cve_id
stringlengths 13
16
| description
stringlengths 15
4k
| date
stringdate 1999-09-29 00:00:00
2026-01-05 00:00:00
| cwe_id
int64 5
1.43k
| cwe_description
stringlengths 1
837
⌀ | cvss_av
stringclasses 4
values | cvss_ac
stringclasses 2
values | cvss_pr
stringclasses 3
values | cvss_ui
stringclasses 2
values | cvss_s
stringclasses 2
values | cvss_c
stringclasses 3
values | cvss_i
stringclasses 3
values | cvss_a
stringclasses 3
values | cwe_variant_id
float64 5
1.39k
⌀ | cwe_base_id
float64 15
1.43k
⌀ | cwe_class_id
float64 20
1.42k
⌀ | cwe_pillar_id
float64 284
710
⌀ | cwe_variant_name
stringclasses 176
values | cwe_base_name
stringclasses 393
values | cwe_class_name
stringclasses 108
values | cwe_pillar_name
stringclasses 10
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2025-31580
|
Missing Authorization vulnerability in Anzar Ahmed Ni WooCommerce Product Enquiry allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Ni WooCommerce Product Enquiry: from n/a through 4.1.8.
|
2025-04-01
| 862
|
CWE-862 Missing Authorization
|
Network
|
Low
|
None
|
None
|
Unchanged
|
None
|
High
|
None
| null | null | 862
| 284
| null | null |
CWE-862: Missing Authorization
|
CWE-284: Improper Access Control
|
CVE-2023-42000
|
Arcserve UDP prior to 9.2 contains a path traversal vulnerability in com.ca.arcflash.ui.server.servlet.FileHandlingServlet.doUpload(). An unauthenticated remote attacker can exploit it to upload arbitrary files to any location on the file system where the UDP agent is installed.
|
2023-11-27
| 22
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | 22
| 706
| 664
| null |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
CWE-706: Use of Incorrectly-Resolved Name or Reference
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-33929
|
Missing Authorization vulnerability in wpWax Directorist.This issue affects Directorist: from n/a through 7.8.6.
|
2024-05-03
| 862
|
CWE-862 Missing Authorization
|
Network
|
Low
|
None
|
None
|
Unchanged
|
None
|
Low
|
None
| null | null | 862
| 284
| null | null |
CWE-862: Missing Authorization
|
CWE-284: Improper Access Control
|
CVE-2024-33659
|
AMI APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Input Validation by a local attacker. Successful exploitation of these vulnerabilities may lead to overwriting arbitrary memory and execute arbitrary code at SMM level, also impacting Confidentiality, Integrity, and Availability.
|
2025-02-11
| 20
|
CWE-20 Improper Input Validation
|
Local
|
High
|
High
|
None
|
Unchanged
|
Low
|
High
|
High
| null | null | 20
| 707
| null | null |
CWE-20: Improper Input Validation
|
CWE-707: Improper Neutralization
|
CVE-2021-21940
|
A heap-based buffer overflow vulnerability exists in the pushMuxer processRtspInfo functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted network packet can lead to a heap buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
|
2021-10-12
| 122
|
CWE-122: Heap-based Buffer Overflow
|
Network
|
Low
|
None
|
None
|
Changed
|
High
|
High
|
High
| 122
| 788
| 119
| 664
|
CWE-122: Heap-based Buffer Overflow
|
CWE-788: Access of Memory Location After End of Buffer
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2023-50935
|
IBM PowerSC 1.3, 2.0, and 2.1 fails to properly restrict access to a URL or resource, which may allow a remote attacker to obtain unauthorized access to application functionality and/or resources. IBM X-Force ID: 275115.
|
2024-02-02
| 425
|
CWE-425 Direct Request ('Forced Browsing')
|
Network
|
Low
|
None
|
None
|
Unchanged
|
Low
|
Low
|
None
| null | 425
| 862
| 284
| null |
CWE-425: Direct Request ('Forced Browsing')
|
CWE-862: Missing Authorization
|
CWE-284: Improper Access Control
|
CVE-2023-7059
|
A vulnerability was found in SourceCodester School Visitor Log e-Book 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file log-book.php. The manipulation of the argument Full Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248750 is the identifier assigned to this vulnerability.
|
2023-12-22
| 79
|
CWE-79 Cross Site Scripting
|
Network
|
Low
|
Low
|
Required
|
Unchanged
|
None
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-21918
|
A memory buffer vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory and triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
|
2024-03-26
| 416
|
CWE-416 Use After Free
|
Local
|
Low
|
None
|
Required
|
Unchanged
|
High
|
High
|
High
| 416
| 825
| 672
| 664
|
CWE-416: Use After Free
|
CWE-825: Expired Pointer Dereference
|
CWE-672: Operation on a Resource after Expiration or Release
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-57184
|
An issue was discovered in GPAC v0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer overflow in gf_m2ts_process_pmt in media_tools/mpegts.c:2163 that can cause a denial of service (DOS) via a crafted MP4 file.
|
2025-01-24
| 120
| null |
Local
|
Low
|
None
|
Required
|
Unchanged
|
None
|
None
|
High
| null | 120
| 119
| 707
| null |
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-707: Improper Neutralization
|
CVE-2024-10994
|
A vulnerability has been found in Codezips Online Institute Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit_user.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
2024-11-08
| 434
|
Unrestricted Upload | Improper Access Controls
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
Low
|
Low
|
Low
| null | 434
| 669
| 664
| null |
CWE-434: Unrestricted Upload of File with Dangerous Type
|
CWE-669: Incorrect Resource Transfer Between Spheres
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-21934
|
In the Linux kernel, the following vulnerability has been resolved:
rapidio: fix an API misues when rio_add_net() fails
rio_add_net() calls device_register() and fails when device_register()
fails. Thus, put_device() should be used rather than kfree(). Add
"mport->net = NULL;" to avoid a use after free issue.
|
2025-04-01
| 416
|
CWE-416 Use After Free
|
Local
|
Low
|
Low
|
None
|
Unchanged
|
High
|
High
|
High
| 416
| 825
| 672
| 664
|
CWE-416: Use After Free
|
CWE-825: Expired Pointer Dereference
|
CWE-672: Operation on a Resource after Expiration or Release
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-37429
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hamid Alinia – idehweb Login with phone number allows Stored XSS.This issue affects Login with phone number: from n/a through 1.7.35.
|
2024-07-22
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
|
Network
|
Low
|
High
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2023-42832
|
A race condition was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to gain root privileges.
|
2024-01-10
| 362
|
An app may be able to gain root privileges
|
Local
|
High
|
None
|
Required
|
Unchanged
|
High
|
High
|
High
| null | null | 362
| 691
| null | null |
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
|
CWE-691: Insufficient Control Flow Management
|
CVE-2022-27581
|
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
|
2022-12-13
| 327
|
CWE-327
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
High
|
None
|
None
| null | null | 327
| 693
| null | null |
CWE-327: Use of a Broken or Risky Cryptographic Algorithm
|
CWE-693: Protection Mechanism Failure
|
CVE-2021-38315
|
The SP Project & Document Manager WordPress plugin is vulnerable to attribute-based Reflected Cross-Site Scripting via the from and to parameters in the ~/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.25.
|
2021-08-16
| 79
|
CWE-79 Cross-site Scripting (XSS)
|
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2022-44585
|
Cross-Site Request Forgery (CSRF) vulnerability in Magneticlab Sàrl Homepage Pop-up plugin <= 1.2.5 versions.
|
2023-02-02
| 352
|
CWE-352 Cross-Site Request Forgery (CSRF)
|
Network
|
Low
|
None
|
Required
|
Unchanged
|
None
|
Low
|
Low
| null | null | 345
| 693
| null | null |
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2022-3699
|
A privilege escalation vulnerability was reported in the Lenovo HardwareScanPlugin prior to version 1.3.1.2 and Lenovo Diagnostics prior to version 4.45
that could allow a local user to execute code with elevated privileges.
|
2023-10-24
| 787
|
CWE-787 Out-of-bounds Write
|
Local
|
Low
|
Low
|
None
|
Unchanged
|
High
|
High
|
High
| null | 787
| 119
| 664
| null |
CWE-787: Out-of-bounds Write
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-47467
|
Missing Authorization vulnerability in GS Plugins GS Testimonial Slider allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects GS Testimonial Slider: from n/a through 3.3.0.
|
2025-05-07
| 862
|
CWE-862 Missing Authorization
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
None
|
Low
|
None
| null | null | 862
| 284
| null | null |
CWE-862: Missing Authorization
|
CWE-284: Improper Access Control
|
CVE-2021-39850
|
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
2021-09-29
| 476
|
NULL Pointer Dereference (CWE-476)
|
Local
|
Low
|
None
|
Required
|
Unchanged
|
None
|
None
|
High
| null | 476
| 754
| 710
| null |
CWE-476: NULL Pointer Dereference
|
CWE-754: Improper Check for Unusual or Exceptional Conditions
|
CWE-710: Improper Adherence to Coding Standards
|
CVE-2024-31123
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebDorado SpiderFAQ allows Reflected XSS.This issue affects SpiderFAQ: from n/a through 1.3.2.
|
2024-03-31
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2025-6540
|
The web-cam plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘slug’ parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
2025-06-26
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
Low
|
None
|
Changed
|
Low
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2023-37218
|
Tadiran Telecom Aeonix - CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
2023-07-30
| 22
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
None
|
None
| null | 22
| 706
| 664
| null |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
CWE-706: Use of Incorrectly-Resolved Name or Reference
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-21591
|
An Out-of-bounds Write vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS), or Remote Code Execution (RCE) and obtain root privileges on the device.
This issue is caused by use of an insecure function allowing an attacker to overwrite arbitrary memory.
This issue affects Juniper Networks Junos OS SRX Series and EX Series:
* Junos OS versions earlier than 20.4R3-S9;
* Junos OS 21.2 versions earlier than 21.2R3-S7;
* Junos OS 21.3 versions earlier than 21.3R3-S5;
* Junos OS 21.4 versions earlier than 21.4R3-S5;
* Junos OS 22.1 versions earlier than 22.1R3-S4;
* Junos OS 22.2 versions earlier than 22.2R3-S3;
* Junos OS 22.3 versions earlier than 22.3R3-S2;
* Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3.
|
2024-01-12
| 787
|
CWE-787 Out-of-bounds Write
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | 787
| 119
| 664
| null |
CWE-787: Out-of-bounds Write
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-39864
|
The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is considered disabled when integration.api.port is set to 0 or negative. Due to an improper initialisation logic, the integration API service would listen on a random port when its port value is set to 0 (default value). An attacker that can access the CloudStack management network could scan and find the randomised integration API service port and exploit it to perform unauthorised administrative actions and perform remote code execution on CloudStack managed hosts and result in complete compromise of the confidentiality, integrity, and availability of CloudStack managed infrastructure.
Users are recommended to restrict the network access on the CloudStack management server hosts to only essential ports. Users are recommended to upgrade to version 4.18.2.1, 4.19.0.2 or later, which addresses this issue.
|
2024-07-05
| 665
|
CWE-665 Improper Initialization | CWE-94 Improper Control of Generation of Code ('Code Injection')
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | null | 665
| 664
| null | null |
CWE-665: Improper Initialization
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-30904
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Chartify allows Stored XSS. This issue affects Chartify: from n/a through 3.1.7.
|
2025-03-27
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
High
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-53218
|
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix race in concurrent f2fs_stop_gc_thread
In my test case, concurrent calls to f2fs shutdown report the following
stack trace:
Oops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI
CPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85
Call Trace:
<TASK>
? show_regs+0x8b/0xa0
? __die_body+0x26/0xa0
? die_addr+0x54/0x90
? exc_general_protection+0x24b/0x5c0
? asm_exc_general_protection+0x26/0x30
? kthread_stop+0x46/0x390
f2fs_stop_gc_thread+0x6c/0x110
f2fs_do_shutdown+0x309/0x3a0
f2fs_ioc_shutdown+0x150/0x1c0
__f2fs_ioctl+0xffd/0x2ac0
f2fs_ioctl+0x76/0xe0
vfs_ioctl+0x23/0x60
__x64_sys_ioctl+0xce/0xf0
x64_sys_call+0x2b1b/0x4540
do_syscall_64+0xa7/0x240
entry_SYSCALL_64_after_hwframe+0x76/0x7e
The root cause is a race condition in f2fs_stop_gc_thread() called from
different f2fs shutdown paths:
[CPU0] [CPU1]
---------------------- -----------------------
f2fs_stop_gc_thread f2fs_stop_gc_thread
gc_th = sbi->gc_thread
gc_th = sbi->gc_thread
kfree(gc_th)
sbi->gc_thread = NULL
< gc_th != NULL >
kthread_stop(gc_th->f2fs_gc_task) //UAF
The commit c7f114d864ac ("f2fs: fix to avoid use-after-free in
f2fs_stop_gc_thread()") attempted to fix this issue by using a read
semaphore to prevent races between shutdown and remount threads, but
it fails to prevent all race conditions.
Fix it by converting to write lock of s_umount in f2fs_do_shutdown().
|
2024-12-27
| 416
|
CWE-416 Use After Free
|
Local
|
Low
|
Low
|
None
|
Unchanged
|
High
|
High
|
High
| 416
| 825
| 672
| 664
|
CWE-416: Use After Free
|
CWE-825: Expired Pointer Dereference
|
CWE-672: Operation on a Resource after Expiration or Release
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2022-0472
|
Unrestricted Upload of File with Dangerous Type in Packagist jsdecena/laracom prior to v2.0.9.
|
2022-02-04
| 434
|
CWE-434 Unrestricted Upload of File with Dangerous Type
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
High
|
High
|
None
| null | 434
| 669
| 664
| null |
CWE-434: Unrestricted Upload of File with Dangerous Type
|
CWE-669: Incorrect Resource Transfer Between Spheres
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2021-4472
|
The mistral-dashboard plugin for openstack has a local file inclusion vulnerability through the 'Create Workbook' feature that may result in disclosure of arbitrary local files content.
|
2025-11-26
| 73
|
External Control of File Name or Path
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
High
|
None
|
None
| null | 73
| 642
| 664
| null |
CWE-73: External Control of File Name or Path
|
CWE-642: External Control of Critical State Data
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2015-10079
|
A vulnerability was found in juju2143 WalrusIRC 0.0.2. It has been rated as problematic. This issue affects the function parseLinks of the file public/parser.js. The manipulation of the argument text leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 0.0.3 is able to address this issue. The patch is named 45fd885895ae13e8d9b3a71e89d59768914f60af. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220751.
|
2023-02-13
| 79
|
CWE-79 Cross Site Scripting
|
Network
|
Low
|
Low
|
Required
|
Unchanged
|
None
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2025-3797
|
A vulnerability classified as critical was found in SeaCMS up to 13.3. This vulnerability affects unknown code of the file /admin_topic.php?action=delall. The manipulation of the argument e_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
2025-04-19
| 89
|
SQL Injection | Injection
|
Network
|
Low
|
High
|
None
|
Unchanged
|
Low
|
Low
|
Low
| null | 89
| 943
| 707
| null |
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
CWE-943: Improper Neutralization of Special Elements in Data Query Logic
|
CWE-707: Improper Neutralization
|
CVE-2023-38366
|
IBM Filenet Content Manager Component 5.5.8.0, 5.5.10.0, and 5.5.11.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 261115.
|
2024-03-01
| 22
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
Network
|
Low
|
None
|
None
|
Unchanged
|
Low
|
None
|
None
| null | 22
| 706
| 664
| null |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
CWE-706: Use of Incorrectly-Resolved Name or Reference
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2020-28617
|
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_vertex() vh->sfaces_last().
|
2022-04-18
| 129
|
CWE-129: Improper Validation of Array Index
|
Network
|
Low
|
None
|
None
|
Changed
|
High
|
High
|
High
| 129
| 1,285
| 20
| 707
|
CWE-129: Improper Validation of Array Index
|
CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input
|
CWE-20: Improper Input Validation
|
CWE-707: Improper Neutralization
|
CVE-2026-21447
|
Bagisto is an open source laravel eCommerce platform. Prior to version 2.3.10, an Insecure Direct Object Reference vulnerability in the customer order reorder function allows any authenticated customer to add items from another customer's order to their own shopping cart by manipulating the order ID parameter. This exposes sensitive purchase information and enables potential fraud. Version 2.3.10 patches the issue.
|
2026-01-02
| 284
|
CWE-284: Improper Access Control | CWE-639: Authorization Bypass Through User-Controlled Key
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
High
|
Low
|
None
| null | null | null | 284
| null | null | null |
CWE-284: Improper Access Control
|
CVE-2025-49715
|
Exposure of private personal information to an unauthorized actor in Dynamics 365 FastTrack Implementation Assets allows an unauthorized attacker to disclose information over a network.
|
2025-06-20
| 359
|
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
None
|
None
| null | 359
| 200
| 664
| null |
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
|
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-54542
|
QuickCMS sends password and login via GET Request. This allows a local attacker with access to the victim's browser history to obtain the necessary credentials to log in as the user.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
|
2025-08-28
| 598
|
CWE-598 Use of GET Request Method With Sensitive Query Strings
|
Local
|
Low
|
None
|
None
|
Unchanged
|
High
|
None
|
None
| 598
| 201
| 200
| 664
|
CWE-598: Use of GET Request Method With Sensitive Query Strings
|
CWE-201: Insertion of Sensitive Information Into Sent Data
|
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2022-3720
|
The Event Monster WordPress plugin before 1.2.0 does not validate and escape some parameters before using them in SQL statements, which could lead to SQL Injection exploitable by high privilege users
|
2022-11-21
| 89
|
CWE-89 SQL Injection
|
Network
|
Low
|
High
|
None
|
Unchanged
|
High
|
High
|
High
| null | 89
| 943
| 707
| null |
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
CWE-943: Improper Neutralization of Special Elements in Data Query Logic
|
CWE-707: Improper Neutralization
|
CVE-2021-4248
|
A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 is able to address this issue. The name of the patch is cf7105aa2aae90d6656088fe5a8ee1d5730773b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188.
|
2022-12-18
| 330
|
CWE-330 Insufficiently Random Values -> CWE-331 Insufficient Entropy -> CWE-332 Insufficient Entropy in PRNG
|
Network
|
High
|
None
|
None
|
Unchanged
|
Low
|
Low
|
Low
| null | null | 330
| 693
| null | null |
CWE-330: Use of Insufficiently Random Values
|
CWE-693: Protection Mechanism Failure
|
CVE-2024-51675
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in aThemes aThemes Addons for Elementor allows DOM-Based XSS.This issue affects aThemes Addons for Elementor: from n/a through 1.0.7.
|
2024-11-09
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
|
Network
|
Low
|
Low
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2025-63402
|
An issue in HCL Technologies Limited HCLTech GRAGON before v.7.6.0 allows a remote attacker to execute arbitrary code via APIs do not enforcing limits on the number or size of requests
|
2025-12-03
| 770
| null |
Network
|
High
|
High
|
None
|
Unchanged
|
Low
|
High
|
Low
| null | 770
| 400
| 664
| null |
CWE-770: Allocation of Resources Without Limits or Throttling
|
CWE-400: Uncontrolled Resource Consumption
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-49013
|
SQL Server Native Client Remote Code Execution Vulnerability
|
2024-11-12
| 122
|
CWE-122: Heap-based Buffer Overflow
|
Network
|
Low
|
None
|
Required
|
Unchanged
|
High
|
High
|
High
| 122
| 788
| 119
| 664
|
CWE-122: Heap-based Buffer Overflow
|
CWE-788: Access of Memory Location After End of Buffer
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-65501
|
Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.
|
2025-11-24
| 476
| null |
Network
|
Low
|
None
|
Required
|
Unchanged
|
None
|
None
|
Low
| null | 476
| 754
| 710
| null |
CWE-476: NULL Pointer Dereference
|
CWE-754: Improper Check for Unusual or Exceptional Conditions
|
CWE-710: Improper Adherence to Coding Standards
|
CVE-2025-45779
|
Tenda AC10 V1.0re_V15.03.06.46 is vulnerable to Buffer Overflow in the formSetPPTPUserList handler via the list POST parameter.
|
2025-05-12
| 120
| null |
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | 120
| 119
| 707
| null |
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-707: Improper Neutralization
|
CVE-2025-34280
|
Nagios Network Analyzer versions prior to 2024R2.0.1 contain a vulnerability in the LDAP certificate management functionality whereby the certificate removal operation fails to apply adequate input sanitation. An authenticated administrator can trigger command execution on the underlying host in the context of the web application service, resulting in remote code execution with the service's privileges.
|
2025-10-30
| 78
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
Network
|
Low
|
High
|
None
|
Unchanged
|
High
|
High
|
High
| null | 78
| 77
| 707
| null |
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
|
CWE-707: Improper Neutralization
|
CVE-2019-5148
|
An exploitable denial-of-service vulnerability exists in ServiceAgent functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability.
|
2020-02-25
| 125
|
CWE-125: Out-of-bounds Read
|
Network
|
Low
|
None
|
None
|
Unchanged
|
None
|
None
|
High
| null | 125
| 119
| 664
| null |
CWE-125: Out-of-bounds Read
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2022-1346
|
Multiple Stored XSS in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.
|
2022-04-13
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
Low
|
Required
|
Changed
|
High
|
High
|
High
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2023-24320
|
An access control issue in Axcora POS #0~gitf77ec09 allows unauthenticated attackers to execute arbitrary commands via unspecified vectors.
|
2023-02-21
| 284
| null |
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | null | null | 284
| null | null | null |
CWE-284: Improper Access Control
|
CVE-2024-20297
|
A vulnerability in the AnyConnect firewall for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should have been denied to flow through an affected device. This vulnerability is due to a logic error in populating group ACLs when an AnyConnect client establishes a new session toward an affected device. An attacker could exploit this vulnerability by establishing an AnyConnect connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.
|
2024-10-23
| 290
|
Authentication Bypass by Spoofing
|
Network
|
Low
|
None
|
None
|
Changed
|
None
|
Low
|
None
| null | 290
| 1,390
| 284
| null |
CWE-290: Authentication Bypass by Spoofing
|
CWE-1390: Weak Authentication
|
CWE-284: Improper Access Control
|
CVE-2025-34262
|
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devices/name/{agent_id} endpoint. When an authenticated user renames a device, the new_name value is stored and later rendered in device listings or detail views without proper HTML sanitation. An attacker can inject malicious script into the device name, which is then executed in the browser context of users who view or interact with the affected device, potentially enabling session compromise and unauthorized actions as the victim.
|
2025-12-05
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
|
Network
|
Low
|
Low
|
Required
|
Unchanged
|
Low
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2023-26291
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Cloud Security Gateway (CSG) Portal on Web Cloud Security Gateway, Email Security Cloud (login_form.mhtml modules), Forcepoint Web Security Portal on Hybrid (login_form.mhtml modules) allows Reflected XSS.This issue affects Cloud Security Gateway (CSG): before 03/29/2023; Web Security: before 03/29/2023.
|
2023-03-29
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-29269
|
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
|
2024-04-10
| 77
| null |
Adjacent Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | null | 77
| 707
| null | null |
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
|
CWE-707: Improper Neutralization
|
CVE-2021-43787
|
Nodebb is an open source Node.js based forum software. In affected versions a prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possible.
|
2021-11-29
| 1,321
|
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
Network
|
Low
|
Low
|
Required
|
Changed
|
High
|
High
|
High
| 1,321
| 915
| 913
| 664
|
CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes
|
CWE-913: Improper Control of Dynamically-Managed Code Resources
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-1333
|
IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10 and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user.
|
2025-05-01
| 214
|
CWE-214 Invocation of Process Using Visible Sensitive Information
|
Local
|
Low
|
High
|
None
|
Changed
|
High
|
None
|
None
| null | 214
| 200
| 664
| null |
CWE-214: Invocation of Process Using Visible Sensitive Information
|
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2022-42311
|
Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
|
2022-11-01
| 770
|
unknown
|
Local
|
Low
|
Low
|
None
|
Changed
|
None
|
None
|
High
| null | 770
| 400
| 664
| null |
CWE-770: Allocation of Resources Without Limits or Throttling
|
CWE-400: Uncontrolled Resource Consumption
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2022-32938
|
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. A shortcut may be able to check the existence of an arbitrary path on the file system.
|
2022-11-01
| 22
|
A shortcut may be able to check the existence of an arbitrary path on the file system
|
Network
|
Low
|
None
|
None
|
Unchanged
|
Low
|
None
|
None
| null | 22
| 706
| 664
| null |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
CWE-706: Use of Incorrectly-Resolved Name or Reference
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2023-47166
|
A firmware update vulnerability exists in the luci2-io file-import functionality of Milesight UR32L v32.3.0.7-r2. A specially crafted network request can lead to arbitrary firmware update. An attacker can send a network request to trigger this vulnerability.
|
2024-05-01
| 285
|
CWE-285: Improper Authorization
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
High
|
High
|
High
| null | null | 285
| 284
| null | null |
CWE-285: Improper Authorization
|
CWE-284: Improper Access Control
|
CVE-2022-38932
|
readelf in ToaruOS 2.0.1 has a global overflow allowing RCE when parsing a crafted ELF file.
|
2022-09-27
| 787
| null |
Local
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | 787
| 119
| 664
| null |
CWE-787: Out-of-bounds Write
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2023-2930
|
Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
2023-05-30
| 416
|
Use after free
|
Network
|
Low
|
None
|
Required
|
Unchanged
|
High
|
High
|
High
| 416
| 825
| 672
| 664
|
CWE-416: Use After Free
|
CWE-825: Expired Pointer Dereference
|
CWE-672: Operation on a Resource after Expiration or Release
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-46457
|
Cross-Site Request Forgery (CSRF) vulnerability in digontoahsan Wp Custom CMS Block allows Stored XSS. This issue affects Wp Custom CMS Block: from n/a through 2.1.
|
2025-04-24
| 352
|
CWE-352 Cross-Site Request Forgery (CSRF)
|
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | null | 345
| 693
| null | null |
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2025-5320
|
A vulnerability classified as problematic has been found in gradio-app gradio up to 5.29.1. This affects the function is_valid_origin of the component CORS Handler. The manipulation of the argument localhost_aliases leads to erweiterte Rechte. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
2025-05-29
| 345
|
Origin Validation Error | Insufficient Verification of Data Authenticity
|
Network
|
High
|
None
|
None
|
Unchanged
|
None
|
Low
|
None
| null | null | 345
| 693
| null | null |
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2024-39382
|
After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
2024-09-13
| 125
|
Out-of-bounds Read (CWE-125)
|
Local
|
Low
|
None
|
Required
|
Unchanged
|
High
|
None
|
None
| null | 125
| 119
| 664
| null |
CWE-125: Out-of-bounds Read
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-11033
|
A Denial of Service (DoS) vulnerability exists in the file upload feature of binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this vulnerability by sending a payload with an excessively large filename, causing the server to become overwhelmed and unavailable for legitimate users.
|
2025-03-20
| 400
|
CWE-400 Uncontrolled Resource Consumption
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
None
|
None
|
High
| null | null | 400
| 664
| null | null |
CWE-400: Uncontrolled Resource Consumption
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2023-36912
|
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
|
2023-08-08
| 20
|
CWE-20: Improper Input Validation
|
Network
|
Low
|
None
|
None
|
Unchanged
|
None
|
None
|
High
| null | null | 20
| 707
| null | null |
CWE-20: Improper Input Validation
|
CWE-707: Improper Neutralization
|
CVE-2025-20248
|
A vulnerability in the installation process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR Software image signature verification and load unsigned software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.
This vulnerability is due to incomplete validation of files during the installation of an .iso file. An attacker could exploit this vulnerability by modifying contents of the .iso image and then installing and activating it on the device. A successful exploit could allow the attacker to load an unsigned file as part of the image activation process.
|
2025-09-10
| 347
|
Improper Verification of Cryptographic Signature
|
Local
|
Low
|
High
|
None
|
Unchanged
|
High
|
High
|
None
| null | 347
| 345
| 693
| null |
CWE-347: Improper Verification of Cryptographic Signature
|
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2019-6737
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIScript. The issue lies in the handling of the openFile method, which allows for an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability execute code in the context of the current process. Was ZDI-CAN-7247.
|
2019-06-03
| 356
|
CWE-356: Product UI does not Warn User of Unsafe Actions
|
Network
|
Low
|
None
|
Required
|
Unchanged
|
High
|
High
|
High
| null | 356
| 221
| 664
| null |
CWE-356: Product UI does not Warn User of Unsafe Actions
|
CWE-221: Information Loss or Omission
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-46530
|
Cross-Site Request Forgery (CSRF) vulnerability in HuangYe WuDeng Hacklog Remote Attachment allows Stored XSS. This issue affects Hacklog Remote Attachment: from n/a through 1.3.2.
|
2025-04-24
| 352
|
CWE-352 Cross-Site Request Forgery (CSRF)
|
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | null | 345
| 693
| null | null |
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2025-0207
|
A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
2025-01-04
| 89
|
SQL Injection | Injection
|
Network
|
Low
|
None
|
None
|
Unchanged
|
Low
|
Low
|
Low
| null | 89
| 943
| 707
| null |
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
CWE-943: Improper Neutralization of Special Elements in Data Query Logic
|
CWE-707: Improper Neutralization
|
CVE-2025-60950
|
An arbitrary file upload vulnerability in the Data Preparation function of AIxBlock commit f60975 allows attackers to execute arbitrary code via a crafted SVG file.
|
2025-10-30
| 79
| null |
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-1930
|
No Limit on Number of Open Sessions / Bad Session Close Behaviour in dnf5daemon-server before 5.1.17 allows a malicious user to impact Availability via No Limit on Number of Open Sessions.
There is no limit on how many sessions D-Bus clients may create using the `open_session()` D-Bus method. For each session a thread is created in dnf5daemon-server. This spends a couple of hundred megabytes of memory in the process. Further connections will become impossible, likely because no more threads can be spawned by the D-Bus service.
|
2024-05-08
| 400
|
CWE-400 Uncontrolled Resource Consumption
|
Local
|
Low
|
Low
|
None
|
Changed
|
None
|
None
|
High
| null | null | 400
| 664
| null | null |
CWE-400: Uncontrolled Resource Consumption
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-6903
|
A vulnerability, which was classified as critical, has been found in SourceCodester Record Management System 1.0. Affected by this issue is some unknown functionality of the file sort1_user.php. The manipulation of the argument position leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271928.
|
2024-07-19
| 89
|
CWE-89 SQL Injection
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
Low
|
Low
|
Low
| null | 89
| 943
| 707
| null |
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
CWE-943: Improper Neutralization of Special Elements in Data Query Logic
|
CWE-707: Improper Neutralization
|
CVE-2023-37297
|
AMI’s
SPx contains a vulnerability in the BMC where an Attacker may
cause a heap memory corruption via an adjacent network. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
|
2024-01-09
| 122
|
CWE-122 Heap-based Buffer Overflow
|
Adjacent Network
|
High
|
None
|
None
|
Changed
|
High
|
High
|
High
| 122
| 788
| 119
| 664
|
CWE-122: Heap-based Buffer Overflow
|
CWE-788: Access of Memory Location After End of Buffer
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2003-20001
|
An issue was discovered on Mitel ICP VoIP 3100 devices. When a remote user attempts to log in via TELNET during the login wait time and an external call comes in, the system incorrectly divulges information about the call and any SMDR records generated by the system. The information provided includes the service type, extension number and other parameters, related to the call activity.
|
2025-04-01
| 200
| null |
Network
|
High
|
None
|
None
|
Unchanged
|
Low
|
Low
|
Low
| null | null | 200
| 664
| null | null |
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-31813
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Website366.com WPSHARE247 Elementor Addons allows Stored XSS. This issue affects WPSHARE247 Elementor Addons: from n/a through 2.1.
|
2025-04-01
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
Low
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-56658
|
In the Linux kernel, the following vulnerability has been resolved:
net: defer final 'struct net' free in netns dismantle
Ilya reported a slab-use-after-free in dst_destroy [1]
Issue is in xfrm6_net_init() and xfrm4_net_init() :
They copy xfrm[46]_dst_ops_template into net->xfrm.xfrm[46]_dst_ops.
But net structure might be freed before all the dst callbacks are
called. So when dst_destroy() calls later :
if (dst->ops->destroy)
dst->ops->destroy(dst);
dst->ops points to the old net->xfrm.xfrm[46]_dst_ops, which has been freed.
See a relevant issue fixed in :
ac888d58869b ("net: do not delay dst_entries_add() in dst_release()")
A fix is to queue the 'struct net' to be freed after one
another cleanup_net() round (and existing rcu_barrier())
[1]
BUG: KASAN: slab-use-after-free in dst_destroy (net/core/dst.c:112)
Read of size 8 at addr ffff8882137ccab0 by task swapper/37/0
Dec 03 05:46:18 kernel:
CPU: 37 UID: 0 PID: 0 Comm: swapper/37 Kdump: loaded Not tainted 6.12.0 #67
Hardware name: Red Hat KVM/RHEL, BIOS 1.16.1-1.el9 04/01/2014
Call Trace:
<IRQ>
dump_stack_lvl (lib/dump_stack.c:124)
print_address_description.constprop.0 (mm/kasan/report.c:378)
? dst_destroy (net/core/dst.c:112)
print_report (mm/kasan/report.c:489)
? dst_destroy (net/core/dst.c:112)
? kasan_addr_to_slab (mm/kasan/common.c:37)
kasan_report (mm/kasan/report.c:603)
? dst_destroy (net/core/dst.c:112)
? rcu_do_batch (kernel/rcu/tree.c:2567)
dst_destroy (net/core/dst.c:112)
rcu_do_batch (kernel/rcu/tree.c:2567)
? __pfx_rcu_do_batch (kernel/rcu/tree.c:2491)
? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4339 kernel/locking/lockdep.c:4406)
rcu_core (kernel/rcu/tree.c:2825)
handle_softirqs (kernel/softirq.c:554)
__irq_exit_rcu (kernel/softirq.c:589 kernel/softirq.c:428 kernel/softirq.c:637)
irq_exit_rcu (kernel/softirq.c:651)
sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1049 arch/x86/kernel/apic/apic.c:1049)
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702)
RIP: 0010:default_idle (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:92 arch/x86/kernel/process.c:743)
Code: 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 6e ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 0f 00 2d c7 c9 27 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90
RSP: 0018:ffff888100d2fe00 EFLAGS: 00000246
RAX: 00000000001870ed RBX: 1ffff110201a5fc2 RCX: ffffffffb61a3e46
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffb3d4d123
RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed11c7e1835d
R10: ffff888e3f0c1aeb R11: 0000000000000000 R12: 0000000000000000
R13: ffff888100d20000 R14: dffffc0000000000 R15: 0000000000000000
? ct_kernel_exit.constprop.0 (kernel/context_tracking.c:148)
? cpuidle_idle_call (kernel/sched/idle.c:186)
default_idle_call (./include/linux/cpuidle.h:143 kernel/sched/idle.c:118)
cpuidle_idle_call (kernel/sched/idle.c:186)
? __pfx_cpuidle_idle_call (kernel/sched/idle.c:168)
? lock_release (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5848)
? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406)
? tsc_verify_tsc_adjust (arch/x86/kernel/tsc_sync.c:59)
do_idle (kernel/sched/idle.c:326)
cpu_startup_entry (kernel/sched/idle.c:423 (discriminator 1))
start_secondary (arch/x86/kernel/smpboot.c:202 arch/x86/kernel/smpboot.c:282)
? __pfx_start_secondary (arch/x86/kernel/smpboot.c:232)
? soft_restart_cpu (arch/x86/kernel/head_64.S:452)
common_startup_64 (arch/x86/kernel/head_64.S:414)
</TASK>
Dec 03 05:46:18 kernel:
Allocated by task 12184:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69)
__kasan_slab_alloc (mm/kasan/common.c:319 mm/kasan/common.c:345)
kmem_cache_alloc_noprof (mm/slub.c:4085 mm/slub.c:4134 mm/slub.c:4141)
copy_net_ns (net/core/net_namespace.c:421 net/core/net_namespace.c:480)
create_new_namespaces
---truncated---
|
2024-12-27
| 416
|
CWE-416 Use After Free
|
Local
|
Low
|
Low
|
None
|
Unchanged
|
High
|
High
|
High
| 416
| 825
| 672
| 664
|
CWE-416: Use After Free
|
CWE-825: Expired Pointer Dereference
|
CWE-672: Operation on a Resource after Expiration or Release
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2021-43074
|
An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7.0.1 and below, 2.0.7 and below, 1.2 all versions, 1.1 all versions, 1.0 all versions may allow an attacker to decrypt portions of the administrative session management cookie if able to intercept the latter.
|
2023-02-16
| 347
|
Information disclosure
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
Low
|
None
|
None
| null | 347
| 345
| 693
| null |
CWE-347: Improper Verification of Cryptographic Signature
|
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2023-27427
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NTZApps CRM Memberships plugin <= 1.6 versions.
|
2023-06-23
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
High
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-48838
|
Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) a Files or Directories Accessible to External Parties vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker.
|
2024-11-12
| 552
|
CWE-552: Files or Directories Accessible to External Parties
|
Local
|
Low
|
Low
|
None
|
Unchanged
|
Low
|
None
|
None
| null | 552
| 668
| 664
| null |
CWE-552: Files or Directories Accessible to External Parties
|
CWE-668: Exposure of Resource to Wrong Sphere
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2022-32543
|
An integer overflow vulnerability exists in the way ESTsoft Alyac 2.5.8.544 parses OLE files. A specially-crafted OLE file can lead to a heap buffer overflow which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
2022-08-05
| 680
|
CWE-680: Integer Overflow to Buffer Overflow
|
Local
|
Low
|
Low
|
Required
|
Unchanged
|
High
|
High
|
High
| null | 190
| 20
| 682
| null |
CWE-190: Integer Overflow or Wraparound
|
CWE-20: Improper Input Validation
|
CWE-682: Incorrect Calculation
|
CVE-2024-5858
|
The AI Infographic Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the qcld_openai_title_generate_desc AJAX action in all versions up to, and including, 4.7.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary post titles.
|
2024-06-15
| 862
|
CWE-862 Missing Authorization
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
None
|
Low
|
None
| null | null | 862
| 284
| null | null |
CWE-862: Missing Authorization
|
CWE-284: Improper Access Control
|
CVE-2024-13555
|
The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on the cancel_actions() function. This makes it possible for unauthenticated attackers to cancel a triggered backup via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
2025-02-18
| 352
|
CWE-352 Cross-Site Request Forgery (CSRF)
|
Network
|
Low
|
None
|
None
|
Unchanged
|
None
|
Low
|
None
| null | null | 345
| 693
| null | null |
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2021-21845
|
Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input in “stsc” decoder can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
|
2021-08-18
| 680
|
CWE-680: Integer Overflow to Buffer Overflow
|
Network
|
Low
|
None
|
Required
|
Unchanged
|
High
|
High
|
High
| null | 190
| 20
| 682
| null |
CWE-190: Integer Overflow or Wraparound
|
CWE-20: Improper Input Validation
|
CWE-682: Incorrect Calculation
|
CVE-2020-15156
|
In nodebb-plugin-blog-comments before version 0.7.0, a logged in user is vulnerable to an XSS attack which could allow a third party to post on their behalf on the forum. This is due to lack of CSRF validation.
|
2020-08-26
| 352
|
CWE-352: Cross-Site Request Forgery (CSRF)
|
Network
|
High
|
None
|
Required
|
Unchanged
|
High
|
High
|
None
| null | null | 345
| 693
| null | null |
CWE-345: Insufficient Verification of Data Authenticity
|
CWE-693: Protection Mechanism Failure
|
CVE-2025-28904
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shamalli Web Directory Free allows Blind SQL Injection. This issue affects Web Directory Free: from n/a through 1.7.6.
|
2025-03-25
| 89
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
Network
|
Low
|
None
|
None
|
Changed
|
High
|
None
|
Low
| null | 89
| 943
| 707
| null |
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
CWE-943: Improper Neutralization of Special Elements in Data Query Logic
|
CWE-707: Improper Neutralization
|
CVE-2021-1142
|
Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.
|
2021-01-20
| 20
|
CWE-20
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | null | 20
| 707
| null | null |
CWE-20: Improper Input Validation
|
CWE-707: Improper Neutralization
|
CVE-2024-41917
|
Time-of-check time-of-use race condition for some Intel(R) Battery Life Diagnostic Tool software before version 2.4.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
2025-02-12
| 367
|
Escalation of Privilege | Time-of-check Time-of-use (TOCTOU) Race Condition
|
Local
|
High
|
Low
|
Required
|
Changed
|
High
|
High
|
High
| null | 367
| 362
| 691
| null |
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
|
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
|
CWE-691: Insufficient Control Flow Management
|
CVE-2025-13456
|
The ShopBuilder WordPress plugin before 3.2.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
2026-01-02
| 79
|
CWE-79 Cross-Site Scripting (XSS)
|
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2023-30877
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Maxim Glazunov XML for Google Merchant Center plugin <= 3.0.1 versions.
|
2023-08-17
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
None
|
Required
|
Changed
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2025-4477
|
The ThreatSonar Anti-Ransomware from TeamT5 has a Privilege Escalation vulnerability, allowing remote attackers with intermediate privileges to escalate their privileges to highest administrator level through a specific API.
|
2025-05-19
| 862
|
CWE-862 Missing Authorization
|
Network
|
Low
|
High
|
None
|
Unchanged
|
High
|
High
|
High
| null | null | 862
| 284
| null | null |
CWE-862: Missing Authorization
|
CWE-284: Improper Access Control
|
CVE-2016-15053
|
Nagios XI versions prior to 5.2.4 are vulnerable to cross-site scripting (XSS) via the “My Reports” listing of the web interface. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.
|
2025-10-30
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
|
Network
|
Low
|
Low
|
Required
|
Unchanged
|
None
|
None
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-52598
|
2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Two interconnected vulnerabilities exist in version 5.4.1 a SSRF and URI validation bypass issue. The endpoint at POST /api/v1/twofaccounts/preview allows setting a remote URI to retrieve the image of a 2fa site. By abusing this functionality, it is possible to force the application to make a GET request to an arbitrary URL, whose content will be stored in an image file in the server if it looks like an image. Additionally, the library does some basic validation on the URI, attempting to filter our URIs which do not have an image extension. However, this can be easily bypassed by appending the string `#.svg` to the URI. The combination of these two issues allows an attacker to retrieve URIs accessible from the application, as long as their content type is text based. If not, the request is still sent, but the response is not reflected to the attacker. Version 5.4.1 fixes the issues.
|
2024-11-20
| 80
|
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | CWE-918: Server-Side Request Forgery (SSRF)
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
None
|
None
| 80
| 79
| 74
| 707
|
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
|
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2024-47872
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves **Cross-Site Scripting (XSS)** on any Gradio server that allows file uploads. Authenticated users can upload files such as HTML, JavaScript, or SVG files containing malicious scripts. When other users download or view these files, the scripts will execute in their browser, allowing attackers to perform unauthorized actions or steal sensitive information from their sessions. This impacts any Gradio server that allows file uploads, particularly those using components that process or display user-uploaded files. Users are advised to upgrade to `gradio>=5` to address this issue. As a workaround, users can restrict the types of files that can be uploaded to the Gradio server by limiting uploads to non-executable file types such as images or text. Additionally, developers can implement server-side validation to sanitize uploaded files, ensuring that HTML, JavaScript, and SVG files are properly handled or rejected before being stored or displayed to users.
|
2024-10-10
| 79
|
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Network
|
Low
|
None
|
None
|
Unchanged
|
Low
|
Low
|
Low
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2023-30985
|
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 3), Solid Edge SE2023 (All versions < V223.0 Update 2). Affected applications contain an out of bounds read past the end of an allocated buffer while parsing a specially crafted OBJ file. This vulnerability could allow an attacker to disclose sensitive information. (ZDI-CAN-19426)
|
2023-05-09
| 125
|
CWE-125: Out-of-bounds Read
|
Local
|
Low
|
None
|
Required
|
Unchanged
|
Low
|
None
|
None
| null | 125
| 119
| 664
| null |
CWE-125: Out-of-bounds Read
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-31865
|
Missing Authorization vulnerability in CartBoss SMS Abandoned Cart Recovery ✦ CartBoss allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SMS Abandoned Cart Recovery ✦ CartBoss: from n/a through 4.1.2.
|
2025-04-01
| 862
|
CWE-862 Missing Authorization
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
None
|
Low
|
None
| null | null | 862
| 284
| null | null |
CWE-862: Missing Authorization
|
CWE-284: Improper Access Control
|
CVE-2022-47522
|
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
|
2023-04-15
| 290
| null |
Adjacent Network
|
High
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| null | 290
| 1,390
| 284
| null |
CWE-290: Authentication Bypass by Spoofing
|
CWE-1390: Weak Authentication
|
CWE-284: Improper Access Control
|
CVE-2024-47015
|
In ProtocolMiscHwConfigChangeAdapter::GetData() of protocolmiscadapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation.
|
2024-10-25
| 125
|
Information disclosure
|
Local
|
Low
|
Low
|
None
|
Unchanged
|
High
|
None
|
None
| null | 125
| 119
| 664
| null |
CWE-125: Out-of-bounds Read
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-13353
|
In gokey versions <0.2.0,
a flaw in the seed decryption logic resulted in passwords incorrectly
being derived solely from the initial vector and the AES-GCM
authentication tag of the key seed.
This issue has been fixed in gokey version 0.2.0. This is a breaking change. The fix has invalidated any passwords/secrets that were derived from the seed file (using the -s option). Even if the input seed file stays the same, version 0.2.0 gokey will generate different secrets.
Impact
This vulnerability impacts generated keys/secrets using a seed file as an entropy input (using the -s option). Keys/secrets generated just from the master password (without the -s
option) are not impacted. The confidentiality of the seed itself is
also not impacted (it is not required to regenerate the seed itself).
Specific impact includes:
* keys/secrets generated from a seed file may have lower entropy: it
was expected that the whole seed would be used to generate keys (240
bytes of entropy input), where in vulnerable versions only 28 bytes was
used
* a malicious entity could have recovered all passwords, generated
from a particular seed, having only the seed file in possession without
the knowledge of the seed master password
Patches
The code logic bug has been fixed in gokey version 0.2.0
and above. Due to the deterministic nature of gokey, fixed versions
will produce different passwords/secrets using seed files, as all seed
entropy will be used now.
System secret rotation guidance
It is advised for users to regenerate passwords/secrets using the patched version of gokey (0.2.0
and above), and provision/rotate these secrets into respective systems
in place of the old secret. A specific rotation procedure is
system-dependent, but most common patterns are described below.
Systems that do not require the old password/secret for rotation
Such systems usually have a "Forgot password" facility or a
similar facility allowing users to rotate their password/secrets by
sending a unique "magic" link to the user's email or phone. In such
cases users are advised to use this facility and input the newly
generated password secret, when prompted by the system.
Systems that require the old password/secret for rotation
Such systems usually have a modal password rotation window
usually in the user settings section requiring the user to input the
old and the new password sometimes with a confirmation. To
generate/recover the old password in such cases users are advised to:
* temporarily download gokey version 0.1.3 https://github.com/cloudflare/gokey/releases/tag/v0.1.3 for their respective operating system to recover the old password
* use gokey version 0.2.0 or above to generate the new password
* populate the system provided password rotation form
Systems that allow multiple credentials for the same account to be provisioned
Such systems usually require a secret or a cryptographic
key as a credential for access, but allow several credentials at the
same time. One example is SSH: a particular user may have several
authorized public keys configured on the SSH server for access. For such
systems users are advised to:
* generate a new secret/key/credential using gokey version 0.2.0 or above
* provision the new secret/key/credential in addition to the existing credential on the system
* verify that the access or required system operation is still possible with the new secret/key/credential
* revoke authorization for the existing/old credential from the system
Credit
This vulnerability was found by Théo Cusnir ( @mister_mime https://hackerone.com/mister_mime ) and responsibly disclosed through Cloudflare's bug bounty program.
|
2025-12-02
| 330
|
CWE-330 Use of Insufficiently Random Values
|
Local
|
Low
|
Low
|
None
|
Unchanged
|
High
|
None
|
None
| null | null | 330
| 693
| null | null |
CWE-330: Use of Insufficiently Random Values
|
CWE-693: Protection Mechanism Failure
|
CVE-2025-49383
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CocoBasic Neresa allows PHP Local File Inclusion. This issue affects Neresa: from n/a through 1.3.
|
2025-08-28
| 98
|
CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
|
Network
|
High
|
None
|
None
|
Unchanged
|
High
|
High
|
High
| 98
| 829
| 706
| 664
|
CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
|
CWE-829: Inclusion of Functionality from Untrusted Control Sphere
|
CWE-706: Use of Incorrectly-Resolved Name or Reference
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-13889
|
The WordPress Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.8.3 via deserialization of untrusted input in the 'maybe_unserialize' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
|
2025-03-26
| 502
|
CWE-502 Deserialization of Untrusted Data
|
Network
|
Low
|
High
|
None
|
Unchanged
|
High
|
High
|
High
| null | 502
| 913
| 664
| null |
CWE-502: Deserialization of Untrusted Data
|
CWE-913: Improper Control of Dynamically-Managed Code Resources
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2025-5849
|
A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
2025-06-08
| 121
|
Stack-based Buffer Overflow | Memory Corruption
|
Network
|
Low
|
Low
|
None
|
Unchanged
|
High
|
High
|
High
| 121
| 788
| 119
| 664
|
CWE-121: Stack-based Buffer Overflow
|
CWE-788: Access of Memory Location After End of Buffer
|
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
CVE-2024-10208
|
An Improper Neutralization of Input During Web Page Generation vulnerability in the APROL Web Portal used in B&R APROL <4.4-00P5 may allow an authenticated network-based attacker to insert malicious code which is then executed in the context of the user’s browser session.
|
2025-03-25
| 79
|
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
|
Network
|
Low
|
None
|
Required
|
Unchanged
|
None
|
None
|
None
| null | 79
| 74
| 707
| null |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-707: Improper Neutralization
|
CVE-2025-62611
|
aiomysql is a library for accessing a MySQL database from the asyncio. Prior to version 0.3.0, the client-side settings are not checked before sending local files to MySQL server, which allows obtaining arbitrary files from the client using a rogue server. It is possible to create a rogue MySQL server that emulates authorization, ignores client flags and requests arbitrary files from the client by sending a LOAD_LOCAL instruction packet. This issue has been patched in version 0.3.0.
|
2025-10-22
| 73
|
CWE-73: External Control of File Name or Path
|
Network
|
Low
|
None
|
None
|
Unchanged
|
High
|
None
|
None
| null | 73
| 642
| 664
| null |
CWE-73: External Control of File Name or Path
|
CWE-642: External Control of Critical State Data
|
CWE-664: Improper Control of a Resource Through its Lifetime
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 54