TLS 1.2 server when verifying client authentication
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
null
GHSA-f7w6-w5p4-76pj
The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges.
[]
null
null
null
null
null
CVE-2018-0640
Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter.
[ "cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null
GHSA-2r24-5j8r-cf83
In the Linux kernel, the following vulnerability has been resolved:tracefs: Reset permissions on remount if permissions are optionsThere's an inconsistency with the way permissions are handled in tracefs. Because the permissions are generated when accessed, they default to the root inode's permission if they were never set by the user. If the user sets the permissions, then a flag is set and the permissions are saved via the inode (for tracefs files) or an internal attribute field (for eventfs).But if a remount happens that specify the permissions, all the files that were not changed by the user gets updated, but the ones that were are not. If the user were to remount the file system with a given permission, then all files and directories within that file system should be updated.This can cause security issues if a file's permission was updated but the admin forgot about it. They could incorrectly think that remounting with permissions set would update all files, but miss some.For example:cd /sys/kernel/tracingchgrp 1002 current_tracerls -l[..] -rw-r----- 1 root root 0 May 1 21:25 buffer_size_kb -rw-r----- 1 root root 0 May 1 21:25 buffer_subbuf_size_kb -r--r----- 1 root root 0 May 1 21:25 buffer_total_size_kb -rw-r----- 1 root lkp 0 May 1 21:25 current_tracer -rw-r----- 1 root root 0 May 1 21:25 dynamic_events -r--r----- 1 root root 0 May 1 21:25 dyn_ftrace_total_info -r--r----- 1 root root 0 May 1 21:25 enabled_functionsWhere current_tracer now has group "lkp".mount -o remount,gid=1001 .ls -l-rw-r----- 1 root tracing 0 May 1 21:25 buffer_size_kb -rw-r----- 1 root tracing 0 May 1 21:25 buffer_subbuf_size_kb -r--r----- 1 root tracing 0 May 1 21:25 buffer_total_size_kb -rw-r----- 1 root lkp 0 May 1 21:25 current_tracer -rw-r----- 1 root tracing 0 May 1 21:25 dynamic_events -r--r----- 1 root tracing 0 May 1 21:25 dyn_ftrace_total_info -r--r----- 1 root tracing 0 May 1 21:25 enabled_functionsEverything changed but the "current_tracer".Add a new link list that keeps track of all the tracefs_inodes which has the permission flags that tell if the file/dir should use the root inode's permission or not. Then on remount, clear all the flags so that the default behavior of using the root inode's permission is done for all files and directories.
[]
null
7.8
null
null
null
CVE-2019-5451
Bypass lock protection in the Nextcloud Android app prior to version 3.6.1 allows accessing the files when repeatedly opening and closing the app in a very short time.
[ "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:android:*:*" ]
null
4.6
null
2.1
null
GHSA-wfc5-6r3q-mv26
Unspecified vulnerability in the error handler in Hitachi Web Page Generator and Web Page Generator Enterprise 4.01 and earlier, when using the default error template and debug mode is set to ON, allows remote attackers to determine internal directory structures via unknown attack vectors.
[]
null
null
null
null
null
CVE-2010-1121
Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
[ "cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-qg6p-6xqq-gh7c
Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption.
[]
null
null
null
null
null
GHSA-rvjq-cgm3-hvq9
The Logo Showcase Ultimate – Logo Carousel, Logo Slider & Logo Grid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.8 via deserialization via shortcode of untrusted input. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
[]
null
7.5
null
null
null
CVE-2025-14599
Quartus® Prime Standard and Quartus® Prime Lite Security Advisory
Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Standard Installer (SFX) on Windows, Altera Quartus Prime Lite  Installer (SFX) on Windows allows Search Order Hijacking.This issue affects Quartus Prime Standard: from 23.1 through 24.1; Quartus Prime Lite: from 23.1 through 24.1.
[]
5.4
6.7
null
null
null
GHSA-hhpx-68fp-4gm4
An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses.
[]
null
4.3
null
null
null
CVE-2025-15366
IMAP command injection in user-controlled commands
The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
[]
5.9
null
null
null
https://github.com/python/cpython/pull/143922
GHSA-gjjr-423g-hm3j
In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file.
[]
null
null
5.5
null
null
GHSA-h2ww-p8c6-6v58
Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp).
[]
null
9.8
null
null
null
CVE-2024-38473
Apache HTTP Server proxy encoding problem
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
[ "cpe:2.3:a:apache_software_foundation:apache_http_server:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-2586-f3p4-hq84
LightGBM Remote Code Execution Vulnerability
LightGBM Remote Code Execution Vulnerability
[]
null
8.1
null
null
null
CVE-2018-1929
IBM Rational Engineering Lifecycle Manager 5.0 through 6.0.6 could allow a malicious user to be allowed to view any view if he knows the URL link of a the view, and access information that should not be able to see. IBM X-Force ID: 153120.
[ "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*" ]
null
null
4.3
null
null
CVE-2021-28906
In function read_yin_leaf() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
[ "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-q3mg-hh3m-f7pm
A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua (users endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to enumerate users via crafted HTTP requests.
[]
null
6.5
null
null
null
GHSA-8w7v-wg9w-c7jm
Cross-Site Request Forgery (CSRF) vulnerability in Soft8Soft LLC Verge3D allows Cross Site Request Forgery. This issue affects Verge3D: from n/a through 4.8.2.
[]
null
4.3
null
null
null
CVE-2022-32481
Dell PowerProtect Cyber Recovery, versions prior to 19.11, contain a privilege escalation vulnerability on virtual appliance deployments. A lower-privileged authenticated user can chain docker commands to escalate privileges to root leading to complete system takeover.
[ "cpe:2.3:a:dell:powerprotect_cyber_recovery:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2022-28656
is_closing_session() allows users to consume RAM in the Apport process
[ "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*" ]
null
5.5
null
null
null
CVE-2018-9120
In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post.
[ "cpe:2.3:a:crea8social:crea8social:2018.2:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-8xg4-xq2v-v6j7
Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins
The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins controller file system, and obtain some information about Jenkins controller file systems.SECURITY-2538 / CVE-2021-21692: The operations `FilePath#renameTo` and `FilePath#moveAllChildrenTo` only check read permission on the source path.We expect that most of these vulnerabilities have been present since [SECURITY-144 was addressed in the 2014-10-30 security advisory](https://www.jenkins.io/security/advisory/2014-10-30/).Jenkins 2.319, LTS 2.303.3 addresses these security vulnerabilities.SECURITY-2538 / CVE-2021-21692: The operations `FilePath#renameTo` and `FilePath#moveAllChildrenTo` check both read and delete permissions on the source path.As some common operations are now newly subject to access control, it is expected that plugins sending commands from agents to the controller may start failing. Additionally, the newly introduced path canonicalization means that instances using a custom builds directory ([Java system property jenkins.model.Jenkins.buildsDir](https://www.jenkins.io/doc/book/managing/system-properties/#jenkins-model-jenkins-buildsdir)) or partitioning `JENKINS_HOME` using symbolic links may fail access control checks. See [the documentation](https://www.jenkins.io/doc/book/security/controller-isolation/agent-to-controller/#file-access-rules) for how to customize the configuration in case of problems.If you are unable to immediately upgrade to Jenkins 2.319, LTS 2.303.3, you can install the [Remoting Security Workaround Plugin](https://www.jenkins.io/redirect/remoting-security-workaround/). It will prevent all agent-to-controller file access using `FilePath` APIs. Because it is more restrictive than Jenkins 2.319, LTS 2.303.3, more plugins are incompatible with it. Make sure to read the plugin documentation before installing it.
[]
null
9
null
null
null
CVE-2025-31789
WordPress TextMe SMS plugin <= 1.9.1 - Broken Access Control vulnerability
Missing Authorization vulnerability in Matat Technologies TextMe SMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TextMe SMS: from n/a through 1.9.1.
[]
null
6.5
null
null
null
GHSA-4465-r2hg-v4rj
CiviCRM SQL injection vulnerability via Quick Search API
The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick.
[]
null
null
null
null
null
CVE-2004-1714
BlackICE PC Protection and Server Protection installs (1) firewall.ini, (2) blackice.ini, (3) sigs.ini and (4) protect.ini with Everyone Full Control permissions, which allows local users to cause a denial of service (crash) or modify configuration, as demonstrated by modifying firewall.ini to contain a large firewall rule.
[ "cpe:2.3:a:iss:blackice_pc_protection:3.6cbd:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6cbr:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6cbz:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6cca:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6ccb:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6ccc:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6ccd:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6cce:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6ccf:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_pc_protection:3.6ccg:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.5cdf:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6cca:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6ccb:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6ccc:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6ccd:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6cce:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6ccf:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6ccg:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6cch:*:*:*:*:*:*:*", "cpe:2.3:a:iss:blackice_server_protection:3.6cno:*:*:*:*:*:*:*" ]
null
7.1
null
2.1
null
GHSA-25q8-wqrc-rrrr
SQL injection vulnerability in reward_points.post.php in the Reward points addon in CS-Cart before 2.0.6 allows remote authenticated users to execute arbitrary SQL commands via the sort_order parameter in a reward_points.userlog action to index.php, a different vulnerability than CVE-2005-4429.2.
[]
null
null
null
null
null
GHSA-7m4h-4frj-xvm5
An issue was discovered in dreamer_cms 4.1.3. There is a CSRF vulnerability that can delete a theme project via /admin/category/delete.
[]
null
4.3
null
null
null
GHSA-34w3-rhpm-qv77
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.9.3.2 due to incorrect use of the wp_kses_allowed_html function, which allows the 'onclick' attribute for certain HTML elements without sufficient restriction or context validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-q9mh-p233-5pvv
A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.
[]
null
8.1
null
null
null
GHSA-4768-g35x-83q9
Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the "transform size."
[]
null
null
null
null
null
GHSA-5xgh-643p-cp2g
Cross-site Scripting in yapi-vendor
An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.
[]
null
null
5.4
null
null
CVE-2006-7010
The mosgetparam implementation in Joomla! before 1.0.10, does not set a variable's data type to integer when the variable's default value is numeric, which has unspecified impact and attack vectors, which may permit SQL injection attacks.
[ "cpe:2.3:a:joomla:joomla:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:1.0.9:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-v7m5-jjhm-hp24
Multiple off-by-one buffer overflows in the IMAP capability for Mutt 1.3.28 and earlier, and Balsa 1.2.4 and earlier, allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder, a different vulnerability than CVE-2003-0140.
[]
null
null
null
null
null
CVE-2025-4675
Improper implementation of Modbus protocol leading to DOS attack
Improper Check for Unusual or Exceptional Conditions vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K.
[]
7.1
6.5
null
null
null
GHSA-xc32-mq6r-3364
D-Link DIR-859 A1 1.05 was discovered to contain a command injection vulnerability via the service= variable in the soapcgi_main function.
[]
null
9.8
null
null
null
CVE-2023-7135
code-projects Record Management System Offices offices.php cross site scripting
A vulnerability classified as problematic has been found in code-projects Record Management System 1.0. Affected is an unknown function of the file /main/offices.php of the component Offices Handler. The manipulation of the argument officename with the input "><script src="https://js.rip/b23tmbxf49"></script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249138 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:code-projects:record_management_system:1.0:*:*:*:*:*:*:*" ]
null
2.4
2.4
3.3
null
CVE-2021-26828
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
[ "cpe:2.3:a:openplcproject:scadabr:*:*:*:*:*:linux:*:*", "cpe:2.3:a:openplcproject:scadabr:*:*:*:*:*:windows:*:*" ]
null
8.8
null
6.5
null
GHSA-h999-rj96-9q7g
The ATOK application before 1.0.4 for Android allows remote attackers to read the learning information file, and obtain sensitive input-string information, via a crafted application.
[]
null
null
null
null
null
RHSA-2014:1891
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_brms:6.0" ]
null
null
4.8
null
null
CVE-2020-6369
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service.
[ "cpe:2.3:a:sap:focused_run:9.7:*:*:*:*:*:*:*", "cpe:2.3:a:sap:focused_run:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:sap:focused_run:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:sap:focused_run:10.7:*:*:*:*:*:*:*", "cpe:2.3:a:sap:solution_manager:9.7:*:*:*:*:*:*:*", "cpe:2.3:a:sap:solution_manager:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:sap:solution_manager:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:sap:solution_manager:10.7:*:*:*:*:*:*:*" ]
null
null
7.5
null
null
CVE-2024-4970
Widget Bundle <= 2.0.0 - Admin+ Stored XSS
The Widget Bundle WordPress plugin through 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:devnath_verma:widget_bundle:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
GHSA-xr88-75g2-cjj4
rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.
[]
null
null
null
null
null
CVE-2010-2070
arch/ia64/xen/faults.c in Xen 3.4 and 4.0 in Linux kernel 2.6.18, and possibly other kernel versions, when running on IA-64 architectures, allows local users to cause a denial of service and "turn on BE by modifying the user mask of the PSR," as demonstrated via exploitation of CVE-2006-0742.
[ "cpe:2.3:a:xensource:xen:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:xensource:xen:4.0.0:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
CVE-2025-50155
Windows Push Notifications Apps Elevation of Privilege Vulnerability
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
GHSA-pm77-vj97-hfv8
HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/register.
[]
null
4.7
null
null
null
CVE-2023-32249
ksmbd: not allow guest user on multichannel
In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on multichannel This patch return STATUS_NOT_SUPPORTED if binding session is guest.
[]
null
5.5
null
null
null
CVE-2022-20959
Cisco Identity Services Engine Cross-Site Scripting Vulnerability
A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[ "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2025-55317
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
Improper link resolution before file access ('link following') in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
[]
null
7.8
null
null
null
CVE-2000-1025
eWave ServletExec JSP/Java servlet engine, versions 3.0C and earlier, allows remote attackers to cause a denial of service via a URL that contains the "/servlet/" string, which invokes the ServletExec servlet and causes an exception if the servlet is already running.
[ "cpe:2.3:a:unify:ewave_servletexec:3.0c:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-w2jx-6xv7-8634
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. An app may be able to disclose kernel memory
[]
null
5.5
null
null
null
GHSA-rmxw-c48h-2vf5
XWiki Platform privilege escalation from script right to programming right through title displayer
ImpactIn XWiki Platform, it's possible for a user to write a script in which any velocity content is executed with the right of any other document content author.To reproduce:As a user with script but not programming right, create a document with the following content:Since this API require programming right and the user does not have it, the expected result is `$doc.document.authors.contentAuthor` (not executed script), unfortunately with the security vulnerability we get `XWiki.superadmin` which shows that the title was executed with the right of the unmodified document.PatchesThis has been patched in XWiki 14.10.7 and 15.2-RC-1.WorkaroundsThere are no known workarounds for it.Referenceshttps://jira.xwiki.org/browse/XWIKI-20624https://github.com/xwiki/xwiki-platform/commit/11a9170dfe63e59f4066db67f84dbfce4ed619c6https://jira.xwiki.org/browse/XWIKI-20625https://github.com/xwiki/xwiki-platform/commit/41d7dca2d30084966ca6a7ee537f39ee8354a7e3For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:security@xwiki.org)
[]
null
9.1
null
null
null
CVE-2015-4602
The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
[ "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2025-24575
WordPress HelloAsso plugin <= 1.1.11 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HelloAsso HelloAsso allows Stored XSS. This issue affects HelloAsso: from n/a through 1.1.11.
[]
null
6.5
null
null
null
GHSA-cjcf-wm2p-59h5
Exposure of Sensitive Information to an Unauthorized Actor in Oracle MySQL Connectors Java
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
[]
null
null
3.3
null
null
CVE-2025-4504
SourceCodester Online College Library System index.php sql injection
A vulnerability was found in SourceCodester Online College Library System 1.0. It has been classified as critical. Affected is an unknown function of the file /index.php. The manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-3wph-gw9m-m3mm
SAP GUI for Windows may allow the leak of NTML hashes when specific ABAP frontend services are called with UNC paths. For a successful attack, the attacker needs developer authorization in a specific Application Server ABAP to make changes in the code, and the victim needs to execute by using SAP GUI for Windows. This could trigger automatic NTLM authentication, potentially exposing hashed credentials to an attacker. As a result, it has a high impact on the confidentiality.
[]
null
4.5
null
null
null
CVE-2022-32073
WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR.
[ "cpe:2.3:a:wolfssh:wolfssh:1.4.7:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-h5xc-2277-3x2r
A weakness has been identified in Campcodes Advanced Online Voting Management System 1.0. This vulnerability affects unknown code of the file /admin/voters_add.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
[]
2.1
6.3
null
null
null
GHSA-4pxq-6xxj-8w94
A potential security vulnerability has been identified in the installer of HPE Version Control Repository Manager. The vulnerability could allow local escalation of privilege. HPE has made the following software update to resolve the vulnerability in HPE Version Control Repository Manager installer 7.6.14.0.
[]
null
7.8
null
null
null
CVE-2024-1522
Cross-Site Request Forgery (CSRF) Leading to Remote Code Execution in parisneo/lollms-webui
A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim's system. The vulnerability stems from the `/execute_code` API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim's local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim's system without requiring direct network access to the vulnerable application.
[ "cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-7pw6-2xv6-25xh
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
[]
null
7.8
null
null
null
GHSA-f46h-72fj-m37w
The printer friendly version functionality in the Book module in Drupal 6.x before 6.28 and 7.x before 7.19 does not properly restrict access to node that are part of a book outline, which allows remote authenticated users with the "access printer-friendly version" permission to read node titles and possibly node content via unspecified vectors.
[]
null
null
null
null
null
GHSA-px83-9343-xrfj
An access issue was addressed with improved access restrictions. This issue is fixed in Security Update 2021-005 Catalina, macOS Big Sur 11.6, tvOS 15. A user may gain access to protected parts of the file system.
[]
null
5.5
null
null
null
GHSA-5jg4-p78r-p5j3
Improper Neutralization of Input During Web Page Generation Apache ActiveMQ
In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.
[]
null
null
6.1
null
null
CVE-2025-52773
WordPress HieCOR Payment Gateway plugin plugin <= 1.5.11 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in hiecor HieCOR Payment Gateway Plugin hcv4-payment-gateway allows SQL Injection.This issue affects HieCOR Payment Gateway Plugin: from n/a through <= 1.5.11.
[]
null
9.8
null
null
null
GHSA-p559-4mqq-cvfv
includes/db/class.reflines_db.inc in FrontAccounting 2.4.6 contains a SQL Injection vulnerability in the reference field that can allow the attacker to grab the entire database of the application via the void_transaction.php filterType parameter.
[]
null
null
9.8
null
null
GHSA-65v4-72rq-m9q5
An issue was discovered on Eaton UPS 9PX 8000 SP devices. The appliance discloses the SNMP version 3 user's password. The web page displayed by the appliance contains the password in cleartext. Passwords of the read and write users could be retrieved by browsing the source code of the webpage.
[]
null
null
4.9
null
null
GHSA-8gx7-qfm6-j56p
Microsoft Word 2003 SP3 and 2007 SP2 and SP3, Office 2008 and 2011 for Mac, and Office Compatibility Pack SP2 and SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "RTF Mismatch Vulnerability."
[]
null
null
null
null
null
GHSA-f8vv-4g72-7v42
Improper access control for some Device Plugins for Kubernetes software maintained by Intel before version 0.32.0 may allow a privileged user to potentially enable denial of service via local access.
[]
6.7
4.4
null
null
null
CVE-2005-0053
Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2024:10219
Red Hat Security Advisory: perl-App-cpanminus:1.7044 security update
perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
null
GHSA-5c2g-j2jh-5g96
A vulnerability was determined in Scada-LTS 2.7.8.1. Affected by this vulnerability is an unknown functionality of the file /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr. Executing manipulation can lead to information disclosure. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor explains: "[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower."
[]
2.1
4.3
null
null
null
CVE-2026-23097
migrate: correct lock ordering for hugetlb file folios
In the Linux kernel, the following vulnerability has been resolved: migrate: correct lock ordering for hugetlb file folios Syzbot has found a deadlock (analyzed by Lance Yang): 1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock). 2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire folio_lock. migrate_pages() -> migrate_hugetlbs() -> unmap_and_move_huge_page() <- Takes folio_lock! -> remove_migration_ptes() -> __rmap_walk_file() -> i_mmap_lock_read() <- Waits for i_mmap_rwsem(read lock)! hugetlbfs_fallocate() -> hugetlbfs_punch_hole() <- Takes i_mmap_rwsem(write lock)! -> hugetlbfs_zero_partial_page() -> filemap_lock_hugetlb_folio() -> filemap_lock_folio() -> __filemap_get_folio <- Waits for folio_lock! The migration path is the one taking locks in the wrong order according to the documentation at the top of mm/rmap.c. So expand the scope of the existing i_mmap_lock to cover the calls to remove_migration_ptes() too. This is (mostly) how it used to be after commit c0d0381ade79. That was removed by 336bf30eb765 for both file & anon hugetlb pages when it should only have been removed for anon hugetlb pages.
[]
null
null
null
null
null
GHSA-p4xq-57qv-f9c5
Luxion KeyShot 3DS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23681.
[]
null
null
7.8
null
null
CVE-2024-41476
AMTT Hotel Broadband Operation System (HiBOS) V3.0.3.151204 and before is vulnerable to SQL Injection via /manager/card/card_detail.php.
[ "cpe:2.3:a:amttgroup:hotel_broadband_operation_system:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2023-50110
TestLink through 1.9.20 allows type juggling for authentication bypass because === is not used.
[ "cpe:2.3:a:testlink:testlink:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null