id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-88px-gmr4-m3f2 | Cross-site scripting (XSS) vulnerability in job.cc in apt-cacher-ng 0.7.26 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [] |
|
GHSA-x9m7-9m6q-c6hr | bitlbee-libpurple before 3.5.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-10189. | [] |
|
CVE-2021-39852 | Adobe Acrobat Reader DC Null Pointer Dereference Could Lead To Application Denial-of-Service | Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*"
] |
GHSA-64xv-qmpj-7grf | IBM Security Verify Governance 10.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 256037. | [] |
|
CVE-2025-46394 | In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences. | [] |
|
GHSA-q9f9-4gv4-x42q | Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access. | [] |
|
GHSA-x4jm-r7gw-5wxf | Multiple SQL injection vulnerabilities in PHP Address Book 4.0.x allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to delete.php or (2) alphabet parameter to index.php. NOTE: the edit.php and view.php vectors are already covered by CVE-2008-2565. | [] |
|
GHSA-g78p-m98v-8prx | In Splunk Add-on Builder versions below 4.1.4, the application writes user session tokens to its internal log files when you visit the Splunk Add-on Builder or when you build or edit a custom app or add-on. | [] |
|
CVE-2022-40407 | A zip slip vulnerability in the file upload function of Chamilo v1.11 allows attackers to execute arbitrary code via a crafted Zip file. | [
"cpe:2.3:a:chamilo:chamilo:1.11:*:*:*:*:*:*:*"
] |
|
GHSA-2j74-3g9x-9cw4 | This vulnerability exists in Shilpi Client Dashboard due to improper handling of multiple parameters in the API endpoint. An authenticated remote attacker could exploit this vulnerability by including multiple “userid” parameters in the API request body leading to unauthorized access of sensitive information belonging to other users. | [] |
|
GHSA-34gw-qv43-p592 | Unspecified vulnerability in HP HP-UX Whitelisting (aka WLI) before A.01.02.02 on HP-UX B.11.31 allows local users to bypass intended access restrictions via unknown vectors. | [] |
|
GHSA-fpjm-rp2g-3r4c | Django Rest Framework jwt allows obtaining new token from notionally invalidated token | An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained. | [] |
GHSA-j7fr-xvx6-3p7v | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in Mitsubishi Electric Iconics Digital Solutions GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. | [] |
|
CVE-2019-6730 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the popUpMenu method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7368. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-cp6v-vwwq-5gw4 | Directory traversal vulnerability in globsy_edit.php in Globsy 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [] |
|
CVE-2022-3198 | Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] |
|
GHSA-4rf8-j9gh-8qph | An issue was discovered in LabKey Server 19.1.0. Sending an SVG containing an XXE payload to the endpoint visualization-exportImage.view or visualization-exportPDF.view allows local files to be read. | [] |
|
GHSA-rvgg-59w4-c6xh | There is a reachable abort in the function jpc_dec_process_sot in libjasper/jpc/jpc_dec.c of JasPer 2.0.14 that will lead to a remote denial of service attack by triggering an unexpected jas_alloc2 return value, a different vulnerability than CVE-2017-13745. | [] |
|
GHSA-qm5p-4qj7-wm69 | Cross-site scripting (XSS) vulnerability in admin/walkthrough/walkthrough.php in the Design Approval System plugin before 3.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the step parameter. | [] |
|
CVE-2006-5522 | Multiple PHP remote file inclusion vulnerabilities in Johannes Erdfelt Kawf 1.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the config parameter in (1) main.php or (2) user/account/main.php. | [
"cpe:2.3:a:johannes_erdfelt:kawf:*:*:*:*:*:*:*:*"
] |
|
GHSA-pf6w-7rf6-f8g5 | Directory traversal vulnerability in Allaire JRun 2.3 server allows remote attackers to read arbitrary files via the SSIFilter servlet. | [] |
|
GHSA-wm25-7v99-6wm5 | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | [] |
|
GHSA-pwvv-fx2v-3h72 | Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPLUNK_HOME/bin, because the non-root setup instructions state that chown should be run across all of $SPLUNK_HOME to give non-root access. | [] |
|
CVE-2008-4394 | Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds. | [
"cpe:2.3:a:gentoo:portage:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:portage:2.0.51.22:r3:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:portage:2.1.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:portage:2.1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gentoo:portage:2.1.3.11:*:*:*:*:*:*:*"
] |
|
CVE-2024-13781 | Hero Maps Premium - Customizable Google Maps Plugin <= 2.3.9 - Authenticated (Subscriber+) SQL Injection | The Hero Maps Premium plugin for WordPress is vulnerable to SQL Injection via several AJAX actions in all versions up to, and including, 2.3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] |
GHSA-6v5j-ff9r-2442 | Microsoft splwow64 Elevation of Privilege Vulnerability | [] |
|
GHSA-f892-3gpj-v83f | greykite v1.0.0 was discovered to contain an arbitrary file upload vulnerability in the load_obj function at /templates/pickle_utils.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file. | [] |
|
GHSA-8h2p-ffrc-w7hm | Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | [] |
|
GHSA-4792-p7w7-99wf | Multiple SQL injection vulnerabilities in TheHockeyStop HockeySTATS Online 2.0 Basic and Advanced allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in the viewpage action to the default URI, probably index.php, or (2) divid parameter in the schedule action to index.php. | [] |
|
GHSA-wqrx-2j54-p3fc | The leakage of the client secret in Uomasa_Saiji_news Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages. | [] |
|
CVE-2019-6688 | On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5 and BIG-IQ versions 6.0.0-6.1.0 and 5.2.0-5.4.0, a user is able to obtain the secret that was being used to encrypt a BIG-IP UCS backup file while sending SNMP query to the BIG-IP or BIG-IQ system, however the user can not access to the UCS files. | [
"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-4099 | PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. | [
"cpe:2.3:a:debian:python-dns:*:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.0-1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.0-2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.0-3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.0-4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.0-5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.0-5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.0-6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:python-dns:2.3.1-2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:linux:unknown:unknown:etch:*:*:*:*:*"
] |
|
CVE-2016-4167 | Adobe DNG Software Development Kit (SDK) before 1.4 2016 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | [
"cpe:2.3:a:adobe:dng_software_development_kit:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-57174 | A misconfiguration in Alphion ASEE-1443 Firmware v0.4.H.00.02.15 defines a previously unregistered domain name as the default DNS suffix. This allows attackers to register the unclaimed domain and point its wildcard DNS entry to an attacker-controlled IP address, making it possible to access sensitive information. | [] |
|
GHSA-vqjx-gc4r-4cxp | Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php. | [] |
|
CVE-2007-4763 | PHP remote file inclusion vulnerability in dbmodules/DB_adodb.class.php in PHP Object Framework (PHPOF) 20040226 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PHPOF_INCLUDE_PATH parameter. | [
"cpe:2.3:a:tim_jackson:phpof:*:*:*:*:*:*:*:*"
] |
|
GHSA-xjgw-ghrx-wfff | Roundup Cross-site Scripting Vulnerability | Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header. | [] |
CVE-2024-26887 | Bluetooth: btusb: Fix memory leak | In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: Fix memory leak
This checks if CONFIG_DEV_COREDUMP is enabled before attempting to clone
the skb and also make sure btmtk_process_coredump frees the skb passed
following the same logic. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-h5xc-q687-w54m | SVG <code><use></code> tags that referenced a same-origin document could have resulted in script execution if attacker input was sanitized via the HTML Sanitizer API. This would have required the attacker to reference a same-origin JavaScript file containing the script to be executed. This vulnerability affects Firefox < 102. | [] |
|
CVE-2010-2969 | Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, and 1.9.x before 1.9.3, allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) action/LikePages.py, (2) action/chart.py, and (3) action/userprofile.py, a similar issue to CVE-2010-2487. | [
"cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.3.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.9.2:*:*:*:*:*:*:*"
] |
|
CVE-2019-8397 | An issue was discovered in the HDF HDF5 1.10.4 library. There is an out of bounds read in the function H5T_close_real in H5T.c. | [
"cpe:2.3:a:hdfgroup:hdf5:1.10.4:*:*:*:*:*:*:*"
] |
|
GHSA-3945-6x88-h7vv | Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. | [] |
|
GHSA-cw9f-6pvh-rr9x | The wikitext parser in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to cause a denial of service (infinite loop) via certain input, as demonstrated by the padleft function. | [] |
|
CVE-2021-22056 | VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 and Identity Manager 3.3.5, 3.3.4, and 3.3.3 contain an SSRF vulnerability. A malicious actor with network access may be able to make HTTP requests to arbitrary origins and read the full response. | [
"cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_automation:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:20.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:20.10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08.01:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
GHSA-6qr9-vw5g-627h | In update of MmsProvider.java, there is a possible way to change directory permissions due to a path traversal error. This could lead to local denial of service of SIM recognition with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
GHSA-pqqp-xmhj-wgcw | crossbeam-deque Data Race before v0.7.4 and v0.8.1 | ImpactIn the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug.Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue.PatchesThis has been fixed in crossbeam-deque 0.8.1 and 0.7.4.CreditsThis issue was reported and fixed by Maor Kleinberger.LicenseThis advisory is in the public domain. | [] |
GHSA-7p95-xvhm-v45h | Multiple cross-site scripting (XSS) vulnerabilities in PhpBB Plus 1.52 and earlier allow remote attackers to inject arbitrary web script or HTML via the bsid parameter to (1) groupcp.php, (2) index.php, (3) portal.php, (4) viewforum.php, or (5) viewtopic.php, (6) the c parameter to index.php, or (7) the article parameter to portal.php. | [] |
|
GHSA-qwqc-2h44-pfq6 | Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. While the vulnerability is in Oracle Financial Services Analytical Applications Infrastructure, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). | [] |
|
GHSA-qcjw-rjx6-6gm2 | A vulnerability in the web portal of the Cisco Prime Collaboration Provisioning (PCP) Tool could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected system. More Information: CSCvc90312. Known Affected Releases: 12.1. | [] |
|
GHSA-vw3m-jmhx-vxc5 | The Java XML parser in Echo before 2.1.1 and 3.x before 3.0.b6 allows remote attackers to read arbitrary files via a request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [] |
|
CVE-2020-9983 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution. | [
"cpe:2.3:a:apple:icloud:11.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:12.10.9:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] |
|
CVE-2021-37977 | Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-16025 | Heap buffer overflow in clipboard in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-mf29-wqrq-chmx | In messaging service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed. | [] |
|
CVE-2014-2511 | Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter. | [
"cpe:2.3:a:emc:digital_assets_manager:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:digital_assets_manager:6.5:sp5:*:*:*:*:*:*",
"cpe:2.3:a:emc:digital_assets_manager:6.5:sp6:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_administrator:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_administrator:6.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_administrator:6.7:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_administrator:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_administrator:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_capital_projects:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_capital_projects:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_webtop:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_webtop:6.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:documentum_webtop:6.7:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:engineering_plant_facilities_management_solution_for_documentum:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:engineering_plant_facilities_management_solution_for_documentum:1.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:records_client:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:records_client:6.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:records_client:6.7:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:task_space:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:task_space:6.7:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:task_space:6.7:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:web_publishers:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:web_publishers:6.5:sp6:*:*:*:*:*:*",
"cpe:2.3:a:emc:web_publishers:6.5:sp7:*:*:*:*:*:*"
] |
|
CVE-2020-0771 | An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows CSC Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0769. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-1010294 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later. | [
"cpe:2.3:o:linaro:op-tee:*:*:*:*:*:*:*:*"
] |
|
CVE-2005-1082 | Multiple SQL injection vulnerabilities in AzDGDatingPlatinum 1.1.0 allows remote attackers to execute arbitrary SQL commands via (1) the id parameter to view.php or (2) the from parameter to members/index.php. | [
"cpe:2.3:a:azerbaijan_development_group:azdgdating:1.1.0:*:platinum:*:*:*:*:*"
] |
|
GHSA-953q-wmpv-cqpp | The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. | [] |
|
GHSA-63h9-j7qx-8xx4 | Directory traversal vulnerability in the Administrative Console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.29, 8.0 before 8.0.0.6, and 8.5 before 8.5.0.2 on Linux and UNIX allows remote authenticated users to modify data via unspecified vectors. | [] |
|
GHSA-4jhh-q54m-vmvv | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [] |
|
CVE-2023-5259 | ForU CMS cms_admin.php denial of service | A vulnerability classified as problematic was found in ForU CMS. This vulnerability affects unknown code of the file /admin/cms_admin.php. The manipulation of the argument del leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-240868. | [
"cpe:2.3:a:foru_cms_project:foru_cms:-:*:*:*:*:*:*:*"
] |
CVE-2019-4307 | IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 160987. | [
"cpe:2.3:a:ibm:security_guardium_big_data_intelligence:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-h2wc-qq3h-f3xg | An issue was discovered in the Armor module in Polaris FT Intellect Core Banking 9.7.1. CSRF can occur via a /CollatWebApp/gcmsRefInsert?name=SUPP URI. | [] |
|
GHSA-c595-v5xp-gv8w | A vulnerability in Node.js version 20 allows for bypassing restrictions set by the --experimental-permission flag using the built-in inspector module (node:inspector).By exploiting the Worker class's ability to create an "internal worker" with the kIsInternal Symbol, attackers can modify the isInternal value when an inspector is attached within the Worker constructor before initializing a new WorkerImpl. This vulnerability exclusively affects Node.js users employing the permission model mechanism.Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. | [] |
|
CVE-2023-52119 | WordPress Icegram Plugin <= 3.1.18 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Icegram Icegram Engage – WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building.This issue affects Icegram Engage – WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building: from n/a through 3.1.18.
| [
"cpe:2.3:a:icegram:icegram_engage:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-40306 | The login form /Login in ECi Printanista Hub (formerly FMAudit Printscout) before 5.5.2 (July 2023) performs expensive RSA key-generation operations, which allows attackers to cause a denial of service (DoS) by requesting that form repeatedly. | [
"cpe:2.3:a:ecisolutions:printanista_managed_print_service:*:*:*:*:*:*:*:*"
] |
|
GHSA-682g-9hxq-jvvv | The Service Workers subsystem in Google Chrome before 52.0.2743.82 does not properly implement the Secure Contexts specification during decisions about whether to control a subframe, which allows remote attackers to bypass the Same Origin Policy via an https IFRAME element inside an http IFRAME element. | [] |
|
GHSA-88vr-hjqx-57qh | adolph_dudu ratio-swiper was discovered to contain a prototype pollution via the function extendDefaults | adolph_dudu ratio-swiper v0.0.2 was discovered to contain a prototype pollution via the function extendDefaults. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. | [] |
CVE-2019-10686 | An SSRF vulnerability was found in an API from Ctrip Apollo through 1.4.0-SNAPSHOT. An attacker may use it to do an intranet port scan or raise a GET request via /system-info/health because the %23 substring is mishandled. | [
"cpe:2.3:a:ctrip:apollo:*:*:*:*:*:*:*:*"
] |
|
GHSA-jrcf-p229-q8r2 | IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send an IOCTL (0x9C402084) with a buffer containing user defined content. The driver's subroutine will execute a rdmsr instruction with the user's buffer for input, and provide output from the instruction. | [] |
|
CVE-2025-27303 | WordPress Contact Form 7 Star Rating plugin <= 1.10 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themelogger Contact Form 7 Star Rating allows Stored XSS. This issue affects Contact Form 7 Star Rating: from n/a through 1.10. | [] |
CVE-2024-24112 | xmall v1.1 was discovered to contain a SQL injection vulnerability via the orderDir parameter. | [
"cpe:2.3:a:exrick:xmall:1.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-3858 | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-v2pm-qr9p-2m3v | Cisco Linksys Routers EA2700, EA3500, E4200, EA4500: A bug can cause an unsafe TCP port to open which leads to unauthenticated access | [] |
|
CVE-2021-4037 | A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-r32r-f6wr-cc3w | Password stored in plain text by Jenkins TestComplete support Plugin | Jenkins TestComplete support Plugin prior to version 2.5.2 stores a password unencrypted in job `config.xml` files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. Version 2.5.2 contains a patch for this issue. | [] |
CVE-2017-5693 | Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic. | [
"cpe:2.3:o:intel:puma_firmware:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:puma:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:puma_firmware:6.0_soc:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:puma_firmware:7.0_soc:*:*:*:*:*:*:*"
] |
|
CVE-2024-45193 | An issue was discovered in Matrix libolm through 3.2.16. There is Ed25519 signature malleability due to lack of validation criteria (does not ensure that S < n). This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
"cpe:2.3:a:matrix:olm:*:*:*:*:*:*:*:*"
] |
|
GHSA-3wwg-h2fr-3v7w | The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896. | [] |
|
CVE-2010-1199 | Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node. | [
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-p5rq-gpgr-qg5m | InterVations NaviCOPA Web Server 3.0.1.2 and earlier allows remote attackers to obtain the source code for a web page via a trailing encoded space character in a URI, as demonstrated by /index.html%20 and /index.php%20 URIs. | [] |
|
CVE-2007-3038 | The Teredo interface in Microsoft Windows Vista and Vista x64 Edition does not properly handle certain network traffic, which allows remote attackers to bypass firewall blocking rules and obtain sensitive information via crafted IPv6 traffic, aka "Windows Vista Firewall Blocking Rule Information Disclosure Vulnerability." | [
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*"
] |
|
GHSA-xcx8-qfq7-xq62 | The Views Dynamic Fields module through 7.x-1.0-alpha4 for Drupal makes insecure unserialize calls in handlers/views_handler_filter_dynamic_fields.inc, as demonstrated by PHP object injection, involving a field_names object and an Archive_Tar object, for file deletion. Code execution might also be possible. | [] |
|
GHSA-j9cg-v2v5-9p35 | Inappropriate implementation in Site Isolation in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. | [] |
|
GHSA-xrvr-m2pw-2qj4 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code. | [] |
|
GHSA-2572-4xw7-mcfc | An issue was discovered in ksmbd in the Linux kernel before 6.6.10. smb2_get_data_area_len in fs/smb/server/smb2misc.c can cause an smb_strndup_from_utf16 out-of-bounds access because the relationship between Name data and CreateContexts data is mishandled. | [] |
|
CVE-2024-24131 | SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php. | [
"cpe:2.3:a:superwebmailer:superwebmailer:9.31.0.01799:*:*:*:*:*:*:*"
] |
|
CVE-2009-4874 | TalkBack 2.3.14 does not properly restrict access to the edit comment feature (comments.php), which allows remote attackers to modify comments. | [
"cpe:2.3:a:scripts.oldguy:talkback:2.3.14:*:*:*:*:*:*:*"
] |
|
GHSA-5976-p6p4-vfw3 | CSRF in admin/edit-glossary.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a glossary term, given the id, via a crafted request. | [] |
|
GHSA-5655-8v36-fhx6 | Improper input validation in the Intel(R) Distribution of OpenVINO(TM) Model Server software before version 2024.0 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | [] |
|
GHSA-jhg7-9fjr-p24q | AjaxSearchPro before 4.20.8 allows Deserialization of Untrusted Data (in the import database feature of the administration panel), leading to Remote Code execution. | [] |
|
CVE-2021-24544 | Responsive WordPress Slider <= 2.2.0 - Subscriber+ Stored Cross-Site Scripting | The Responsive WordPress Slider WordPress plugin through 2.2.0 does not sanitise and escape some of the Slider options, allowing Cross-Site Scripting payloads to be set in them. Furthermore, as by default any authenticated user is allowed to create Sliders (https://wordpress.org/support/topic/slider-can-be-changed-from-any-user-even-subscriber/, such settings can be changed in the plugin's settings), this would allow user with a role as low as subscriber to perform Cross-Site Scripting attacks against logged in admins viewing the slider list and could lead to privilege escalation by creating a rogue admin account for example. | [
"cpe:2.3:a:motopress:motopress-slider-lite:*:*:*:*:*:wordpress:*:*"
] |
CVE-2016-4741 | The Assets component in Apple iOS before 10 allows man-in-the-middle attackers to block software updates via vectors related to lack of an HTTPS session for retrieving updates. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-g75w-phwm-vjqq | A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability. This vulnerability affects all Cisco AnyConnect Secure Mobility Client for Windows software versions prior to 4.4.02034. Cisco Bug IDs: CSCvc97928. | [] |
|
GHSA-72h2-mx43-37v5 | pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value. | [] |
|
GHSA-6jj9-4hh8-6xpv | Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] |
|
CVE-2023-25860 | Adobe Illustrator Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*"
] |
GHSA-rp88-j665-jvwh | Session fixation vulnerability in HP SiteScope 9.x, 10.x, and 11.x allows remote attackers to hijack web sessions via unspecified vectors. | [] |
|
CVE-2019-2488 | Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Session Management). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.8:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.