Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-9j77-j6gj-xwx6
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EPS/TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[]
CVE-2023-27509
Improper access control in some Intel(R) ISPC software installers before version 1.19.0 may allow an authenticated user to potentially enable escalation of privileges via local access.
[ "cpe:2.3:a:intel:ispc_software_installer:*:*:*:*:*:windows:*:*" ]
GHSA-2xf8-4fv6-m993
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
[]
GHSA-2c99-9fv7-72hj
Nextcloud Server before 11.0.3 is vulnerable to disclosure of valid share tokens for public calendars due to a logical error. Thus granting an attacker potentially access to publicly shared calendars without knowing the share token.
[]
GHSA-xvv2-jmp3-g444
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
GHSA-26wp-cf2x-v6xh
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 176607.
[]
GHSA-jmm7-jh9j-7vww
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during manual network configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
[]
CVE-2025-21934
rapidio: fix an API misues when rio_add_net() fails
In the Linux kernel, the following vulnerability has been resolved: rapidio: fix an API misues when rio_add_net() fails rio_add_net() calls device_register() and fails when device_register() fails. Thus, put_device() should be used rather than kfree(). Add "mport->net = NULL;" to avoid a use after free issue.
[]
GHSA-vw3j-pcrq-5hxc
dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.
[]
CVE-2022-36566
Rengine v1.3.0 was discovered to contain a command injection vulnerability via the scan engine function.
[ "cpe:2.3:a:yogeshojha:rengine:1.3.0:*:*:*:*:*:*:*" ]
GHSA-c5rm-gfhx-cpwq
foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker with access to the foreman log file would be able to view passwords, allowing them to access those systems.
[]
CVE-2022-36928
Path Traversal in Zoom for Android Clients
Zoom for Android clients before version 5.13.0 contain a path traversal vulnerability. A third party app could exploit this vulnerability to read and write to the Zoom application data directory.
[ "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*" ]
GHSA-c5c8-vqpp-hm75
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
[]
GHSA-2r2q-vvq4-5xmm
Cosmetics and Beauty Product Online Store v1.0 was discovered to contain multiple reflected cross-site scripting (XSS) attacks via the search parameter under the /cbpos/ app.
[]
GHSA-44xv-8ff2-fg74
The Google Maps Easy WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/modules/marker_groups/views/tpl/mgrEditMarkerGroup.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.9.33. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
[]
GHSA-6vpj-pr2c-5mm2
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
[]
GHSA-gjqw-42c8-8w8j
A command injection vulnerability in HNAP1/GetNetworkTomographySettings of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to execute arbitrary code.
[]
GHSA-h4c5-xg49-397w
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file birdsupdate.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2024-51425
An issue in the WaterToken smart contract (which can be run on the Ethereum blockchain) allows remote attackers to have an unspecified impact. NOTE: this is disputed by third parties because the impact is limited to function calls.
[ "cpe:2.3:a:ethereum:ethereum:1.12.2:*:*:*:*:*:*:*" ]
CVE-2008-1460
SQL injection vulnerability in the Joovideo (com_joovideo) 1.0 and 1.2.2 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php.
[ "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomlapixel:com_joovideo:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomlapixel:com_joovideo:1.2.2:*:*:*:*:*:*:*" ]
GHSA-78hh-hfqx-jx57
Heap-based buffer overflow in the libaccess_realrtsp plugin in VideoLAN VLC Media Player 0.8.6d and earlier on Windows might allow remote RTSP servers to cause a denial of service (application crash) or execute arbitrary code via a long string.
[]
GHSA-hcxx-mp6g-6gr9
Opencast publishes global system account credentials
The issue was mostly mitigated before, drastically reducing the risk. See references below for more information.ImpactOpencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials, regardless of the target being part of the Opencast cluster or not.Previous mitigations already prevented clear text authentications for such requests (e.g. HTTP Basic authentication), but with enough malicious intent, even hashed credentials can be broken.PatchesOpencast 10.6 will now send authentication requests only against servers which are part of the Opencast cluster, preventing external services from getting any form of authentication attempt in the first place.WorkaroundsNo workaround available.References[Patch fixing the issue](https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51)[Original security notice](https://groups.google.com/a/opencast.org/g/security-notices/c/XRZzRiqp-NE)[Original security mitigation](https://github.com/opencast/opencast/commit/fe8c3d3a60dc5869b468957270dbad5f8c30ead6)For more informationIf you have any questions or comments about this advisory:Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)Email us at [[email protected]](mailto:[email protected])
[]
CVE-2004-0032
Cross-site scripting (XSS) vulnerability in search.php in PHPGEDVIEW 2.61 allows remote attackers to inject arbitrary HTML and web script via the firstname parameter.
[ "cpe:2.3:a:phpgedview:phpgedview:2.61:*:*:*:*:*:*:*" ]
CVE-2016-1647
Use-after-free vulnerability in the RenderWidgetHostImpl::Destroy function in content/browser/renderer_host/render_widget_host_impl.cc in the Navigation implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
GHSA-f4cx-vfr9-7qhc
An OS command injection vulnerability exists in the console infactory_net functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
[]
GHSA-7v5c-fgmf-m9v8
The Asial Monaca Debugger application before 1.4.2 for Android allows remote attackers to obtain sensitive (1) account or (2) session ID information in a system log file via a crafted application.
[]
GHSA-36p2-8879-3c27
A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
[]
CVE-2018-17874
ExpressionEngine before 4.3.5 has reflected XSS.
[ "cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:*" ]
GHSA-vjc5-4hxh-h2rw
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.2, macOS Monterey 12.6.3, tvOS 16.3, Safari 16.3, watchOS 9.3, iOS 16.3 and iPadOS 16.3, macOS Big Sur 11.7.3. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
GHSA-px82-82wp-3w57
An issue was discovered in GitLab EE affecting all versions starting 17.0 to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1 allows an attacker to execute arbitrary command in a victim's pipeline through prompt injection.
[]
CVE-2020-8017
race condition on texlive-filesystem cron job allows for the deletion of unintended files
A Race Condition Enabling Link Following vulnerability in the cron job shipped with texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users in group mktex to delete arbitrary files on the system This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1.
[ "cpe:2.3:a:opensuse:texlive-filesystem:*:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:15:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp5:*:*:*:*:*:*", "cpe:2.3:a:opensuse:texlive-filesystem:-:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:15:-:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
GHSA-p8xq-m5g2-cvrc
In the Linux kernel, the following vulnerability has been resolved:NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interruptThe loop inside nfs_netfs_issue_read() currently does not disable interrupts while iterating through pages in the xarray to submit for NFS read. This is not safe though since after taking xa_lock, another page in the mapping could be processed for writeback inside an interrupt, and deadlock can occur. The fix is simple and clean if we use xa_for_each_range(), which handles the iteration with RCU while reducing code complexity.The problem is easily reproduced with the following test: mount -o vers=3,fsc 127.0.0.1:/export /mnt/nfs dd if=/dev/zero of=/mnt/nfs/file1.bin bs=4096 count=1 echo 3 > /proc/sys/vm/drop_caches dd if=/mnt/nfs/file1.bin of=/dev/null umount /mnt/nfsOn the console with a lockdep-enabled kernel a message similar to the following will be seen:================================ WARNING: inconsistent lock state 6.7.0-lockdbg+ #10 Not taintedinconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. test5/1708 [HC0[0]:SC0[0]:HE1:SE1] takes: ffff888127baa598 (&xa->xa_lock#4){+.?.}-{3:3}, at: nfs_netfs_issue_read+0x1b2/0x4b0 [nfs] {IN-SOFTIRQ-W} state was registered at: lock_acquire+0x144/0x380 _raw_spin_lock_irqsave+0x4e/0xa0 __folio_end_writeback+0x17e/0x5c0 folio_end_writeback+0x93/0x1b0 iomap_finish_ioend+0xeb/0x6a0 blk_update_request+0x204/0x7f0 blk_mq_end_request+0x30/0x1c0 blk_complete_reqs+0x7e/0xa0 __do_softirq+0x113/0x544 __irq_exit_rcu+0xfe/0x120 irq_exit_rcu+0xe/0x20 sysvec_call_function_single+0x6f/0x90 asm_sysvec_call_function_single+0x1a/0x20 pv_native_safe_halt+0xf/0x20 default_idle+0x9/0x20 default_idle_call+0x67/0xa0 do_idle+0x2b5/0x300 cpu_startup_entry+0x34/0x40 start_secondary+0x19d/0x1c0 secondary_startup_64_no_verify+0x18f/0x19b irq event stamp: 176891 hardirqs last enabled at (176891): [<ffffffffa67a0be4>] _raw_spin_unlock_irqrestore+0x44/0x60 hardirqs last disabled at (176890): [<ffffffffa67a0899>] _raw_spin_lock_irqsave+0x79/0xa0 softirqs last enabled at (176646): [<ffffffffa515d91e>] __irq_exit_rcu+0xfe/0x120 softirqs last disabled at (176633): [<ffffffffa515d91e>] __irq_exit_rcu+0xfe/0x120other info that might help us debug this: Possible unsafe locking scenario:lock(&xa->xa_lock#4); <Interrupt> lock(&xa->xa_lock#4);*** DEADLOCK ***2 locks held by test5/1708: #0: ffff888127baa498 (&sb->s_type->i_mutex_key#22){++++}-{4:4}, at: nfs_start_io_read+0x28/0x90 [nfs] #1: ffff888127baa650 (mapping.invalidate_lock#3){.+.+}-{4:4}, at: page_cache_ra_unbounded+0xa4/0x280stack backtrace: CPU: 6 PID: 1708 Comm: test5 Kdump: loaded Not tainted 6.7.0-lockdbg+ Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39 04/01/2014 Call Trace: dump_stack_lvl+0x5b/0x90 mark_lock+0xb3f/0xd20 __lock_acquire+0x77b/0x3360 _raw_spin_lock+0x34/0x80 nfs_netfs_issue_read+0x1b2/0x4b0 [nfs] netfs_begin_read+0x77f/0x980 [netfs] nfs_netfs_readahead+0x45/0x60 [nfs] nfs_readahead+0x323/0x5a0 [nfs] read_pages+0xf3/0x5c0 page_cache_ra_unbounded+0x1c8/0x280 filemap_get_pages+0x38c/0xae0 filemap_read+0x206/0x5e0 nfs_file_read+0xb7/0x140 [nfs] vfs_read+0x2a9/0x460 ksys_read+0xb7/0x140
[]
GHSA-c8fh-xhvf-2gp8
The server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to execute arbitrary commands via unspecified vectors, a different vulnerability than CVE-2015-1938.
[]
CVE-2020-36440
An issue was discovered in the libsbc crate before 0.1.5 for Rust. For Decoder<R>, it implements Send for any R: Read.
[ "cpe:2.3:a:libsbc_project:libsbc:*:*:*:*:*:rust:*:*" ]
CVE-1999-0128
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.
[ "cpe:2.3:o:digital:osf_1:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*", "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:sco:tcp_ip:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*", "cpe:2.3:h:ibm:sng:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*" ]
GHSA-q22m-mcvp-rxgv
NETSCOUT nGeniusPULSE 3.8 has a Hardcoded Cryptographic Key.
[]
GHSA-7x52-93m7-pr95
Untrusted search path vulnerability in gdk/win32/gdkinput-win32.c in GTK+ before 2.21.8 allows local users to gain privileges via a Trojan horse Wintab32.dll file in the current working directory.
[]
CVE-2005-0465
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
[ "cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.1t:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.4b:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.4t:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5_iop:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5_ipr:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5a:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5b:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5e:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5g:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:4.0.5h:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5_20:*:*:*:*:*:*:*" ]
CVE-2005-0492
Adobe Acrobat Reader 6.0.3 and 7.0.0 allows remote attackers to cause a denial of service (application crash) via a PDF file that contains a negative Count value in the root page node.
[ "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*" ]
GHSA-7fc8-vvxm-fgc5
drivers/uwb/uwbd.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device.
[]
CVE-2021-22739
Information Exposure vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a device to be compromised when it is first configured.
[ "cpe:2.3:o:schneider-electric:spacelynk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:spacelynk:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:homelynk_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:homelynk:-:*:*:*:*:*:*:*" ]
CVE-2007-3223
Unspecified vulnerability in the NFS server in Sun Solaris 10 before 20070613 allows remote attackers to cause a denial of service (system crash) via certain XDR data in NFS requests, probably related to processing of data by the xdr_bool and xdrmblk_getint32 functions.
[ "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*" ]
GHSA-4393-ch2m-6pmx
The WS Form LITE and Pro WordPress plugins before 1.8.176 do not sanitise and escape their Form Name, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[]
CVE-2024-2217
Improper Access Control in gaizhenbiao/chuanhuchatgpt
gaizhenbiao/chuanhuchatgpt is vulnerable to improper access control, allowing unauthorized access to the `config.json` file. This vulnerability is present in both authenticated and unauthenticated versions of the application, enabling attackers to obtain sensitive information such as API keys (`openai_api_key`, `google_palm_api_key`, `xmchat_api_key`, etc.), configuration details, and user credentials. The issue stems from the application's handling of HTTP requests for the `config.json` file, which does not properly restrict access based on user authentication.
[ "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:*" ]
CVE-2020-4266
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175649.
[ "cpe:2.3:a:ibm:i2_analysts_notebook:9.2.1:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:i2_analysts_notebook:9.2.1:*:*:*:premium:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2024-7342
Baidu UEditor unrestricted upload
A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273273 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:baidu:ueditor:1.4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*" ]
CVE-2023-28639
GLPI vulnerable to reflected Cross-site Scripting in search pages
GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
CVE-2013-0207
Cross-site request forgery (CSRF) vulnerability in the Mark Complete module 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[ "cpe:2.3:a:leighton_whiting:mark_complete:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
CVE-2005-0668
Unknown vulnerability in HTTP Anti Virus Proxy (HAVP) before 0.51 prevents viruses from being properly detected in certain files such as (1) .CAB or (2) .ZIP files.
[ "cpe:2.3:a:christian_hilgers:http_anti_virus_proxy_\\(havp\\):*:*:*:*:*:*:*:*" ]
GHSA-2j96-rgh6-6vhp
Insufficient policy enforcement in Cryptohome in Google Chrome prior to 88.0.4324.96 allowed a local attacker to perform OS-level privilege escalation via a crafted file.
[]
GHSA-g9w9-pqmh-3hm7
Memory corruption can occur when process-specific maps are added to the global list. If a map is removed from the global list while another thread is using it for a process-specific task, issues may arise.
[]
CVE-2025-3435
MangBoard WP <= 1.8.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via Board Header And Footer
The Mang Board WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the board_header and board_footer parameters in all versions up to, and including, 1.8.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
CVE-2024-0693
EFS Easy File Sharing FTP denial of service
A vulnerability classified as problematic was found in EFS Easy File Sharing FTP 2.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument username leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251479. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:easy_file_sharing_ftp_server_project:easy_file_sharing_ftp_server:2.0:*:*:*:*:*:*:*" ]
GHSA-jrwr-qw3f-xrg9
Windows MSHTML Platform Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34497.
[]
GHSA-cqv6-cx7q-c7w5
The Rendezvous Routing Daemon (rvrd), Rendezvous Secure Routing Daemon (rvrsd), Rendezvous Secure Daemon (rvsd), Rendezvous Cache (rvcache), Rendezvous Secure C API, Rendezvous Java API, and Rendezvous .Net API components of TIBCO Software Inc.'s TIBCO Rendezvous and TIBCO Rendezvous Developer Edition contain a vulnerability that theoretically allows a low privileged attacker with local access on the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from the affected component searching for run-time artifacts outside of the installation hierarchy. Affected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions 8.5.1 and below and TIBCO Rendezvous Developer Edition: versions 8.5.1 and below.
[]
GHSA-2pwf-hqr9-mw42
IBM Cognos Analytics 11.1.7 and 11.2.0 is vulnerable to priviledge escalation where a lower evel user could have access to the 'New Job' page to which they should not have access to. IBM X-Force ID: 201695.
[]
GHSA-6whj-8g9g-5jvx
usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges
Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.
[]
GHSA-jqq3-63w2-qx5w
Unspecified vulnerability in the Oracle FLEXCUBE Private Banking component in Oracle Financial Services Applications 12.0.1 through 12.0.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
[]
GHSA-vhw9-5893-v78h
POPFile before 0.22.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors involving character sets within e-mail messages.
[]
GHSA-fv24-mphj-4hr6
The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
[]
GHSA-pcg9-cjxc-8j7x
The Web Services Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.31 and 6.1 before 6.1.0.19, when Certificate Store Collections is configured to use Certificate Revocation Lists (CRL), does not call the setRevocationEnabled method on the PKIXBuilderParameters object, which prevents the "Java security method" from checking the revocation status of X.509 certificates and allows remote attackers to bypass intended access restrictions via a SOAP message with a revoked certificate.
[]
GHSA-vfgg-4hvr-6rq9
Magento prior to 1.9.4.3 and prior to 1.14.4.3 included a user's CSRF token in the URL of a GET request. This could be exploited by an attacker with access to network traffic to perform unauthorized actions.
[]
GHSA-ggwr-4vr8-g7wv
Apache Airflow Path Traversal vulnerability
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
[]
CVE-2010-4739
SQL injection vulnerability in the Maian Media Silver (com_maianmedia) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a music action to index.php.
[ "cpe:2.3:a:aretimes:com_maianmedia:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2025-24986
Azure Promptflow Remote Code Execution Vulnerability
Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network.
[]
GHSA-8fqp-54rg-gv75
An untrusted pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_node_unregister () at scenegraph/base_scenegraph.c. This vulnerability can lead to a Denial of Service (DoS).
[]
GHSA-qgvm-5vwm-h835
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
CVE-2024-20987
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*" ]
GHSA-jhcq-fhp4-2jq7
Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format specifiers that are passed into the (1) syslog_message and (2) syslog_io_message functions.
[]
GHSA-8gjf-m234-wgjp
PHP Scripts Mall Advance B2B Script 2.1.4 has Cross-Site Request Forgery (CSRF) via the Edit Profile feature.
[]
CVE-2020-7121
Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the LLDP (Link Layer Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.3021.
[ "cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:cx_6200f:-:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:cx_6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:cx_6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:cx_8320:-:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:cx_8325:-:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arubanetworks:cx_8400:-:*:*:*:*:*:*:*" ]
CVE-2025-3569
JamesZBL/code-projects db-hospital-drug ShiroConfig.java improper authorization
A vulnerability was found in JamesZBL/code-projects db-hospital-drug 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file ShiroConfig.java. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-r278-qc2p-hfwp
Memory corruption while processing crafted SDES packets due to improper length check in sdes packets recieved in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[]
CVE-2009-2737
The EditCSVAction function in cgi/actions.py in Roundup 1.2 before 1.2.1, 1.4 through 1.4.6, and possibly other versions does not properly check permissions, which allows remote authenticated users with edit or create privileges for a class to modify arbitrary items within that class, as demonstrated by editing all queries, modifying settings, and adding roles to users.
[ "cpe:2.3:a:toni_mueller:roundup:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:toni_mueller:roundup:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:toni_mueller:roundup:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:toni_mueller:roundup:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:toni_mueller:roundup:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:toni_mueller:roundup:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:toni_mueller:roundup:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:toni_mueller:roundup:1.4.6:*:*:*:*:*:*:*" ]
GHSA-5x22-hprq-4vqq
Cross-Site Request Forgery (CSRF) vulnerability in Bob Namaste! LMS allows Cross Site Request Forgery. This issue affects Namaste! LMS: from n/a through 2.6.5.
[]
CVE-2024-13161
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
[]
GHSA-8vxc-ww8x-mxp8
In the Linux kernel, the following vulnerability has been resolved:vsock/virtio: Initialization of the dangling pointer occurring in vsk->transDuring loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.
[]
GHSA-j9cv-xf7f-rxwh
In SpringBootMovie <=1.2 when adding movie names, malicious code can be stored because there are no filtering parameters, resulting in stored XSS.
[]
GHSA-7m35-9cg4-vcm2
IBM Aspera Faspex 5.0.0 through 5.0.7 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 244119.
[]
GHSA-jhfm-vpj4-vj2f
An Improper Access Control vulnerability exists in Citrix Workspace App for Linux 2012 - 2111 with App Protection installed that can allow an attacker to perform local privilege escalation.
[]
CVE-2023-36514
WordPress WooCommerce Ship to Multiple Addresses Plugin <= 3.8.5 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Shipping Multiple Addresses plugin <= 3.8.5 versions.
[ "cpe:2.3:a:woocommerce:shipping_multiple_addresses:*:*:*:*:*:wordpress:*:*" ]
GHSA-v72r-7947-x8jx
Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early.A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.
[]
GHSA-8h28-5hcj-h4qw
munin-cgi-graph in Munin 2.0 rc4 allows remote attackers to cause a denial of service (disk or memory consumption) via many image requests with large values in the (1) size_x or (2) size_y parameters.
[]
GHSA-w2xx-jp9f-gp8g
Yii Framework Cross-site Scripting Vulnerability
Cross-site scripting (XSS) vulnerability in Yii Framework before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via vectors related to JSON, arrays, and Internet Explorer 6 or 7.
[]
GHSA-7vqg-r5m9-6cwq
Cross-site scripting (XSS) vulnerability in modules/Base/Box/check_for_new_version.php in EPESI in Telaxus/EPESI 1.8.2 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URI that lacks the cid parameter.
[]
GHSA-46v8-4qjh-4856
Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image.
[]
CVE-2014-2971
Cross-site scripting (XSS) vulnerability in AddStdLetter.jsp in MicroPact iComplaints before 8.0.2.1.8.8014 allows remote authenticated users to inject arbitrary web script or HTML via the description parameter.
[ "cpe:2.3:a:micropact:icomplaints:8.0:*:*:*:*:*:*:*" ]
CVE-2020-6385
Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
CVE-2018-0382
Cisco Wireless LAN Controller Software Session Hijacking Vulnerability
A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system. Versions 8.1 and 8.5 are affected.
[ "cpe:2.3:a:cisco:wireless_lan_controller_software:8.1\\(111.0\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_software:8.5\\(120.0\\):*:*:*:*:*:*:*" ]
CVE-2023-51602
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18591.
[ "cpe:2.3:a:honeywell:saia_pg5_controls_suite:-:*:*:*:*:*:*:*" ]
GHSA-77p6-jjq7-fgjg
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[]
CVE-2019-19075
A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" ]
GHSA-h3v7-q8j4-9rw9
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x42247c` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.
[]
CVE-2021-30790
An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
CVE-2017-13984
An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to delete arbitrary files via servlet directory traversal.
[ "cpe:2.3:a:hp:bsm_platform_application_performance_management_system_health:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:hp:bsm_platform_application_performance_management_system_health:9.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:bsm_platform_application_performance_management_system_health:9.40:*:*:*:*:*:*:*" ]
CVE-2021-31250
Multiple storage XSS vulnerabilities were discovered on BF-430, BF-431 and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, ppp.cgi.
[ "cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:chiyu-tech:bf-430:-:*:*:*:*:*:*:*", "cpe:2.3:o:chiyu-tech:bf-431_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:chiyu-tech:bf-431:-:*:*:*:*:*:*:*", "cpe:2.3:o:chiyu-tech:bf-450m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:chiyu-tech:bf-450m:-:*:*:*:*:*:*:*" ]
CVE-2025-1755
MongoDB Compass may be susceptible to local privilege escalation in Windows
MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privileges, when a crafted file is stored in C:\node_modules\. This issue affects MongoDB Compass prior to 1.42.1
[ "cpe:2.3:a:mongodb:compass:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.23:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.26.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.28.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.29.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.29.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.29.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.30.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.31.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.31.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.31.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.32.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.32.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.32.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.32.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.33.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.34.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.34.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.36.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.36.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.37.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.38.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.38.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.38.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.39.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.39.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.39.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.39.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.40.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.40.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.40.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.40.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.40.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.41.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:compass:1.42.0:*:*:*:*:*:*:*" ]
GHSA-xfjq-qrvp-mv7m
Altair HyperView Player versions 2021.1.0.27 and prior are vulnerable to the use of uninitialized memory vulnerability during parsing of H3D files. A DWORD is extracted from an uninitialized buffer and, after sign extension, is used as an index into a stack variable to increment a counter leading to memory corruption.
[]
GHSA-qpfj-j74j-7qq6
The Kali Forms plugin for WordPress is vulnerable to Authenticated Options Change in versions up to, and including, 2.1.1. This is due to the update_option lacking proper authentication checks. This makes it possible for any authenticated attacker to change (or delete) the plugin's settings.
[]
GHSA-hfqm-gjfq-m7ph
Cross-site scripting (XSS) vulnerability in DCForum 6.25 and earlier, and possibly DCForum+ 1.x, allows remote attackers to inject arbitrary web script or HTML via (1) the page parameter in dcboard.php and (2) unspecified search parameters.
[]