id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2021-32263 | ok-file-formats through 2021-04-29 has a heap-based buffer overflow in the ok_csv_circular_buffer_read function in ok_csv.c. | [
"cpe:2.3:a:ok-file-formats_project:ok-file-formats:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-2234 | Multiple cross-site scripting (XSS) vulnerabilities in TyroCMS beta 1.0 allow remote attackers to inject arbitrary web script or HTML via (1) a javascript URI in an img BBCode tag, or a JavaScript event in a (2) url BBCode tag or (3) color BBCode tag. | [
"cpe:2.3:a:tyrocms:tyrocms:beta_1.0:*:*:*:*:*:*:*"
] |
|
GHSA-573r-pcmm-438p | SQL injection vulnerability in index.php in the buslicense (com_buslicense) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in a list action. | [] |
|
CVE-2024-36212 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
CVE-2007-3271 | PHP remote file inclusion vulnerability in templates/2blue/bodyTemplate.php in YourFreeScreamer 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the serverPath parameter. | [
"cpe:2.3:a:yourfreescreamer:yourfreescreamer:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-8g8g-2v45-8xq6 | Multiple cross-site scripting (XSS) vulnerabilities in Elaine Aquino Online Zone Journals (OZJournals) 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) m and (2) c parameters in index.php, (3) a search action, and (4) a "submit comment" action. | [] |
|
GHSA-mr8j-g9gr-mgwq | QNX Embedded Resource Manager in Voyager web server 2.01B in the demo disks for QNX 405 allows remote attackers to read sensitive system statistics information via the embedded.html web page. | [] |
|
CVE-2018-15969 | Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. | [
"cpe:2.3:a:adobe:experience_manager:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-22461 | SQL injection in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote authenticated attacker with admin privileges to achieve code execution. | [] |
|
CVE-2013-3161 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
] |
|
CVE-2023-4333 | Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server | Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server | [
"cpe:2.3:a:broadcom:raid_controller_web_interface:51.12.0-2779:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2015-0582 | The High Availability (HA) subsystem in Cisco NX-OS on MDS 9000 devices allows remote attackers to cause a denial of service via crafted traffic, aka Bug ID CSCuo09129. | [
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-48905 | Sematell ReplyOne 7.4.3.0 has Insecure Permissions for the /rest/sessions endpoint. | [] |
|
CVE-2013-4486 | Zanata 3.0.0 through 3.1.2 has RCE due to EL interpolation in logging | [
"cpe:2.3:a:redhat:zanata:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
GHSA-xwqp-mjjh-p3v2 | David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533". | [] |
|
CVE-2024-23838 | TrueLayer.Client SSRF when fetching payment or payment provider | TrueLayer.NET is the .Net client for TrueLayer. The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure. The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the `truelayer-dotnet` library. Versions of TrueLayer.Client `v1.6.0` and later are not affected. | [
"cpe:2.3:a:truelayer:truelayer.net:*:*:*:*:*:*:*:*"
] |
CVE-2023-28333 | Moodle: pix helper potential mustache code injection risk | The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS). | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:4.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] |
GHSA-hhp4-hvm2-m2w3 | Zoho NetFlow Analyzer build 10250 and earlier does not have an off autocomplete attribute for a password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. | [] |
|
GHSA-xhgg-6f6v-2476 | The ChatBox - Chat Rooms (aka com.droidchatroom.messengerapp) application 2.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2017-16328 | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_event_alarm, at 0x9d01eb08, the value for the `s_event_offset` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | [
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:2245-222:-:*:*:*:*:*:*"
] |
|
CVE-2014-1950 | Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors. | [
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-2832 | SQL Injection in unilogies/bumsys | SQL Injection in GitHub repository unilogies/bumsys prior to 2.2.0. | [
"cpe:2.3:a:bumsys_project:bumsys:*:*:*:*:*:*:*:*"
] |
CVE-2013-2917 | The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*"
] |
|
CVE-2008-1241 | GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-50837 | WordPress Login Lockdown Plugin <= 2.06 is vulnerable to SQL Injection | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebFactory Ltd Login Lockdown – Protect Login Form.This issue affects Login Lockdown – Protect Login Form: from n/a through 2.06.
| [
"cpe:2.3:a:webfactoryltd:wp_login_lockdown:*:*:*:*:*:wordpress:*:*"
] |
GHSA-4hqf-gj5c-55qw | PY Software Active Webcam WebServer (webcam.exe) 5.5 allows remote attackers to obtain the full path of the web server via a request for a non-existent filename, which leaks the full path in an error message. | [] |
|
CVE-2023-3065 | Mobatime mobile application - Authentication bypass | Improper Authentication vulnerability in Mobatime mobile application AMXGT100 allows Authentication Bypass.This issue affects Mobatime mobile application AMXGT100 through 1.3.20.
| [
"cpe:2.3:a:mobatime:amxgt_100:*:*:*:*:*:android:*:*"
] |
CVE-2021-33010 | AVEVA System Platform Uncaught Exception | An exception is thrown from a function in AVEVA System Platform versions 2017 through 2020 R2 P01, but it is not caught, which may cause a denial-of-service condition. | [
"cpe:2.3:a:aveva:system_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*"
] |
CVE-2023-0658 | Multilaser RE057/RE170 Backup File param.file.tgz information disclosure | A vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220053 was assigned to this vulnerability. | [
"cpe:2.3:o:multilaser:re057_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:multilaser:re057_firmware:2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:multilaser:re057:-:*:*:*:*:*:*:*",
"cpe:2.3:o:multilaser:re170_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:multilaser:re170_firmware:2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:multilaser:re170:-:*:*:*:*:*:*:*"
] |
CVE-2025-30286 | ColdFusion | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) | ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. A high-privileged attacker could leverage this vulnerability to bypass security protections and execute code. Exploitation of this issue requires user interaction and scope is changed. | [] |
GHSA-cg34-cm8x-3w46 | The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload_thumbnail (aka File Thumbnail) parameter in an edit action to wp-admin/post.php. | [] |
|
GHSA-ggp6-pc6f-gh53 | An Incorrect Access Control vulnerability exists in Premiumdatingscript 4.2.7.7 via the password change procedure in requests\user.php. | [] |
|
GHSA-5c3r-rx33-wr79 | An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory. | [] |
|
CVE-2023-39476 | Inductive Automation Ignition JavaSerializationCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability | Inductive Automation Ignition JavaSerializationCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the JavaSerializationCodec class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20291. | [
"cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*"
] |
CVE-2015-1659 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1662 and CVE-2015-1665. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
GHSA-jqgw-52h6-835c | An issue has been found in function DCTStream::transformDataUnit in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 1 . | [] |
|
CVE-2022-1852 | A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2009-0141 | XTerm in Apple Mac OS X 10.4.11 and 10.5.6, when used with luit, creates tty devices with insecure world-writable permissions, which allows local users to write to the Xterm of another user. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*"
] |
|
CVE-2020-22984 | Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via key parameter to the getGoogleExtraConfig task. | [
"cpe:2.3:a:microstrategy:microstrategy_web_sdk:*:*:*:*:*:*:*:*"
] |
|
GHSA-j65r-92cg-qqxw | Cross-site scripting (XSS) vulnerability in the discussion board functionality for WebCT Campus Edition 4.1 allows remote attackers to inject arbitrary web script or HTML via the message field. | [] |
|
CVE-2024-25763 | openNDS 10.2.0 is vulnerable to Use-After-Free via /openNDS/src/auth.c. | [] |
|
CVE-2023-50206 | D-Link G416 flupl query_type edit Command Injection Remote Code Execution Vulnerability | D-Link G416 flupl query_type edit Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21299. | [
"cpe:2.3:a:dlink:g416_firmware:1.08b02:*:*:*:*:*:*:*"
] |
GHSA-p84p-mg49-xwvx | A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device. | [] |
|
CVE-2021-46049 | A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the gf_fileio_check function, which could cause a Denial of Service. | [
"cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-1057 | Pricing Deals for WooCommerce <= 2.0.2.02 - Unauthenticated SQLi | The Pricing Deals for WooCommerce WordPress plugin through 2.0.2.02 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection | [
"cpe:2.3:a:varktech:pricing_deals_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] |
CVE-2023-45902 | Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/attachment/delete. | [
"cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-20637 | Improper check or handling of exceptional conditions in LOGITEC LAN-W300N/PR5B allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted URL. | [
"cpe:2.3:o:logitech:lan-w300n\\/pr5b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:logitech:lan-w300n\\/pr5b:-:*:*:*:*:*:*:*"
] |
|
GHSA-789f-wh34-526r | Cross-site scripting (XSS) vulnerability in index.php for Kayako ESupport 2.3.1, and possibly other versions, allows remote attackers to inject arbitrary HTML and web script via the nav parameter. | [] |
|
CVE-2011-0166 | The HTML5 drag and drop functionality in WebKit in Apple Safari before 5.0.4 allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information via vectors related to the dragging of content. NOTE: this might overlap CVE-2011-0778. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*"
] |
|
GHSA-jfx3-f7mg-7cp3 | In the Linux kernel, the following vulnerability has been resolved:bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueueA recent change created a dedicated workqueue for the state-change work
with WQ_HIGHPRI (no strong reason for that) and WQ_MEM_RECLAIM flags,
but the state-change work (mhi_pm_st_worker) does not guarantee forward
progress under memory pressure, and will even wait on various memory
allocations when e.g. creating devices, loading firmware, etc... The
work is then not part of a memory reclaim path...Moreover, this causes a warning in check_flush_dependency() since we end
up in code that flushes a non-reclaim workqueue:[ 40.969601] workqueue: WQ_MEM_RECLAIM mhi_hiprio_wq:mhi_pm_st_worker [mhi] is flushing !WQ_MEM_RECLAIM events_highpri:flush_backlog
[ 40.969612] WARNING: CPU: 4 PID: 158 at kernel/workqueue.c:2607 check_flush_dependency+0x11c/0x140
[ 40.969733] Call Trace:
[ 40.969740] __flush_work+0x97/0x1d0
[ 40.969745] ? wake_up_process+0x15/0x20
[ 40.969749] ? insert_work+0x70/0x80
[ 40.969750] ? __queue_work+0x14a/0x3e0
[ 40.969753] flush_work+0x10/0x20
[ 40.969756] rollback_registered_many+0x1c9/0x510
[ 40.969759] unregister_netdevice_queue+0x94/0x120
[ 40.969761] unregister_netdev+0x1d/0x30
[ 40.969765] mhi_net_remove+0x1a/0x40 [mhi_net]
[ 40.969770] mhi_driver_remove+0x124/0x250 [mhi]
[ 40.969776] device_release_driver_internal+0xf0/0x1d0
[ 40.969778] device_release_driver+0x12/0x20
[ 40.969782] bus_remove_device+0xe1/0x150
[ 40.969786] device_del+0x17b/0x3e0
[ 40.969791] mhi_destroy_device+0x9a/0x100 [mhi]
[ 40.969796] ? mhi_unmap_single_use_bb+0x50/0x50 [mhi]
[ 40.969799] device_for_each_child+0x5e/0xa0
[ 40.969804] mhi_pm_st_worker+0x921/0xf50 [mhi] | [] |
|
CVE-2007-2160 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Database Administration (dba) module 4.6.x-*, and before 4.7.x-1.2 in the 4.7.x-1.* series, for Drupal allow remote attackers to perform unauthorized actions as an arbitrary user, a related issue to CVE-2006-5476. | [
"cpe:2.3:a:drupal:database_administration_module:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:database_administration_module:4.7:*:*:*:*:*:*:*"
] |
|
GHSA-h4q9-8pc7-f4x9 | nginx njs 0.7.2 is vulnerable to Buffer Overflow. Type confused in Array.prototype.concat() when a slow array appended element is fast array. | [] |
|
CVE-2018-20071 | Insufficiently strict origin checks during JIT payment app installation in Payments in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to install a service worker for a domain that can host attacker controled files via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-f28x-wgjx-v8hh | A vulnerability has been identified in the Bitdefender Total Security HTTPS scanning functionality where the product incorrectly checks the site's certificate, which allows an attacker to make MITM SSL connections to an arbitrary site. The product trusts certificates that are issued using the MD5 and SHA1 collision hash functions which allow attackers to create rogue certificates that appear legitimate. | [] |
|
GHSA-8295-hcjh-5w9p | In the Linux kernel, the following vulnerability has been resolved:drm/i915: Fix potential bit_17 double-freeA userspace with multiple threads racing I915_GEM_SET_TILING to set the
tiling to I915_TILING_NONE could trigger a double free of the bit_17
bitmask. (Or conversely leak memory on the transition to tiled.) Move
allocation/free'ing of the bitmask within the section protected by the
obj lock.[tursulin: Correct fixes tag and added cc stable.]
(cherry picked from commit 10e0cbaaf1104f449d695c80bcacf930dcd3c42e) | [] |
|
GHSA-vv58-j7f9-q5xc | NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30 and all DGX-2 with BMC firmware versions prior to 1.06.06, contains a vulnerability in the AMI BMC firmware in which the firmware includes hard-coded credentials, which may lead to elevation of privileges or information disclosure. | [] |
|
GHSA-vm8m-8vm4-x33v | Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment. | [] |
|
GHSA-35m2-m75c-vmc4 | Multiple SQL injection vulnerabilities in BytesFall Explorer (bfExplorer) 0.0.7.1 and earlier allow remote attackers to execute arbitrary SQL commands via the username ($User variable) to login/doLogin.php and other unspecified vectors. | [] |
|
CVE-2024-47155 | Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak. | [] |
|
CVE-2012-0773 | The NetStream class in Adobe Flash Player before 10.3.183.18 and 11.x before 11.2.202.228 on Windows, Mac OS X, and Linux; Flash Player before 10.3.183.18 and 11.x before 11.2.202.223 on Solaris; Flash Player before 11.1.111.8 on Android 2.x and 3.x; and AIR before 3.2.0.2070 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xerox:freeflow_print_server:8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:xerox:freeflow_print_server:8.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:xerox:freeflow_print_server:8.0:sp2:*:*:*:*:*:*"
] |
|
GHSA-354m-q546-g336 | The issue was addressed with improved checks. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5. Photos belonging to the Hidden Photos Album could be viewed without authentication through Visual Lookup | [] |
|
GHSA-99gg-h722-7qw4 | Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution. | [] |
|
CVE-2018-17478 | Incorrect array position calculations in V8 in Google Chrome prior to 70.0.3538.102 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-0036 | In startNextMatchingActivity of ActivityTaskManagerService.java, there is a possible way to bypass the restrictions on starting activities from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0l:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] |
|
CVE-2008-5991 | Directory traversal vulnerability in docs.php in MailWatch for MailScanner 1.0.4 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the doc parameter. | [
"cpe:2.3:a:mailscanner:mailscanner:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:0.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mailwatch:mailwatch:1.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-48xv-3rm6-fh3c | Huawei P20 smartphones with versions earlier than 10.0.0.156(C00E156R1P4) have an improper authentication vulnerability. The vulnerability is due to that when an user wants to do certain operation, the software insufficiently validate the user's identity. Attackers need to physically access the smartphone to exploit this vulnerability. Successful exploit could allow the attacker to bypass the limit of student mode function. | [] |
|
CVE-2018-9952 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Button elements. When setting the formattedValue attribute, the process does not properly validate the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5527. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] |
|
GHSA-6fj5-f379-phjf | Improper Privilege Management vulnerability in Repute Infosystems ARMember allows Privilege Escalation.This issue affects ARMember: from n/a through 4.0.10. | [] |
|
CVE-2012-2893 | Double free vulnerability in libxslt, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XSL transforms. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*"
] |
|
CVE-2024-4905 | Kashipara College Management System view_students_each_detail.php sql injection | A vulnerability classified as critical has been found in Kashipara College Management System 1.0. Affected is an unknown function of the file view_students_each_detail.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-264438 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:kashipara:college_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2022-2901 | Improper Authorization in chatwoot/chatwoot | Improper Authorization in GitHub repository chatwoot/chatwoot prior to 2.8. | [
"cpe:2.3:a:chatwoot:chatwoot:*:*:*:*:*:*:*:*"
] |
CVE-2005-2041 | Buffer overflow in addschup in HAURI ViRobot 2.0, and possibly other products, allows remote attackers to execute arbitrary code via a long ViRobot_ID cookie (HTTP_COOKIE). | [
"cpe:2.3:a:hauri:virobot_linux_server:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-44840 | Heap buffer overflow vulnerability in binutils readelf before 2.40 via function find_section_in_set in file readelf.c. | [
"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-30288 | Adobe FrameMaker 3DS File Parsing Heap Memory Corruption | Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:framemaker:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:framemaker:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-96rx-x58h-pww5 | iBaby M3S has a password of admin for the backdoor admin account. | [] |
|
CVE-2023-1204 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] |
|
GHSA-74gr-74x4-wggv | In the Easel driver, there is possible memory corruption due to race conditions. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112312381 | [] |
|
CVE-2024-22551 | WhatACart v2.0.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /site/default/search. | [
"cpe:2.3:a:ushainformatique:whatacart:2.0.7:*:*:*:*:*:*:*"
] |
|
GHSA-5wgc-m4gw-p8m3 | Use-after-free vulnerability in ext2fs.c in Brian Carrier The Sleuth Kit (TSK) before 2.09 allows user-assisted remote attackers to cause a denial of service (application crash) and prevent examination of certain ext2fs files via a malformed ext2fs image. | [] |
|
CVE-2023-22805 | CVE-2023-22805 | LS ELECTRIC XBC-DN32U with operating system version 01.80 has improper access control to its read prohibition feature. This could allow a remote attacker to remotely set the feature to lock users out of reading data from the device.
| [
"cpe:2.3:o:ls-electric:xbc-dn32u_firmware:01.80:*:*:*:*:*:*:*",
"cpe:2.3:h:ls-electric:xbc-dn32u:-:*:*:*:*:*:*:*"
] |
GHSA-pv82-4539-jh36 | virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password. | [] |
|
GHSA-f29q-j8gp-v5cf | The forms servlet (f90servlet) in Oracle Forms 4.5.10.22 allows remote attackers to cause a denial of service (TNS listener stop) via a userid parameter that contains a STOP command. | [] |
|
GHSA-rmr4-hpcj-ppcf | Out-of-bounds Read vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior, MELSOFT Navigator all versions and EZSocket all versions allows an attacker to cause a DoS condition in the software by getting a user to open malicious project file specially crafted by an attacker. | [] |
|
GHSA-c988-m9f7-4rc2 | An elevation of privilege vulnerability in the MediaTek touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-30202425. References: M-ALPS02898189. | [] |
|
GHSA-c9gj-g63f-9pcv | A SQL injection vulnerability in the WebUI component of IP Office Contact Center could allow an authenticated attacker to retrieve or alter sensitive data related to other users on the system. Affected versions of IP Office Contact Center include all 9.x and 10.x versions prior to 10.1.2.2.2-11201.1908. Unsupported versions not listed here were not evaluated. | [] |
|
GHSA-3944-77rg-ppg5 | Stack-based buffer overflow in the sendrmt function in bellmail in IBM AIX 5.2 and 5.3 allows local users to execute arbitrary code via a long parameter to the m command. | [] |
|
CVE-2020-24147 | Server-side request forgery (SSR) vulnerability in the WP Smart Import (wp-smart-import) plugin 1.0.0 for WordPress via the file field. | [
"cpe:2.3:a:xylusthemes:wp_smart_import:1.0.0:*:*:*:*:wordpress:*:*"
] |
|
GHSA-m9h2-j85p-w95r | Crob FTP daemon 3.5.2 allows remote attackers to cause a denial of service (crash) by repeatedly connecting to and disconnecting from the server. | [] |
|
GHSA-8gcg-g8ch-xhqg | NCP Secure Enterprise Client (aka VPN/PKI client) 8.30 Build 59, and possibly earlier versions, when the Link Firewall and Personal Firewall are both configured to block all inbound and outbound network traffic, allows context-dependent attackers to send inbound UDP traffic with source port 67 and destination port 68, and outbound UDP traffic with source port 68 and destination port 67. | [] |
|
GHSA-5r72-jhpg-7v5v | Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30197. | [] |
|
CVE-2020-13157 | modules\users\admin\edit.php in NukeViet 4.4 allows CSRF to change a user's password via an admin/index.php?nv=users&op=edit&userid= URI. The old password is not needed. | [
"cpe:2.3:a:nukeviet:nukeviet:4.4:*:*:*:*:*:*:*"
] |
|
CVE-2004-1619 | Buffer overflow in Privateer's Bounty: Age of Sail II allows remote attackers to execute arbitrary code via a long nickname. | [
"cpe:2.3:a:akella:privateers_bounty_age_of_sail_ii:1.4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:akella:privateers_bounty_age_of_sail_ii:1.55:*:*:*:*:*:*:*",
"cpe:2.3:a:akella:privateers_bounty_age_of_sail_ii:1.56:*:*:*:*:*:*:*"
] |
|
GHSA-rjm8-hjq2-73j6 | Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call. | [] |
|
GHSA-33jp-9c34-9c92 | An issue was discovered in CSS-TRICKS Chat2 through 2015-05-05. The userid parameter in jumpin.php has a SQL injection vulnerability. | [] |
|
CVE-2021-29938 | An issue was discovered in the slice-deque crate through 2021-02-19 for Rust. A double drop can occur in SliceDeque::drain_filter upon a panic in a predicate function. | [
"cpe:2.3:a:slice-deque_project:slice-deque:*:*:*:*:*:rust:*:*"
] |
|
GHSA-w363-9mqj-xj3x | The Mollie for Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 5.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
GHSA-2pr9-w7jf-v4v7 | Philips SureSigns VS4, A.07.107 and prior. The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. | [] |
|
GHSA-fw79-wq25-6xpv | In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_syncThis checks if the ACL connection remains valid as it could be destroyed
while hci_enhanced_setup_sync is pending on cmd_sync leading to the
following trace:BUG: KASAN: slab-use-after-free in hci_enhanced_setup_sync+0x91b/0xa60
Read of size 1 at addr ffff888002328ffd by task kworker/u5:2/37CPU: 0 UID: 0 PID: 37 Comm: kworker/u5:2 Not tainted 6.11.0-rc6-01300-g810be445d8d6 #7099
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
<TASK>
dump_stack_lvl+0x5d/0x80
? hci_enhanced_setup_sync+0x91b/0xa60
print_report+0x152/0x4c0
? hci_enhanced_setup_sync+0x91b/0xa60
? __virt_addr_valid+0x1fa/0x420
? hci_enhanced_setup_sync+0x91b/0xa60
kasan_report+0xda/0x1b0
? hci_enhanced_setup_sync+0x91b/0xa60
hci_enhanced_setup_sync+0x91b/0xa60
? __pfx_hci_enhanced_setup_sync+0x10/0x10
? __pfx___mutex_lock+0x10/0x10
hci_cmd_sync_work+0x1c2/0x330
process_one_work+0x7d9/0x1360
? __pfx_lock_acquire+0x10/0x10
? __pfx_process_one_work+0x10/0x10
? assign_work+0x167/0x240
worker_thread+0x5b7/0xf60
? __kthread_parkme+0xac/0x1c0
? __pfx_worker_thread+0x10/0x10
? __pfx_worker_thread+0x10/0x10
kthread+0x293/0x360
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2f/0x70
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK>Allocated by task 34:
kasan_save_stack+0x30/0x50
kasan_save_track+0x14/0x30
__kasan_kmalloc+0x8f/0xa0
__hci_conn_add+0x187/0x17d0
hci_connect_sco+0x2e1/0xb90
sco_sock_connect+0x2a2/0xb80
__sys_connect+0x227/0x2a0
__x64_sys_connect+0x6d/0xb0
do_syscall_64+0x71/0x140
entry_SYSCALL_64_after_hwframe+0x76/0x7eFreed by task 37:
kasan_save_stack+0x30/0x50
kasan_save_track+0x14/0x30
kasan_save_free_info+0x3b/0x60
__kasan_slab_free+0x101/0x160
kfree+0xd0/0x250
device_release+0x9a/0x210
kobject_put+0x151/0x280
hci_conn_del+0x448/0xbf0
hci_abort_conn_sync+0x46f/0x980
hci_cmd_sync_work+0x1c2/0x330
process_one_work+0x7d9/0x1360
worker_thread+0x5b7/0xf60
kthread+0x293/0x360
ret_from_fork+0x2f/0x70
ret_from_fork_asm+0x1a/0x30 | [] |
|
CVE-2025-0867 | Privilege Escalation in MEAC300 | The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level. | [] |
CVE-2022-26420 | An OS command injection vulnerability exists in the console infactory_port functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability. | [
"cpe:2.3:o:inhandnetworks:ir302_firmware:3.5.37:*:*:*:*:*:*:*",
"cpe:2.3:h:inhandnetworks:ir302:-:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.