id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
GHSA-cp92-4h8q-cwwj | Sun Virtual Desktop Infrastructure (VDI) 3.0, when anonymous binding is enabled, does not properly handle a client's attempt to establish an authenticated and encrypted connection, which might allow remote attackers to read cleartext VDI configuration-data requests by sniffing LDAP sessions on the network. | []
|
|
CVE-2023-20559 |
Insufficient control flow management in AmdCpmGpioInitSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to escalation of privileges.
| [
"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3450u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3550h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3580u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3780u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600xt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800xt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900xt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_pro_3900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*"
]
|
|
GHSA-j9gq-2f34-95p2 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jobin Jose WWM Social Share On Image Hover plugin <= 2.2 versions. | []
|
|
GHSA-f75g-rcjj-qxwg | Cross-site scripting (XSS) vulnerability in the Lazyest Gallery plugin before 1.1.21 for WordPress allows remote attackers to inject arbitrary web script or HTML via an EXIF tag. NOTE: some of these details are obtained from third party information. | []
|
|
CVE-2004-2071 | Macallan Mail Solution 2.8.4.6 (Build 260), and possibly earlier versions, allows remote attackers to bypass authentication in the web interface via an HTTP GET request with two slashes ("//") after the server name. | [
"cpe:2.3:a:macallan:mail_solution:2.8.4.6_build_260:*:*:*:*:*:*:*"
]
|
|
GHSA-w3p7-73q2-q3hc | Missing Authorization vulnerability in NotFound Fresh Framework allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Fresh Framework: from n/a through 1.70.0. | []
|
|
CVE-2023-26428 | Attackers can successfully request arbitrary snippet IDs, including E-Mail signatures of other users within the same context. Signatures of other users could be read even though they are not explicitly shared. We improved permission handling when requesting snippets that are not explicitly shared with other users. No publicly available exploits are known.
| [
"cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:revision_39:*:*:*:*:*:*"
]
|
|
GHSA-9fxx-jg3x-c28j | In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel | []
|
|
CVE-2006-4946 | PHP remote file inclusion vulnerability in include/startup.inc.php in CMSDevelopment Business Card Web Builder (BCWB) 0.99, and possibly 2.5 Beta and earlier, allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter. | [
"cpe:2.3:a:cmsdevelopment:business_card_web_builder:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:cmsdevelopment:business_card_web_builder:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:cmsdevelopment:business_card_web_builder:2.3:beta:*:*:*:*:*:*"
]
|
|
CVE-2016-1478 | Cisco IOS 15.5(3)S3, 15.6(1)S2, 15.6(2)S1, and 15.6(2)T1 does not properly dequeue invalid NTP packets, which allows remote attackers to cause a denial of service (interface wedge) by sending many crafted NTP packets, aka Bug ID CSCva35619. | [
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*"
]
|
|
GHSA-qrr4-q9rq-pfvg | Improper Validation of Specified Quantity in Input vulnerability in OpenText OpenText Application Automation Tools allows Exploiting Incorrectly Configured Access Control Security Levels.Multiple missing permission checks - ALM job config has been discovered in OpenText Application Automation Tools. The vulnerability could allow users with Overall/Read permission to enumerate ALM server names, usernames and client IDs configured to be used with ALM servers.This issue affects OpenText Application Automation Tools: 24.1.0 and below. | []
|
|
CVE-2023-41169 | NetScout nGeniusONE 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability (issue 2 of 4). | [
"cpe:2.3:a:netscout:ngeniusone:6.3.4:build2298:*:*:*:*:*:*"
]
|
|
CVE-2020-9065 | Huawei smart phone Taurus-AL00B with versions earlier than 10.0.0.203(C00E201R7P2) have a use-after-free (UAF) vulnerability. An authenticated, local attacker may perform specific operations to exploit this vulnerability. Successful exploitation may tamper with the information to affect the availability. | [
"cpe:2.3:o:huawei:taurus-al00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:taurus-al00b:-:*:*:*:*:*:*:*"
]
|
|
GHSA-gf89-385c-hq37 | Pulp does not remove permissions for named objects upon deletion, which allows authenticated users to gain the privileges of a deleted object via creating an object with the same name. | []
|
|
GHSA-xxvw-mmrh-6cr5 | In the Linux kernel, the following vulnerability has been resolved:drm/v3d: Add job to pending list if the reset was skippedWhen a CL/CSD job times out, we check if the GPU has made any progress
since the last timeout. If so, instead of resetting the hardware, we skip
the reset and let the timer get rearmed. This gives long-running jobs a
chance to complete.However, when `timedout_job()` is called, the job in question is removed
from the pending list, which means it won't be automatically freed through
`free_job()`. Consequently, when we skip the reset and keep the job
running, the job won't be freed when it finally completes.This situation leads to a memory leak, as exposed in [1] and [2].Similarly to commit 704d3d60fec4 ("drm/etnaviv: don't block scheduler when
GPU is still active"), this patch ensures the job is put back on the
pending list when extending the timeout. | []
|
|
CVE-2022-20495 | In getEnabledAccessibilityServiceList of AccessibilityManager.java, there is a possible way to hide an accessibility service due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243849844 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
|
|
CVE-2022-31992 | Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/?page=court_rentals/view_court_rental&id=. | [
"cpe:2.3:a:badminton_center_management_system_project:badminton_center_management_system:1.0:*:*:*:*:*:*:*"
]
|
|
CVE-2024-36827 | An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of ebookmeta before v1.2.8 allows attackers to access sensitive information or cause a Denial of Service (DoS) via crafted XML input. | [
"cpe:2.3:a:dnkorpushov:ebookmeta:*:*:*:*:*:*:*:*"
]
|
|
GHSA-qgpq-9pcq-24fj | Cross Site Scripting vulnerability in SourceCodester Simple Customer Relationship Management System v1.0 allows attacker to execute arbitary code via the company or query parameter(s). | []
|
|
GHSA-7w4x-4h67-pgmv | Invalid HTTP requests in Reactor Netty HTTP Server may reveal access tokens | Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may request log headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled. | []
|
CVE-2014-0243 | Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job. | [
"cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2p1:*:*:*:*:*:*"
]
|
|
GHSA-q729-rgv8-6phg | A vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself. | []
|
|
CVE-2021-22751 | A CWE-787: Out-of-bounds write vulnerability exists inIGSS Definition (Def.exe) V15.0.0.21140 and prior that could result in disclosure of information or execution of arbitrary code due to lack of input validation, when a malicious CGF (Configuration Group File) file is imported to IGSS Definition. | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
]
|
|
CVE-2022-46047 | AeroCMS v0.0.1 is vulnerable to SQL Injection via the delete parameter. | [
"cpe:2.3:a:aerocms_project:aerocms:0.0.1:*:*:*:*:*:*:*"
]
|
|
GHSA-7775-vpxf-hr38 | The Message Display Tool (MDT) of SAP NetWeaver Process Integration - version SAP_XIAF 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application. | []
|
|
GHSA-8hxf-78jp-jv6p | SQL injection vulnerability in kategori.asp in xweblog 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the kategori parameter. | []
|
|
GHSA-7hjm-9cg2-rcg6 | Use after free in Audio in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | []
|
|
GHSA-v2w8-m6c5-xg55 | ** DISPUTED ** NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in the login command in calendar.pl in CalendarScript 3.21 allows remote attackers to inject arbitrary web script or HTML via the username parameter, a different vulnerability than CVE-2005-1145. | []
|
|
CVE-2006-0844 | Leif M. Wright's Blog 3.5 does not make a password comparison when authenticating an administrator via a cookie, which allows remote attackers to bypass login authentication, probably by setting the blogAdmin cookie. | [
"cpe:2.3:a:leif_m._wright:web_blog:3.5:*:*:*:*:*:*:*"
]
|
|
GHSA-5vgh-hwf3-2v9p | IBM Tivoli Key Lifecycle Manager 2.6 and 2.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 133639. | []
|
|
GHSA-xrx8-f378-fwph | Inappropriate implementation in V8 in Google Chrome prior to 129.0.6668.58 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: Medium) | []
|
|
CVE-2014-7516 | The Central East LHIN News (aka com.wCentralEastLHINNews) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:canadapps:central_east_lhin_news:0.1:*:*:*:*:android:*:*"
]
|
|
GHSA-rgxx-f3cp-vg8p | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, integer overflow may occur when values passed from HLOS (graphics driver busy time, and total time) in TZBSP_GFX_DCVS_UPDATE_ID are very large. | []
|
|
CVE-2016-11071 | An issue was discovered in Mattermost Server before 3.1.0. It allows XSS because the noreferrer and noopener protection mechanisms were not in place. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
]
|
|
GHSA-hp98-cm3f-c276 | Multi-Computer Control System (MCCS) 1.0 allows remote attackers to cause a denial of service via a malformed UDP packet. | []
|
|
CVE-2022-34803 | Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system. | [
"cpe:2.3:a:jenkins:opsgenie:*:*:*:*:*:jenkins:*:*"
]
|
|
CVE-2006-1323 | Directory traversal vulnerability in WinHKI 1.6 and earlier allows user-assisted attackers to overwrite arbitrary files via a (1) RAR, (2) TAR, (3) ZIP, or (4) TAR.GZ archive with a file whose file name contains ".." sequences. | [
"cpe:2.3:a:webtoolmaster_software:winhki:*:*:*:*:*:*:*:*"
]
|
|
GHSA-4fwp-qhrc-5p5x | TP-Link TL-WR941ND V6 were discovered to contain a buffer overflow via the pSize parameter at /userRpm/PingIframeRpm. | []
|
|
GHSA-4g85-cv2v-x664 | In libytnef in ytnef through 1.9.2, there is a heap-based buffer over-read due to incorrect boundary checking in the SIZECHECK macro in lib/ytnef.c. | []
|
|
GHSA-5mqh-p682-wf6c | Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine. | []
|
|
CVE-2019-11995 | Security vulnerabilities in HPE UIoT version 1.2.4.2 could allow unauthorized remote access and access to sensitive data. HPE has addressed this issue in HPE UIoT: For customers with release UIoT 1.2.4.2 fixes are made available with 1.2.4.2 RP3 HF1. For customers with release older than 1.2.4.2, such as 1.2.4.1, 1.2.4.0, the resolution will be to upgrade to 1.2.4.2 RP3 HF1 Customers are requested to upgrade to the updated versions or contact HPE support for further assistance. | [
"cpe:2.3:a:hp:universal_internet_of_things:1.2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:universal_internet_of_things:1.2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:universal_internet_of_things:1.2.4.2:*:*:*:*:*:*:*"
]
|
|
CVE-2008-0444 | Cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) before 2.7.0 allows remote attackers to inject arbitrary web script or HTML via subtext parameter to unspecified components. | [
"cpe:2.3:a:elog:elog:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.5:*:*:*:*:*:*:*"
]
|
|
GHSA-q58q-2fxh-6w6r | Sametime is impacted by sensitive information passed in URL. | []
|
|
GHSA-c67p-mr7g-hc4m | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Fancy Text widget in all versions up to, and including, 6.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
|
|
CVE-2018-7850 | A CWE-807: Reliance on Untrusted Inputs in a Security Decision vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause invalid information displayed in Unity Pro software. | [
"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_premium_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*"
]
|
|
GHSA-q5r8-rw72-26h2 | In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf100282c. | []
|
|
GHSA-jgpq-22xp-mqmq | A vulnerability in the web-based management interface of Cisco WAP150 Wireless-AC/N Dual Radio Access Point with Power over Ethernet (PoE) and WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCve57076. | []
|
|
GHSA-5q7f-gfg3-whhx | Multiple cross-site scripting (XSS) vulnerabilities in admin/swarm-settings.php in the Bugs Go Viral : Facebook Promotion Generator (fbpromotions) plugin 1.3.4 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) promo_type, (2) fb_edit_action, or (3) promo_id parameter. | []
|
|
CVE-2011-4327 | ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call. | [
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*"
]
|
|
GHSA-669q-4gjm-8895 | Tenda AC15 and AC18 routers V15.03.05.19 contain stack overflow vulnerabilities in the function fromDhcpListClient with a combined parameter "list*" ("%s%d","list"). | []
|
|
GHSA-v972-vr8c-mprc | An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. Allshare allows attackers to access sensitive information. The Samsung ID is SVE-2018-13453 (March 2019). | []
|
|
CVE-2022-25299 | Arbitrary File Write | This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder. | [
"cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*"
]
|
CVE-2014-4302 | Cross-site scripting (XSS) vulnerability in rating/rating.php in HAM3D Shop Engine allows remote attackers to inject arbitrary web script or HTML via the ID parameter. | [
"cpe:2.3:a:ham3d:ham3d_shop_engine:-:*:*:*:*:*:*:*"
]
|
|
GHSA-r3x9-j2v8-w6hj | Buffer overflow in the decode_post function in ELOG before 2.5.7 allows remote attackers to execute arbitrary code via attachments with long file names. | []
|
|
CVE-2023-35971 | Unauthenticated Stored Cross-Site Scripting (XSS) in ArubaOS Web-based Management Interface | A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface. | [
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:sd-wan:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-hw-10k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-hw-1k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-hw-5k:-:*:*:*:*:*:*:*"
]
|
GHSA-34x5-95ff-w3cg | A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to set sensitive configuration values and gain elevated privileges. The vulnerability is due to improper handling of substring comparison operations that are performed by the affected software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker with read-only privileges to gain administrator privileges. | []
|
|
CVE-2018-21086 | An issue was discovered on Samsung mobile devices with L(5.x), M(6.0), and N(7.x) software. There is a race condition with a resultant double free in vnswap_init_backing_storage. The Samsung ID is SVE-2017-11177 (February 2018). | [
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
]
|
|
CVE-2019-19793 | In Cyxtera AppGate SDP Client 4.1.x through 4.3.x before 4.3.2 on Windows, a local or remote user from the same domain can gain privileges. | [
"cpe:2.3:a:cyxtera:appgate_sdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
GHSA-7862-pcm3-qwxx | The v3flt2k.sys driver in AhnLab V3Pro 2004 Build 6.0.0.383, V3 VirusBlock 2005 Build 6.0.0.383, V3Net for Windows Server 6.0 Build 6.0.0.383 does not properly validate the source of the DeviceIoControl commands, which allows remote attackers to gain privileges. | []
|
|
GHSA-24pv-3jc8-2432 | Cross-Site Request Forgery (CSRF) vulnerability in Rocket Elements Split Test For Elementor.This issue affects Split Test For Elementor: from n/a through 1.6.9. | []
|
|
GHSA-p7jx-q735-v62j | Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory. | []
|
|
CVE-2024-25118 | Information Disclosure of Hashed Passwords in TYPO3 Backend Forms | TYPO3 is an open source PHP based web content management system released under the GNU GPL. Password hashes were being reflected in the editing forms of the TYPO3 backend user interface. This allowed attackers to crack the plaintext password using brute force techniques. Exploiting this vulnerability requires a valid backend user account. Users are advised to update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. There are no known workarounds for this issue. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:13.0.0:*:*:*:*:*:*:*"
]
|
CVE-2018-3578 | Type mismatch for ie_len can cause the WLAN driver to allocate less memory on the heap due to implicit casting leading to a heap buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
|
|
GHSA-43j5-76vw-pq2j | A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58. | []
|
|
GHSA-mpm2-q4w3-64vg | Buffer overflow in the web server on Cisco DPC2203 and EPC2203 devices with firmware r1_customer_image allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCuv05935. | []
|
|
GHSA-8pff-wwv7-qjfj | In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. | []
|
|
GHSA-hp24-h2rp-pfgx | The fabric-interconnect component in Cisco Unified Computing System (UCS) does not encrypt KVM media traffic, which allows remote attackers to obtain sensitive information, and consequently complete the authentication process for a server connection, by sniffing the network, aka Bug ID CSCtr72970. | []
|
|
GHSA-pf52-hh8x-27rf | A vulnerability, which was classified as critical, was found in Mini-Tmall up to 20240901. Affected is the function rewardMapper.select of the file tmall/admin/order/1/1. The manipulation of the argument orderBy leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
|
|
GHSA-rg62-gwr6-wv2q | A vulnerability in the client application for iOS of Cisco Webex Teams could allow an authenticated, remote attacker to upload arbitrary files within the scope of the iOS application. The vulnerability is due to improper input validation in the client application. An attacker could exploit this vulnerability by sending a malicious file to a targeted user and persuading the user to manually open it. An exploit could allow the attacker to overwrite sensitive application files and eventually cause a denial of service (DoS) condition by foreclosing future access to the system to the targeted user. This vulnerability is fixed in version 3.13.26920. | []
|
|
GHSA-vh6c-fwf7-mm9v | Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds. | []
|
|
CVE-2021-22222 | Infinite loop in DVB-S2-BB dissector in Wireshark 3.4.0 to 3.4.5 allows denial of service via packet injection or crafted capture file | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
|
|
GHSA-vrh3-vx52-7gxc | Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589. | []
|
|
CVE-2016-3764 | media/libmediaplayerservice/MetadataRetrieverClient.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to obtain sensitive pointer information via a crafted application, aka internal bug 28377502. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
]
|
|
CVE-2018-15418 | Cisco Webex Network Recording Player and Cisco Webex Player Remote Code Execution Vulnerabilities | A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system. | [
"cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release5_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5:maintenance_release6_patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release1_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.6:maintenance_release3_patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:base:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release1_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7:maintenance_release2_patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.8:base:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_business_suite_32:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_business_suite_33:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_business_suite_31:*:*:*:*:*:*:*:*"
]
|
CVE-2013-6951 | The Belkin WeMo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate. | [
"cpe:2.3:a:belkin:wemo_home_automation_firmware:2769:*:*:*:*:*:*:*"
]
|
|
CVE-2021-33181 | Server-Side Request Forgery (SSRF) vulnerability in webapi component in Synology Video Station before 2.4.10-1632 allows remote authenticated users to send arbitrary request to intranet resources via unspecified vectors. | [
"cpe:2.3:a:synology:video_station:*:*:*:*:*:*:*:*"
]
|
|
CVE-2020-1131 | An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
|
|
CVE-2023-5725 | A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
|
|
GHSA-m2g5-h4j8-wxpx | Cross-site scripting (XSS) vulnerability in pafiledb.php in PHP Arena paFileDB 1.1.3 through 3.0 allows remote attackers to inject arbitrary web script or HTML via the query string in the (1) rate, (2) email, or (3) download actions. | []
|
|
GHSA-23g9-fmq6-8jfq | Buffer over-read can occur while playing the video clip which is not standard in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, Rennell, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | []
|
|
GHSA-9h2p-wj4m-pwpg | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Grade Us, Inc. Review Stream plugin <= 1.6.5 versions. | []
|
|
GHSA-j7wg-vqfq-fh3f | Multiple vulnerabilities exist in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor. Successful exploitation of these vulnerabilities could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device. | []
|
|
GHSA-5wwj-6v78-cpwh | A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220018 is the identifier assigned to this vulnerability. | []
|
|
CVE-2024-46539 | Insecure permissions in the Bluetooth Low Energy (BLE) component of Fire-Boltt Artillery Smart Watch NJ-R6E-10.3 allow attackers to cause a Denial of Service (DoS). | [
"cpe:2.3:o:fire-boltt:artillery_smartwatch_firmware:nj-r6e-10.3:*:*:*:*:*:*:*"
]
|
|
CVE-2025-28354 | An issue in the Printer Manager Systm of Entrust Corp Printer Manager D3.18.4-3 and below allows attackers to execute a directory traversal via a crafted POST request. | []
|
|
CVE-2018-14356 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
]
|
|
CVE-2025-6957 | Campcodes Employee Management System eprocess.php sql injection | A vulnerability was found in Campcodes Employee Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /process/eprocess.php. The manipulation of the argument mailuid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | []
|
CVE-2019-5891 | An issue was discovered in OverIT Geocall 6.3 before build 2:346977. An unauthenticated servlet allows an attacker to obtain a cookie of an authenticated user, and login to the web application. | [
"cpe:2.3:a:overit:geocall:6.3:*:*:*:*:*:*:*"
]
|
|
CVE-2023-24821 | RIOT-OS vulnerable to Integer Underflow during defragmentation | RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset, thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually. | [
"cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*"
]
|
CVE-2020-6536 | Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
]
|
|
GHSA-v382-g65v-f2p8 | The File Manager Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and capability checks in the mk_file_folder_manager AJAX action in all versions up to, and including, 8.3.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | []
|
|
GHSA-5gfm-vq6m-rxf2 | Microsoft Windows 2000 telnet service creates named pipes with predictable names and does not properly verify them, which allows local users to execute arbitrary commands by creating a named pipe with the predictable name and associating a malicious program with it, the first of two variants of this vulnerability. | []
|
|
GHSA-hpj4-qfr8-jq7w | A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224990 is the identifier assigned to this vulnerability. | []
|
|
CVE-2004-1593 | Cross-site scripting (XSS) vulnerability in render.UserLayoutRootNode.uP in SCT Campus Pipeline allows remote attackers to inject arbitrary web script or HTML via the utf parameter. | [
"cpe:2.3:a:sct_corporation:campus_pipeline:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sct_corporation:campus_pipeline:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sct_corporation:campus_pipeline:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sct_corporation:campus_pipeline:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sct_corporation:campus_pipeline:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sct_corporation:campus_pipeline:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sct_corporation:campus_pipeline:3.2:*:*:*:*:*:*:*"
]
|
|
GHSA-hhfx-jmmf-97c7 | An information disclosure vulnerability in the Upstream kernel kernel. Product: Android. Versions: Android kernel. Android ID: A-38159576. | []
|
|
CVE-2019-4014 | IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root. IBM X-Force ID: 155892. | [
"cpe:2.3:a:ibm:db2:9.7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
CVE-2016-5426 | PowerDNS (aka pdns) Authoritative Server before 3.4.10 allows remote attackers to cause a denial of service (backend CPU consumption) via a long qname. | [
"cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*"
]
|
|
CVE-2014-9338 | Multiple cross-site request forgery (CSRF) vulnerabilities in the O2Tweet plugin 0.0.4 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) o2t_username or (2) o2t_tags parameter to wp-admin/options-general.php. | [
"cpe:2.3:a:o2tweet_project:o2tweet:*:*:*:*:*:wordpress:*:*"
]
|
|
CVE-2011-4667 | The encryption library in Cisco IOS Software 15.2(1)T, 15.2(1)T1, and 15.2(2)T, Cisco NX-OS in Cisco MDS 9222i Multiservice Modular Switch, Cisco MDS 9000 18/4-Port Multiservice Module, and Cisco MDS 9000 Storage Services Node module before 5.2(6), and Cisco IOS in Cisco VPN Services Port Adaptor for Catalyst 6500 12.2(33)SXI, and 12.2(33)SXJ when IP Security (aka IPSec) is used, allows remote attackers to obtain unencrypted packets from encrypted sessions. | [
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*"
]
|
|
CVE-2024-29099 | WordPress Evergreen Content Poster plugin <= 1.4.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Evergreen Content Poster allows Reflected XSS.This issue affects Evergreen Content Poster: from n/a through 1.4.1.
| []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.