id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-34gx-cprw-qgmf | Huawei smartphone Lion-AL00C with versions earlier than 10.0.0.205(C00E202R7P2) have a denial of service vulnerability. An attacker crafted specially file to the affected device. Due to insufficient input validation of the value when executing the file, successful exploit may cause device abnormal. | [] |
|
CVE-2011-1624 | Cisco IOS 12.2(58)SE, when a login banner is configured, allows remote attackers to cause a denial of service (device reload) by establishing two SSH2 sessions, aka Bug ID CSCto62631. | [
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*"
] |
|
GHSA-hv8x-v629-q57h | Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [] |
|
GHSA-8cfq-2x94-5fqr | JTBC(PHP) 3.0.1.7 has XSS via the console/xml/manage.php?type=action&action=edit content parameter. | [] |
|
GHSA-94mm-6r76-6pgh | Memory safety bugs present in Firefox 130. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 131 and Thunderbird < 131. | [] |
|
GHSA-xwc6-f3w2-2jmm | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Photo Gallery Team Photo Gallery by 10Web allows Reflected XSS.This issue affects Photo Gallery by 10Web: from n/a through 1.8.21. | [] |
|
CVE-2019-1791 | Cisco NX-OS Software Command Injection Vulnerability | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands with elevated privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9432pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9536pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9636pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9736pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9432c-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9464px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9464tx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9564px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9564tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x97160yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9732c-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9736c-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9788tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9504-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-c9508-fm-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x96136yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x96136yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636c-rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_4-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_9-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_2-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_6-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f312ck-26:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f324fq-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f348xp-23:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f430cq-36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f248xp-25e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f306ck-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f312fq-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m202cf-22l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m206fq-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m224xp-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*"
] |
GHSA-vqc6-2j8r-xqpr | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters ). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data as well as unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). | [] |
|
GHSA-w927-2fmj-w74v | The Volume Manager Extension Driver in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2 allows an attacker to run a specially crafted application and obtain kernel information, aka "Volume Manager Extension Driver Information Disclosure Vulnerability". | [] |
|
GHSA-h382-4j66-7v4w | Due to the lack of validation, SAP BusinessObjects Business Intelligence Platform (Version Management System) - version 403, permits an unauthenticated user to read the code snippet through the UI, which leads to low impact on confidentiality and no impact on the application's availability or integrity. | [] |
|
GHSA-cmv8-6362-r5w9 | Malicious HTML+XHR Artifact Privilege Escalation in Argo Workflows | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes.The attacker creates a workflow that produces a HTML artifact that contains a HTML file that contains a script which uses XHR calls to interact with the Argo Server API.The attacker emails the deep-link to the artifact to their victim. The victim opens the link, the script starts running.As the script has access to the Argo Server API (as the victim), so may do the following (if the victim may):Read information about the victim’s workflows.Create or delete workflows.Notes:The attacker must be an insider: they must have access to the same cluster as the victim and must already be able to run their own workflows.The attacker must have an understanding of the victim’s system. They won’t be able to repeatedly probe due to the social engineering aspect.The attacker is likely leave an audit trail.We have seen no evidence of this in the wild. While the impact is high, it is very hard to exploit.We urge all users to upgrade to the fixed versions. Disabling the Argo Server is the only known workaround. Note version 2.12 has been out of support for sometime. No fix is currently planned. | [] |
CVE-2017-14611 | SSRF (Server Side Request Forgery) in Cockpit 0.13.0 allows remote attackers to read arbitrary files or send TCP traffic to intranet hosts via the url parameter, related to use of the discontinued aheinze/fetch_url_contents component. | [
"cpe:2.3:a:agentejo:cockpit:0.13.0:*:*:*:*:*:*:*"
] |
|
GHSA-3hwv-x5p9-3h2h | In Bluetooth, there is a possible way to pair a display only device without PIN confirmation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-222289114 | [] |
|
GHSA-7f69-xr47-93rv | Unspecified vulnerability in the (1) Xsun and (2) Xprt commands in Solaris 7, 8, 9, and 10 allows local users to execute arbitrary code. | [] |
|
GHSA-j8c7-fm85-6jj6 | Jenkins Call Remote Job Plugin has Insufficiently Protected Credentials | Call Remote Job Plugin stores a password unencrypted in job `config.xml` files on the Jenkins controller. This password can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.As of publication of this advisory, there is no fix. | [] |
GHSA-rr65-f966-j89f | A vulnerability, which was classified as problematic, has been found in foxoverflow MySimplifiedSQL. This issue affects some unknown processing of the file MySimplifiedSQL_Examples.php. The manipulation of the argument FirstName/LastName leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 3b7481c72786f88041b7c2d83bb4f219f77f1293. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217595. | [] |
|
CVE-2023-6160 | The LifterLMS – WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 7.4.2 via the maybe_serve_export function. This makes it possible for authenticated attackers, with administrator or LMS manager access and above, to read the contents of arbitrary CSV files on the server, which can contain sensitive information as well as removing those files from the server. | [
"cpe:2.3:a:lifterlms:lifterlms:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2008-2852 | Cross-site scripting (XSS) vulnerability in CGIWrap before 4.1, when an Internet Explorer based browser is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to failure to set the charset in error messages. | [
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nathan_neulinger:cgiwrap:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-hf77-3367-255v | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mailDoc method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6059. | [] |
|
CVE-2023-23442 |
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.
| [
"cpe:2.3:o:hihonor:magic_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-6055 | PreProjects Pre Classified Listings stores pclasp.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request. | [
"cpe:2.3:a:preprojects:pre_classified_listings:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-4857 | Modbus Tools Modbus Poll mbp File mbpoll.exe buffer overflow | A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and classified as critical. Affected by this issue is some unknown functionality of the file mbpoll.exe of the component mbp File Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-217022 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:modbustools:modbus_poll:*:*:*:*:*:*:*:*"
] |
GHSA-7pw9-vhmf-gf4j | PHP Scripts Mall Citysearch / Hotfrog / Gelbeseiten Clone Script 2.0.1 has Reflected XSS via the srch parameter, as demonstrated by restaurants-details.php. | [] |
|
GHSA-pf9c-4vfw-gppq | Z-BlogPHP 1.5.1 has XSS via the zb_users/plugin/AppCentre/plugin_edit.php app_id parameter. The component must be accessed directly by an administrator, or through CSRF. | [] |
|
CVE-2022-30709 | Improper input validation check logic vulnerability in SECRIL prior to SMR Jun-2022 Release 1 allows attackers to trigger crash. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2005-4842 | The System Monitor Source Properties control allows remote attackers to cause a denial of service (Internet Explorer crash) by creating a COM object of the class associated with the control's CLSID, which is not intended for use within Internet Explorer. | [
"cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-j4mh-p8f2-3c4h | Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142. | [] |
|
CVE-2010-0717 | The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 does not prevent unsafe package actions, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*"
] |
|
CVE-2023-30935 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-25490 | WordPress Archivist – Custom Archive Templates Plugin <= 1.7.4 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin <= 1.7.4 versions. | [
"cpe:2.3:a:archivist_-_custom_archive_templates_project:archivist_-_custom_archive_templates:*:*:*:*:*:wordpress:*:*"
] |
CVE-2016-10271 | tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13. | [
"cpe:2.3:a:libtiff:libtiff:4.0.7:*:*:*:*:*:*:*"
] |
|
GHSA-9jhp-mffm-h2q2 | Multiple issues in ld64 in the Xcode toolchains were addressed by updating to version ld64-507.4. This issue is fixed in Xcode 11.0. Compiling code without proper input validation could lead to arbitrary code execution with user privilege. | [] |
|
CVE-2022-38362 | Docker Provider <3.0 RCE vulnerability in example dag | Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host. | [
"cpe:2.3:a:apache:apache-airflow-providers-docker:*:*:*:*:*:*:*:*"
] |
GHSA-cg7p-35j3-wc73 | An information disclosure vulnerability exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle objects in memory, aka 'Windows Common Log File System Driver Information Disclosure Vulnerability'. | [] |
|
GHSA-9p2r-3443-pgvw | Cross-site scripting (XSS) vulnerability in index.php in Turnkey Ebook Store 1.1 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter in a search action. | [] |
|
CVE-2025-27888 | Apache Druid: Server-Side Request Forgery and Cross-Site Scripting | Severity: medium (5.8) / important
Server-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Druid.
This issue affects all previous Druid versions.
When using the Druid management proxy, a request that has a specially crafted URL could be used to redirect the request to an arbitrary server instead. This has the potential for XSS or XSRF. The user is required to be authenticated for this exploit. The management proxy is enabled in Druid's out-of-box configuration. It may be disabled to mitigate this vulnerability. If the management proxy is disabled, some web console features will not work properly, but core functionality is unaffected.
Users are recommended to upgrade to Druid 31.0.2 or Druid 32.0.1, which fixes the issue. | [] |
CVE-2023-42655 | In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed | [
"cpe:2.3:h:unisoc:t760:*:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:*:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:*:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-13139 | In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag. | [
"cpe:2.3:a:docker:docker:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-wrgr-v88r-75jx | The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the get_restore_progress() and restore() functions in all versions up to, and including, 0.9.68. This makes it possible for unauthenticated attackers to exploit a SQL injection vulnerability or trigger a DoS. | [] |
|
CVE-2006-7231 | SQL injection vulnerability in display.asp in Civica Software Civica allows remote attackers to execute arbitrary SQL commands via the Entry parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:civica_software:civica:*:*:*:*:*:*:*:*"
] |
|
GHSA-9m63-33q3-xq5x | Vela Server Has Insufficient Webhook Payload Data Verification | ImpactUsers with an enabled repository with access to repo level CI secrets in Vela are vulnerable to the exploit.Any user with access to the CI instance and the linked source control manager can perform the exploit.MethodBy spoofing a webhook payload with a specific set of headers and body data, an attacker could transfer ownership of a repository and its repo level secrets to a separate repository.These secrets could be exfiltrated by follow up builds to the repository.Patches`v0.26.3` — Image: `target/vela-server:v0.26.3`
`v0.25.3` — Image: `target/vela-server:v0.25.3`Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_There are no workarounds to the issue.References_Are there any links users can visit to find out more?_Please see linked CWEs (common weakness enumerators) for more information. | [] |
CVE-2022-25845 | Deserialization of Untrusted Data | The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode). | [
"cpe:2.3:a:alibaba:fastjson:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*"
] |
GHSA-jcxc-rh6w-wf49 | Link Following in Iris | This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder. | [] |
CVE-2018-4356 | A permissions issue existed. This issue was addressed with improved permission validation. This issue affected versions prior to iOS 12. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-51779 | WordPress Don't Break The Code plugin <= .3.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Stranger Studios (WordCamp Philly) Don't Break The Code allows Reflected XSS.This issue affects Don't Break The Code: from n/a through .3.1. | [] |
GHSA-q565-825q-gq7w | Multiple SQL injection vulnerabilities in Jupiter CMS allow remote attackers to execute arbitrary SQL commands via (1) the user name during login, or the (2) key or (3) fpwusername parameters in modules/register. | [] |
|
GHSA-hq4f-mv3q-8wcv | Craft CMS SQL injection vulnerability via the GraphQL API endpoint | Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint. | [] |
GHSA-fr3q-54vq-6672 | dotCMS 3.7.0 has XSS reachable from ext/languages_manager/edit_language in portal/layout via the bottom two form fields. | [] |
|
CVE-2004-0078 | Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages. | [
"cpe:2.3:a:mutt:mutt:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.2.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.2.5.12_ol:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*"
] |
|
GHSA-c6x5-g4w7-v3wh | Cross-site scripting (XSS) vulnerability in the validation feature in Macromedia ColdFusion 5 and earlier allows remote attackers to inject arbitrary web script or HTML via a "_required" field when the associated normal field is missing or empty, which is not sanitized before being presented in an error message. | [] |
|
GHSA-72v7-922f-7x9p | The FastL4 virtual server in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.3.0 through 11.5.2 and 11.6.0 through 11.6.0 HF4, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.2.1 through 11.3.0, and BIG-IP PSM 11.2.1 through 11.4.1 allows remote attackers to cause a denial of service (Traffic Management Microkernel restart) via a fragmented packet. | [] |
|
CVE-2015-6621 | SystemUI in Android 5.x before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23909438. | [
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-c2pf-ph9q-cqw4 | Expression Language Injection vulnerability in Hitachi Tuning Manager on Windows, Linux, Solaris allows Code Injection.This issue affects Hitachi Tuning Manager: before 8.8.7-00. | [] |
|
GHSA-jxqv-w6j2-6p4v | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability." | [] |
|
GHSA-22rm-mrhq-x76h | Arbitrary camera access and monitoring via cloud in Hanwha Techwin Smartcams | [] |
|
CVE-2023-1069 | Complianz - GDPR/CCPA Cookie Consent < 6.4.2 - Contributor+ Stored XSS | The Complianz WordPress plugin before 6.4.2, Complianz Premium WordPress plugin before 6.4.2 do not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:really-simple-plugins:complianz:*:*:*:*:-:wordpress:*:*",
"cpe:2.3:a:really-simple-plugins:complianz:*:*:*:*:premium:wordpress:*:*"
] |
CVE-2014-2047 | Session fixation vulnerability in ownCloud before 6.0.2, when PHP is configured to accept session parameters through a GET request, allows remote attackers to hijack web sessions via unspecified vectors. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2011-2302 | Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Single Sign On. | [
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-h8p6-g323-v7g2 | In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561. | [] |
|
GHSA-ghpq-vjxw-ch5w | Use after free in libpulse-binding | OverviewVersion 1.2.1 of the `libpulse-binding` Rust crate, released on the 15th of June 2018, fixed a pair of use-after-free issues with the objects returned by the `get_format_info` and `get_context` methods of `Stream` objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destruction.This advisory is being written retrospectively, having previously only been noted in the changelog. No CVE assignment was sought.PatchesUsers are required to update to version 1.2.1 or newer.Versions older than 1.2.1 have been yanked from crates.io. This was believed to have already been done at the time of the 1.2.1 release, but upon double checking now they were found to still be available, so has been done now (22nd October 2020). | [] |
GHSA-6646-39mj-h9x4 | B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php. | [] |
|
GHSA-2c6m-rwqw-pc6r | Cross-site scripting (XSS) vulnerability in index.php in PHP Labs proFile allows remote attackers to inject arbitrary web script or HTML via the (1) dir or (2) file parameters. | [] |
|
CVE-2024-57850 | jffs2: Prevent rtime decompress memory corruption | In the Linux kernel, the following vulnerability has been resolved:
jffs2: Prevent rtime decompress memory corruption
The rtime decompression routine does not fully check bounds during the
entirety of the decompression pass and can corrupt memory outside the
decompression buffer if the compressed data is corrupted. This adds the
required check to prevent this failure mode. | [] |
GHSA-j68j-xhqx-x92f | Implicit Intent hijacking vulnerability in Finder prior to SMR Jul-2022 Release 1 allow allows attackers to launch certain activities with privilege of Finder. | [] |
|
CVE-2023-4431 | Out of bounds memory access in Fonts in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-8xwh-69g8-mr3r | An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec. | [] |
|
CVE-2019-1003035 | An information exposure vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMAgentTemplate.java, src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java that allows attackers with Overall/Read permission to perform the 'verify configuration' form validation action, thereby obtaining limited information about the Azure configuration. | [
"cpe:2.3:a:jenkins:azure_vm_agents:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-47mx-6c68-86jm | Microsoft Office 2007 SP3 and Word 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3854. | [] |
|
CVE-2012-0978 | Stack-based buffer overflow in npjp2.dll in LuraWave JP2 Browser Plug-In 1.1.1.11 and other versions before 2.1.1.11 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment. | [
"cpe:2.3:a:luratech:lurawave_jp2_browser_plug-in:1.1.1.11:*:*:*:*:*:*:*"
] |
|
CVE-2018-10236 | POSCMS 3.2.18 allows remote attackers to execute arbitrary PHP code via the diy\dayrui\controllers\admin\Syscontroller.php 'add' function because an attacker can control the value of $data['name'] with no restrictions, and this value is written to the FCPATH.$file file. | [
"cpe:2.3:a:poscms:poscms:3.2.18:*:*:*:*:*:*:*"
] |
|
CVE-2023-24965 | IBM Aspera Faspex improper access control | IBM Aspera Faspex 5.0.5 does not restrict or incorrectly restricts access to a resource from an unauthorized actor. IBM X-Force ID: 246713. | [
"cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
CVE-2017-14984 | Cross-site scripting (XSS) vulnerability in the EyesOfNetwork web interface (aka eonweb) 5.1-0 allows remote authenticated users to inject arbitrary web script or HTML via the bp_name parameter to /module/admin_bp/add_services.php. | [
"cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.1-0:*:*:*:*:*:*:*"
] |
|
GHSA-r2hm-7w9p-5qrc | OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices. | [] |
|
CVE-2015-9317 | The awesome-support plugin before 3.1.7 for WordPress has XSS via custom information messages. | [
"cpe:2.3:a:getawesomesupport:awesome_support:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2017-16931 | parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name. | [
"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
] |
|
GHSA-fc5f-gc6j-gfhf | The Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 exposes the full path of a file when putting in a non-existent file in a parameter of the shortcode. | [] |
|
CVE-2017-5949 | JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 22, allows remote attackers to cause a denial of service (heap-based out-of-bounds write and application crash) or possibly have unspecified other impact via crafted JavaScript code that triggers access to red-zone memory locations, related to jit/ThunkGenerators.cpp, llint/LowLevelInterpreter32_64.asm, and llint/LowLevelInterpreter64.asm. | [
"cpe:2.3:a:apple:safari:22:*:*:*:technology_preview:*:*:*"
] |
|
CVE-2023-35169 | php-imap vulnerable to RCE through a directory traversal vulnerability | PHP-IMAP is a wrapper for common IMAP communication without the need to have the php-imap module installed / enabled. Prior to version 5.3.0, an unsanitized attachment filename allows any unauthenticated user to leverage a directory traversal vulnerability, which results in a remote code execution vulnerability. Every application that stores attachments with `Attachment::save()` without providing a `$filename` or passing unsanitized user input is affected by this attack.
An attacker can send an email with a malicious attachment to the inbox, which gets crawled with `webklex/php-imap` or `webklex/laravel-imap`. Prerequisite for the vulnerability is that the script stores the attachments without providing a `$filename`, or providing an unsanitized `$filename`, in `src/Attachment::save(string $path, string $filename = null)`. In this case, where no `$filename` gets passed into the `Attachment::save()` method, the package would use a series of unsanitized and insecure input values from the mail as fallback. Even if a developer passes a `$filename` into the `Attachment::save()` method, e.g. by passing the name or filename of the mail attachment itself (from email headers), the input values never get sanitized by the package. There is also no restriction about the file extension (e.g. ".php") or the contents of a file. This allows an attacker to upload malicious code of any type and content at any location where the underlying user has write permissions. The attacker can also overwrite existing files and inject malicious code into files that, e.g. get executed by the system via cron or requests.
Version 5.3.0 contains a patch for this issue. | [
"cpe:2.3:a:webklex:php-imap:*:*:*:*:*:*:*:*"
] |
GHSA-hwr9-3qwm-5crv | The Lock Master app 2.2.4 for Android allows unauthorized apps to modify the values in its SharedPreference files. These files hold data that affects many app functions. Malicious modifications by unauthorized apps can cause security issues, such as functionality manipulation, resulting in a severe escalation of privilege attack. | [] |
|
CVE-2022-41839 | WordPress LoginPress plugin <= 1.6.2 - Broken Access Control vulnerability | Broken Access Control vulnerability in WordPress LoginPress plugin <= 1.6.2 on WordPress leading to unauth. changing of Opt-In or Opt-Out tracking settings. | [
"cpe:2.3:a:wpbrigade:loginpress:*:*:*:*:*:wordpress:*:*"
] |
GHSA-v987-5jrj-j3xx | An issue was discovered in Inductive Automation Ignition before 7.9.20 and 8.x before 8.1.17. Designer and Vision Client Session IDs are mishandled. An attacker can determine which session IDs were generated in the past and then hijack sessions assigned to these IDs via Randy. | [] |
|
GHSA-q4ff-pq82-jv6g | The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.7.0. This makes it possible for unauthenticated attackers to add, modify, or delete user meta and plugin options. | [] |
|
CVE-2008-4987 | xastir 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the (a) /tmp/ldconfig.tmp, (b) /tmp/ldconf.tmp, and (c) /tmp/ld.so.conf temporary files, related to the (1) get-maptools.sh and (2) get_shapelib.sh scripts. | [
"cpe:2.3:a:xastir:xastir:1.9.2:*:*:*:*:*:*:*"
] |
|
GHSA-r99x-hm23-v6xf | On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, TMUI, also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. | [] |
|
CVE-2021-33549 | UDP Technology/Geutebrück camera devices: Buffer overflow in action parameter leading to RCE | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the action parameter, which may allow an attacker to remotely execute arbitrary code. | [
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2111:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2241:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2250:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2230:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2239:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2240:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2249:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_eec-2400:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2010:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2040:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2112:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2251:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2275:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2271:*:*:*:*:*:*:*:*"
] |
GHSA-ghr2-jw52-6qr7 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LA-Studio LA-Studio Element Kit for Elementor allows Stored XSS. This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.4.9. | [] |
|
CVE-2021-21270 | Cleartext Storage of Sensitive Information | OctopusDSC is a PowerShell module with DSC resources that can be used to install and configure an Octopus Deploy Server and Tentacle agent. In OctopusDSC version 4.0.977 and earlier a customer API key used to connect to Octopus Server is exposed via logging in plaintext. This vulnerability is patched in version 4.0.1002. | [
"cpe:2.3:a:octopus:octopusdsc:*:*:*:*:*:*:*:*"
] |
CVE-2019-4136 | IBM Cognos Controller 10.2.0, 10.2.1, 10.3.0, 10.3.1, and 10.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158332. | [
"cpe:2.3:a:ibm:cognos_controller:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:10.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-47483 | Dell Data Lakehouse, version(s) 1.0.0.0 and 1.1.0.0, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. | [
"cpe:2.3:a:dell:data_lakehouse:1.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:data_lakehouse:1.1.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-33147 | J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the authRoleList function. | [
"cpe:2.3:a:j2eefast:j2eefast:2.7.0:*:*:*:*:*:*:*"
] |
|
GHSA-gvmr-mp5q-9wvw | Plaintext Storage of a Password in Jenkins Skype notifier Plugin | Skype notifier Plugin 1.1.0 and earlier stores a password unencrypted in its global configuration file `hudson.plugins.skype.im.transport.SkypePublisher.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system. | [] |
GHSA-jvfj-c7wv-mq45 | Roothub v2.6 was discovered to contain a SQL injection vulnerability via the 's' parameter in the search() function. | [] |
|
CVE-2017-1000252 | The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-32378 | A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-1538 | McAfee VirusScan Enterprise 8.5.0.i uses insecure permissions for certain Windows Registry keys, which allows local users to bypass local password protection via the UIP value in (1) HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\DesktopProtection or (2) HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\TVD\VirusScan Entreprise\CurrentVersion. NOTE: this issue has been disputed by third-party researchers, stating that the default permissions for HKEY_LOCAL_MACHINE\SOFTWARE does not allow for write access and the product does not modify the inherited permissions. There might be an interaction error with another product | [
"cpe:2.3:a:mcafee:virusscan_enterprise:8.5i:*:*:*:*:*:*:*"
] |
|
GHSA-hwm7-7gx2-6gr2 | The Telephony component in Apple iOS before 8.3 allows attackers to bypass a sandbox protection mechanism and access unintended telephone capabilities via a crafted app. | [] |
|
GHSA-xvh3-fg8j-wp79 | u'While processing SMCInvoke asynchronous message header, message count is modified leading to a TOCTOU race condition and lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MDM9205, MDM9607, Nicobar, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDM670, SDM710, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [] |
|
CVE-2016-1814 | IOAcceleratorFamily in Apple iOS before 9.3.2, OS X before 10.11.5, and tvOS before 9.2.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] |
|
GHSA-gmg5-r3c4-3fm9 | Withdrawn Advisory: Fat Free CRM Cross-site Scripting vulnerability | WithdrawnThis advisory has been withdrawn because the CVE has been disputed and the underlying vulnerability is likely invalid. This link is maintained to preserve external references.[According to maintainers of Fat Free CRM](https://github.com/github/advisory-database/pull/3599), the CRM comment feature allows certain HTML markup, but santizes the output when rendered to page. This allows safe tags (such as `<h1>` which the author tested and reported as a vulnerability) but correctly disallows `<script>` tags and other dangerous entities.Original DescriptionHTML Injection has been discovered in the v0.19.0 version of the Fat Free CRM product via an authenticated request to the /comments URI. | [] |
CVE-2023-50769 | Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:nexus_platform:*:*:*:*:*:jenkins:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.