id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2012-4920 | Directory traversal vulnerability in the zing_forum_output function in forum.php in the Zingiri Forum (aka Forums) plugin before 1.4.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter to index.php. | [
"cpe:2.3:a:zingiri:forums:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zingiri:forums:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-27956 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, watchOS 9.4. Processing a maliciously crafted image may result in disclosure of process memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-5g4q-5r23-wrrp | Missing Authorization vulnerability in Webcodin WCP Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WCP Contact Form: from n/a through 3.1.0. | [] |
|
CVE-2024-50514 | WordPress Ninja Forms – The Contact Form Builder That Grows With You plugin <= 3.8.16 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saturday Drive Ninja Forms allows Stored XSS.This issue affects Ninja Forms: from n/a through 3.8.16. | [] |
GHSA-wpxr-mh93-p33r | Incorrect Default Permissions vulnerability in Hitachi Tuning Manager on Windows (Hitachi Tuning Manager server component) allows local users to read and write specific files.This issue affects Hitachi Tuning Manager: before 8.8.5-04. | [] |
|
GHSA-8cv4-ph8g-vj2w | A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API. | [] |
|
GHSA-4h6x-9m53-wfc7 | The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens. | [] |
|
CVE-2024-47833 | Session Cookie without Secure and HTTPOnly flags in taipy | Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:avaiga:taipy:*:*:*:*:*:*:*:*"
] |
GHSA-83hm-mmvp-ggxp | RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter. | [] |
|
CVE-2013-0110 | nvSCPAPISvr.exe in the NVIDIA Stereoscopic 3D Driver service, as distributed with the NVIDIA driver before 307.78, and Release 310 before 311.00, on Windows, lacks " (double quote) characters in the service path, which allows local users to gain privileges via a Trojan horse program. | [
"cpe:2.3:a:nvidia:driver:*:-:*:*:*:windows:*:*",
"cpe:2.3:a:nvidia:driver:310.00:-:*:*:*:windows:*:*"
] |
|
GHSA-w7jr-5292-3wmh | Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10 CU2 and 12.0.6 allows remote authenticated users to affect confidentiality via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is related to unrestricted guest access to the "About Us Page" in the Oracle Applications Framework (OAF), which allows attackers to obtain sensitive system and application environment information. | [] |
|
CVE-2006-4773 | Sun StorEdge 6130 Array Controllers with firmware 06.12.10.11 and earlier allow remote attackers to cause a denial of service (controller reboot) via a flood of traffic on the LAN. | [
"cpe:2.3:h:sun:storedge_6130_arrays:*:*:*:*:*:*:*:*"
] |
|
GHSA-h8mf-8qf9-cg8w | A vulnerability was found in luckyshot CRMx and classified as critical. This issue affects the function get/save/delete/comment/commentdelete of the file index.php. The manipulation leads to sql injection. The attack may be initiated remotely. The name of the patch is 8c62d274986137d6a1d06958a6f75c3553f45f8f. It is recommended to apply a patch to fix this issue. The identifier VDB-216185 was assigned to this vulnerability. | [] |
|
CVE-2009-4607 | The command line interface in Overland Storage Snap Server 410 with GuardianOS 5.1.041 runs the "less" utility with a higher-privileged uid than the CLI user and without sufficient restriction on shell escapes, which allows local users to gain privileges using the "!" character within less to access a privileged shell. | [
"cpe:2.3:h:overlandstorage:snap_server_410:*:*:*:*:*:*:*:*",
"cpe:2.3:o:overlandstorage:guardianos:5.1.041:*:*:*:*:*:*:*"
] |
|
CVE-2016-10524 | i18n-node-angular is a module used to interact between i18n and angular without using additional resources. A REST API endpoint that is used for development in i18n-node-angular before 1.4.0 was not disabled in production environments a malicious user could fill up the server causing a Denial of Service or content injection. | [
"cpe:2.3:a:i18n-node-angular_project:i18n-node-angular:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-82j2-x2fm-j878 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, SD 835, SDM630, SDM636, SDM660, and Snapdragon_High_Med_2016, the Access Control policy for HLOS allows access to Slimbus, GPU, GIC resources. | [] |
|
CVE-2019-5887 | An issue was discovered in ShopXO 1.2.0. In the UnlinkDir method of the FileUtil.php file, the input parameters are not checked, resulting in input mishandling by the rmdir method. Attackers can delete arbitrary files by using "../" directory traversal. | [
"cpe:2.3:a:shopxo:shopxo:1.2.0:*:*:*:*:*:*:*"
] |
|
GHSA-hvrr-2wvw-8fx3 | An issue was discovered in YXcms 1.4.7. Cross-site request forgery (CSRF) vulnerability in protected/apps/admin/controller/adminController.php allows remote attackers to delete administrator accounts via index.php?r=admin/admin/admindel. | [] |
|
GHSA-6wj9-77wq-jq7p | Nokogiri is vulnerable to XML External Entity (XXE) attack | Nokogiri before 1.5.4 is vulnerable to XXE attacks. | [] |
GHSA-6x73-7qr6-jmxm | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-glossary.php by adding a question mark (?) followed by the payload. | [] |
|
GHSA-4m2r-q6jf-fq73 | ok-file-formats master 2021-9-12 is affected by a buffer overflow in ok_jpg_convert_data_unit_grayscale and ok_jpg_convert_YCbCr_to_RGB. | [] |
|
CVE-2021-3999 | A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:nfs_plug-in:*:*:*:*:*:vmware_vaai:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*"
] |
|
GHSA-cjwj-wvcj-rr5c | Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow. | [] |
|
CVE-2023-24515 | Server side request forgery in api checker | Server-Side Request Forgery (SSRF) vulnerability in API checker of Pandora FMS. Application does not have a check on the URL scheme used while retrieving API URL. Rather than validating the http/https scheme, the application allows other scheme such as file, which could allow a malicious user to fetch internal file content. This issue affects Pandora FMS v767 version and prior versions on all platforms. | [
"cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*"
] |
GHSA-5xrf-xvwc-pmfg | Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to receive all orders from the online shop via oordershow component in customer function. | [] |
|
GHSA-697q-3j3g-cvrq | Open redirect vulnerability in remotereporter/load_logfiles.php in Netsweeper before 4.0.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter. | [] |
|
GHSA-w6gx-j65f-mmx4 | A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. | [] |
|
GHSA-prqh-6jh9-2qr5 | The AI Power: Complete AI Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.8.96 via the wpaicg_troubleshoot_add_vector(). This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | [] |
|
GHSA-8f4q-m74h-w3gr | Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted JPEG2000 image. | [] |
|
CVE-2024-52298 | macro-pdfviewer's preview in WYSIWYG editor allows accessing any PDF document as the last author | macro-pdfviewer is a PDF Viewer Macro for XWiki using Mozilla pdf.js. The PDF Viewer macro allows an attacker to view any attachment using the "Delegate my view right" feature as long as the attacker can view a page whose last author has access to the attachment. For this, the attacker only needs to provide the reference to a PDF file to the macro. To obtain the reference of the desired attachment, the attacker can access the Page Index, Attachments tab. Even if the UI shows N/A, the user can inspect the page and check the HTTP request that fetches the live data entries. The attachment URL is available in the returned JSON for all attachments, including protected ones and allows getting the necessary values. This vulnerability is fixed in version 2.5.6. | [
"cpe:2.3:a:xwikisas:macro_pdfviewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:pdf_viewer_macro:*:*:*:*:pro:*:*:*"
] |
GHSA-2vgf-299m-xvm7 | "HCL Connections is vulnerable to possible information leakage and could disclose sensitive information via stack trace to a local user." | [] |
|
CVE-2022-45582 | Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter. | [
"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*"
] |
|
GHSA-82h9-wxqp-j6pq | The fetch function in OAuth/Curl.php in Dropbox-PHP, as used in ownCloud Server before 6.0.8, 7.x before 7.0.6, and 8.x before 8.0.4 when an external Dropbox storage has been mounted, allows remote administrators of Dropbox.com to read arbitrary files via an @ (at sign) character in unspecified POST values. | [] |
|
GHSA-276c-r54j-3fg6 | MRcgi/MRProcessIncomingForms.pl in Numara FootPrints 8.1 on Linux allows remote attackers to execute arbitrary code via shell metacharacters in the PROJECTNUM parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-26p4-rg6r-f676 | Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the readLine() function when reading images in XPM format. | [] |
|
CVE-2022-29490 | A vulnerability exists in the Workplace X WebUI in which an authenticated user is able to execute any MicroSCADA internal scripts irrespective of the authenticated user's role. | Improper Authorization vulnerability exists in the Workplace X WebUI of the Hitachi Energy MicroSCADA X SYS600 allows an authenticated user to execute any MicroSCADA internal scripts irrespective of the authenticated user's role. This issue affects: Hitachi Energy MicroSCADA X SYS600 version 10 to version 10.3.1. cpe:2.3:a:hitachienergy:microscada_x_sys600:10:*:*:*:*:*:*:* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.1:*:*:*:*:*:*:* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:*:*:*:*:*:*:* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:*:*:*:*:*:*:* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:*:*:*:*:*:*:* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:*:*:*:*:*:*:* | [
"cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hitachienergy:sys600:-:*:*:*:*:*:*:*"
] |
GHSA-q4fh-gx6m-wmgw | An issue was discovered in certain Apple products. iOS before 11.2 is affected. tvOS before 11.2 is affected. The issue involves the "App Store" component. It allows man-in-the-middle attackers to spoof password prompts. | [] |
|
CVE-2023-50880 | WordPress BuddyPress Plugin <= 11.3.1 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The BuddyPress Community BuddyPress allows Stored XSS.This issue affects BuddyPress: from n/a through 11.3.1.
| [
"cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:wordpress:*:*"
] |
GHSA-4vrv-4wc3-4q25 | Sourcecodester Human Resource Management System 1.0 is vulnerable to Insecure Permissions resulting in privilege escalation. | [] |
|
CVE-2018-2955 | Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Integration). The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:hospitality_opera_property_management:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_opera_property_management:5.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-hvh3-v3c3-3rmj | The Better Font Awesome WordPress plugin before 2.0.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] |
|
CVE-2017-10157 | Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher accessible data as well as unauthorized read access to a subset of BI Publisher accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-2123 | Jenkins RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | [
"cpe:2.3:a:jenkins:radargun:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2022-29558 | Realtek rtl819x-SDK before v3.6.1 allows command injection over the web interface. | [
"cpe:2.3:a:realtek:rtl819x_software_development_kit:*:*:*:*:*:*:*:*"
] |
|
GHSA-rqw8-5cfg-cppr | Target specific data is being sent to remote server and leads to information exposure in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCA6574AU, QCS605, Rennell, SDA660, SDM429W, SDM439, SDM450, SDM710, SDM845, SM7150, SM8150, SM8250, SXR2130 | [] |
|
GHSA-vwh2-hwm2-c8vp | This candidate was in a CNA pool that was not assigned to any issues during 2022. | [] |
|
CVE-2023-29745 | An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause a persistent denial of service attack by manipulating the database. | [
"cpe:2.3:a:bestweather_project:bestweather:7.3.1:*:*:*:*:android:*:*"
] |
|
CVE-2006-2308 | Directory traversal vulnerability in the IMAP service in EServ/3 3.25 allows remote authenticated users to read other user's email messages, create/rename arbitrary directories on the system, and delete empty directories via directory traversal sequences in the (1) CREATE, (2) SELECT, (3) DELETE, (4) RENAME, (5) COPY or (6) APPEND commands. | [
"cpe:2.3:a:etype:eserv:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:3.25:*:*:*:*:*:*:*"
] |
|
CVE-2019-4343 | IBM Cognos Analytics 11.0 and 11.1 allows overly permissive cross-origin resource sharing which could allow an attacker to transfer private information. An attacker could exploit this vulnerability to access content that should be restricted. IBM X-Force ID: 161422. | [
"cpe:2.3:a:ibm:cognos_analytics:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
GHSA-q28v-c573-4gfw | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [] |
|
GHSA-q6hr-rj2r-76hq | A privilege escalation vulnerability was discovered in an upload processing functionality of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads. | [] |
|
CVE-2021-43319 | Zoho ManageEngine Network Configuration Manager before 125488 is vulnerable to command injection due to improper validation in the Ping functionality. | [
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:11.0:build11000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.0:build12000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.1:build12100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.2:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.2:build12200:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build12300:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123023:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123035:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123052:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123055:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123057:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123064:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123069:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123070:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123083:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123091:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123105:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123106:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123123:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123129:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123137:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123151:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123156:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123159:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123169:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123177:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123179:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123191:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123194:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123206:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123207:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123214:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123215:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123217:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123218:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123222:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123223:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123231:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123237:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123239:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123274:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123277:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123279:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123288:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123304:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123306:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123312:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.3:build123327:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124022:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124024:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124026:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124031:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124041:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124043:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124057:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124073:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124079:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124094:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124095:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124098:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124099:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124168:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124172:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124176:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124177:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124181:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124186:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124188:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.4:build124196:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125120:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125121:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125125:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125129:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125136:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125142:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125149:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125180:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125195:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125199:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125212:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125213:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125216:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125228:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125232:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125233:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125234:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125325:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125327:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125329:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125343:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125345:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125358:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125362:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125363:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125378:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125392:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125399:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125417:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125436:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125445:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125455:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125465:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125469:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125471:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125482:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125483:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.5:build125485:*:*:*:*:*:*"
] |
|
CVE-2025-3238 | PHPGurukul Online Fire Reporting System search-request.php sql injection | A vulnerability classified as critical has been found in PHPGurukul Online Fire Reporting System 1.2. Affected is an unknown function of the file /search-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-v935-c7vg-r239 | NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username "superman" and password "21241036", which allows remote attackers to modify the configuration. | [] |
|
CVE-2025-2998 | PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption | A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. | [] |
GHSA-jr75-hf3m-463w | Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/?p=view_product&id=. | [] |
|
GHSA-7mf2-7qv8-9w8f | The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library. | [] |
|
CVE-2004-0866 | Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session. | [
"cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-jmgx-64x4-v838 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-pc9w-85g9-jxvh | Multiple unspecified vulnerabilities in form input validation in web-app.org WebAPP before 0.9.9.6 allow remote authenticated users to corrupt data files, gain access to private files, and execute arbitrary code via "certain characters." | [] |
|
CVE-2021-40104 | An issue was discovered in Concrete CMS through 8.5.5. There is an SVG sanitizer bypass. | [
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-26541 | The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability. | [
"cpe:2.3:a:gitlog_project:gitlog:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-5464-p3fw-cx33 | The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Lightbox widget in all versions up to, and including, 5.10.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-7g4j-cqwh-2jf3 | Cross-site scripting (XSS) vulnerability in the CDN2 Video module 6.x for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-8vf4-47vh-64rm | ** DISPUTED ** An issue was discovered in the com.dropbox.android application 98.2.2 for Android. The FingerprintManager class for Biometric validation allows authentication bypass through the callback method from onAuthenticationFailed to onAuthenticationSucceeded with null, because the fingerprint API in conjunction with the Android keyGenerator class is not implemented. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred. | [] |
|
GHSA-ww2v-frv5-pj5x | Joplin is vulnerable to arbitrary code execution | Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles. | [] |
GHSA-m7x4-j34m-52hc | An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. | [] |
|
GHSA-xwxc-wc23-rvj5 | Netscape Navigator 7.0.2 and Mozilla allows remote attackers to access cookie information in a different domain via an HTTP request for a domain with an extra . (dot) at the end. | [] |
|
GHSA-qh77-fp8q-rm39 | Multiple SQL injection vulnerabilities in upload.php in the Powerplay Gallery plugin 3.3 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) albumid or (2) name parameter. | [] |
|
CVE-2021-25675 | A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a divide by zero operation could occur and cause the application to terminate unexpectedly and must be restarted to restore the service. | [
"cpe:2.3:a:siemens:simatic_s7-plcsim:5.4:*:*:*:*:*:*:*"
] |
|
GHSA-vq28-jqwh-gg7q | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] |
|
CVE-2021-4360 | The Controlled Admin Access plugin for WordPress is vulnerable to Privilege Escalation in versions up to, and including, 1.5.5 by not properly restricting access to the configuration page. This makes it possible for attackers to create a new administrator role with unrestricted access. | [
"cpe:2.3:a:wpruby:controlled_admin_access:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-8m7p-5m49-8xxm | A vulnerability was found in Genexis Tilgin Home Gateway 322_AS0500-03_05_13_05. It has been classified as problematic. Affected is an unknown function of the file /vood/cgi-bin/vood_view.cgi?act=index&lang=EN# of the component Login. The manipulation of the argument errmsg leads to basic cross site scripting. It is possible to launch the attack remotely. VDB-268854 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2016-6603 | ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to bypass authentication and impersonate arbitrary users via the UserName HTTP header. | [
"cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:webnms_framework:5.2:sp1:*:*:*:*:*:*"
] |
|
GHSA-qj3c-jhpr-p28m | An issue in GetSimpleCMS v.3.4.0a allows a remote attacker to execute arbitrary code via a crafted payload to the phpinfo(). | [] |
|
GHSA-rwxp-c37g-r3vj | {fmt} 7.1.0 through 8.0.1 has a stack-based buffer overflow in fmt::v8::detail::dragonbox::umul192_upper64 (called from fmt::v8::detail::dragonbox::cache_accessor<double>::compute_mul and fmt::v8::detail::dragonbox::decimal_fp<double> fmt::v8::detail::dragonbox::to_de). | [] |
|
GHSA-64vh-6qw4-vp3r | The WP STAGING WordPress Backup Plugin before 3.1.3 and WP STAGING Pro WordPress Backup Plugin before 5.1.3 do not prevent visitors from leaking key information about ongoing backups processes, allowing unauthenticated attackers to download said backups later. | [] |
|
CVE-2024-1560 | Path Traversal Vulnerability in mlflow/mlflow | A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the artifact deletion functionality. Attackers can bypass path validation by exploiting the double decoding process in the `_delete_artifact_mlflow_artifacts` handler and `local_file_uri_to_path` function, allowing for the deletion of arbitrary directories on the server's filesystem. This vulnerability is due to an extra unquote operation in the `delete_artifacts` function of `local_artifact_repo.py`, which fails to properly sanitize user-supplied paths. The issue is present up to version 2.9.2, despite attempts to fix a similar issue in CVE-2023-6831. | [
"cpe:2.3:a:mlflow:mlflow:*:*:*:*:*:*:*:*"
] |
GHSA-3g45-cx6m-2pfc | The Framer Preview application 12 for Android exposes com.framer.viewer.FramerViewActivity to other applications. By calling the intent with the action set to android.intent.action.VIEW, any other application is able to load any website/web content into the application's context, which is shown as a full-screen overlay to the user. | [] |
|
CVE-2014-1248 | Buffer overflow in Apple QuickTime before 7.7.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted ldat atom in a movie file. | [
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.60.92.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.62.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.64.17.73:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.65.17.80:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.66.71.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.67.75.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.68.75.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.69.80.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.70.80.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.71.80.42:*:*:*:*:*:*:*"
] |
|
CVE-2007-1845 | SQL injection vulnerability in show_event.php in the Expanded Calendar (calendar_panel) 2.00 module for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the m_month parameter. | [
"cpe:2.3:a:php_fusion:expanded_calendar_module:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-48535 | A stored cross-site scripting (XSS) vulnerability in eSoft Planner 3.24.08271-USA allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter. | [] |
|
GHSA-5gjq-58c4-9ff5 | The POSIX::2008 package before 0.24 for Perl has a potential _execve50c env buffer overflow. | [] |
|
CVE-2017-1659 | "HCL iNotes is susceptible to a Cross-Site Scripting (XSS) Vulnerability. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials." | [
"cpe:2.3:a:ibm:inotes:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-19946 | The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this improper certificate validation vulnerability could allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. QNAP has already fixed the issue in Helpdesk 3.0.3 and later. | [
"cpe:2.3:a:qnap:helpdesk:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-37463 | In NCH Quorum v2.03 and earlier, XSS exists via User Display Name (stored). | [
"cpe:2.3:a:nchsoftware:quorum:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-3269 | Multiple cross-site scripting (XSS) vulnerabilities in Papoo Light 3.6 before 20070611 allow remote attackers to inject arbitrary web script or HTML via (1) the URI in a GET request or (2) the Title field of a visitor comment, and (3) allow remote authenticated users to inject arbitrary web script or HTML via a message to another user. NOTE: vector (2) might overlap CVE-2006-3571.1. | [
"cpe:2.3:a:papoo:papoo_cms_light:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-20805 | Cisco Umbrella Secure Web Gateway File Decryption Bypass Vulnerability | A vulnerability in the automatic decryption process in Cisco Umbrella Secure Web Gateway (SWG) could allow an authenticated, adjacent attacker to bypass the SSL decryption and content filtering policies on an affected system. This vulnerability is due to how the decryption function uses the TLS Sever Name Indication (SNI) extension of an HTTP request to discover the destination domain and determine if the request needs to be decrypted. An attacker could exploit this vulnerability by sending a crafted request over TLS from a client to an unknown or controlled URL. A successful exploit could allow an attacker to bypass the decryption process of Cisco Umbrella SWG and allow malicious content to be downloaded to a host on a protected network. There are workarounds that address this vulnerability. | [
"cpe:2.3:a:cisco:umbrella_secure_web_gateway:*:*:*:*:*:*:*:*"
] |
CVE-2017-11752 | The ReadMAGICKImage function in coders/magick.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-4:*:*:*:*:*:*:*"
] |
|
CVE-2024-6067 | SourceCodester Music Class Enrollment System sql injection | A vulnerability classified as critical was found in SourceCodester Music Class Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file /mces/?p=class/view_class. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268795. | [
"cpe:2.3:a:music_class_enrollment_system_project:music_class_enrollment_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:music_class_enrollment_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2018-15466 | Cisco Policy Suite Graphite Unauthenticated Read-Only Access Vulnerability | A vulnerability in the Graphite web interface of the Policy and Charging Rules Function (PCRF) of Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access the Graphite web interface. The attacker would need to have access to the internal VLAN where CPS is deployed. The vulnerability is due to lack of authentication. An attacker could exploit this vulnerability by directly connecting to the Graphite web interface. An exploit could allow the attacker to access various statistics and Key Performance Indicators (KPIs) regarding the Cisco Policy Suite environment. | [
"cpe:2.3:a:cisco:policy_suite_for_mobile:12.0.0:*:*:*:*:*:*:*"
] |
GHSA-rf7q-m4h8-9j2r | The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack. | [] |
|
GHSA-vf8h-2wwj-jq22 | Privilege escalation in Apache ShenYu | Improper Privilege Management vulnerability in Apache Software Foundation Apache ShenYu. ShenYu Admin allows low-privilege low-level administrators create users with higher privileges than their own. This issue affects Apache ShenYu: 2.5.0. Upgrade to Apache ShenYu 2.5.1 or apply patch https://github.com/apache/shenyu/pull/3958. | [] |
GHSA-46v8-4qjh-4856 | Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image. | [] |
|
CVE-2025-2781 | WatchGuard Mobile VPN with SSL Local Privilege Escalation via Non-Standard Installation Directory | The WatchGuard Mobile VPN with SSL Client on Windows does not properly configure directory permissions when installed in a non-default directory. This could allow an authenticated local attacker to escalate to SYSTEM privileges on a vulnerable system.
This issue affects Mobile VPN with SSL Client: from 11.0 through 12.11. | [] |
CVE-2021-38658 | Microsoft Office Graphics Remote Code Execution Vulnerability | Microsoft Office Graphics Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:-:*:-:*:-:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*"
] |
CVE-2023-38722 | IBM Sterling Partner Engagement Manager cross-site scripting | IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 262174. | [
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:essentials:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:essentials:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:essentials:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:standard:*:*:*"
] |
CVE-2020-19626 | Cross Site Scripting (XSS) vulnerability in craftcms 3.1.31, allows remote attackers to inject arbitrary web script or HTML, via /admin/settings/sites/new. | [
"cpe:2.3:a:craftcms:craft_cms:3.1.31:*:*:*:*:*:*:*"
] |
|
CVE-2020-27608 | In BigBlueButton before 2.2.28 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document. | [
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-26556 | WordPress WP AntiDDOS Plugin <= 2.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in zzmaster WP AntiDDOS allows Reflected XSS. This issue affects WP AntiDDOS: from n/a through 2.0. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.