id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2006-6555 | Multiple SQL injection vulnerabilities in EasyFill before 0.5.1 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:easyfill:easyfill:0.5:*:*:*:*:*:*:*"
] |
|
GHSA-3c3v-6qp8-v5gc | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Elementor Elementor Website Builder allows Stored XSS. This issue affects Elementor Website Builder: from n/a through 3.25.10. | [] |
|
CVE-2024-49017 | SQL Server Native Client Remote Code Execution Vulnerability | SQL Server Native Client Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*"
] |
CVE-2016-4626 | IOHIDFamily in Apple iOS before 9.3.3, OS X before 10.11.6, tvOS before 9.2.2, and watchOS before 2.2.2 allows local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-39463 | 9p: add missing locking around taking dentry fid list | In the Linux kernel, the following vulnerability has been resolved:
9p: add missing locking around taking dentry fid list
Fix a use-after-free on dentry's d_fsdata fid list when a thread
looks up a fid through dentry while another thread unlinks it:
UAF thread:
refcount_t: addition on 0; use-after-free.
p9_fid_get linux/./include/net/9p/client.h:262
v9fs_fid_find+0x236/0x280 linux/fs/9p/fid.c:129
v9fs_fid_lookup_with_uid linux/fs/9p/fid.c:181
v9fs_fid_lookup+0xbf/0xc20 linux/fs/9p/fid.c:314
v9fs_vfs_getattr_dotl+0xf9/0x360 linux/fs/9p/vfs_inode_dotl.c:400
vfs_statx+0xdd/0x4d0 linux/fs/stat.c:248
Freed by:
p9_fid_destroy (inlined)
p9_client_clunk+0xb0/0xe0 linux/net/9p/client.c:1456
p9_fid_put linux/./include/net/9p/client.h:278
v9fs_dentry_release+0xb5/0x140 linux/fs/9p/vfs_dentry.c:55
v9fs_remove+0x38f/0x620 linux/fs/9p/vfs_inode.c:518
vfs_unlink+0x29a/0x810 linux/fs/namei.c:4335
The problem is that d_fsdata was not accessed under d_lock, because
d_release() normally is only called once the dentry is otherwise no
longer accessible but since we also call it explicitly in v9fs_remove
that lock is required:
move the hlist out of the dentry under lock then unref its fids once
they are no longer accessible. | [
"cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*"
] |
GHSA-9jq2-jvwc-p52f | Contao core SQL Injection Vulnerability | Contao core prior to 2.11.4 has a SQL injection vulnerability in `contao-2.11.3\system\modules\backend\Ajax.php` | [] |
CVE-2020-10081 | GitLab before 12.8.2 has Incorrect Access Control. It was internally discovered that the LFS import process could potentially be used to incorrectly access LFS objects not owned by the user. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2024-4343 | Python Command Injection in imartinez/privategpt | A Python command injection vulnerability exists in the `SagemakerLLM` class's `complete()` method within `./private_gpt/components/llm/custom/sagemaker.py` of the imartinez/privategpt application, versions up to and including 0.3.0. The vulnerability arises due to the use of the `eval()` function to parse a string received from a remote AWS SageMaker LLM endpoint into a dictionary. This method of parsing is unsafe as it can execute arbitrary Python code contained within the response. An attacker can exploit this vulnerability by manipulating the response from the AWS SageMaker LLM endpoint to include malicious Python code, leading to potential execution of arbitrary commands on the system hosting the application. The issue is fixed in version 0.6.0. | [
"cpe:2.3:a:imartinez:imartinez_privategpt:*:*:*:*:*:*:*:*"
] |
CVE-2024-5249 | SAML Replay in Akana | In versions of Akana API Platform prior to 2024.1.0, SAML tokens can be replayed. | [
"cpe:2.3:a:perforce:akana_api:*:*:*:*:*:*:*:*"
] |
CVE-2012-3063 | Cisco Application Control Engine (ACE) before A4(2.3) and A5 before A5(1.1), when multicontext mode is enabled, does not properly share a management IP address among multiple contexts, which allows remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances, and read or modify configuration settings, via a login attempt to a context, aka Bug ID CSCts30631, a different vulnerability than CVE-2012-3058. | [
"cpe:2.3:a:cisco:application_control_engine_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a1\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a1\\(7a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a1\\(7b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a1\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a1\\(8a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(1.0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(2.1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(2.2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(2.3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(2.5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(2.6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a3\\(2.7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a4\\(1.0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a4\\(1.1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a4\\(2.1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a4\\(2.2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_control_engine_software:a5\\(1.0\\):*:*:*:*:*:*:*"
] |
|
CVE-2014-9864 | drivers/misc/qseecom.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not validate ioctl calls, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28747998 and Qualcomm internal bug CR561841. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-hq49-pqh6-q532 | Microsoft SharePoint Server allows an elevation of privilege vulnerability due to the way that it sanitizes a specially crafted web request to an affected SharePoint server, aka "SharePoint Server XSS Vulnerability". | [] |
|
GHSA-5cg5-8chj-3gqc | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 allows attacker to execute unauthorized code or commands via crafted HTTP requests. | [] |
|
GHSA-33qp-rrww-3f5q | Elgg through 1.7.10 has a SQL injection vulnerability | [] |
|
GHSA-r6gh-rc9c-ppvr | Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code. | [] |
|
GHSA-gwpf-9wmj-hh9j | Multiple unknown vulnerabilities in the (1) AIM, (2) LDAP, (3) FibreChannel, (4) GSM_MAP, (5) SRVLOC, and (6) NTLMSSP dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash). | [] |
|
CVE-2008-7202 | Multiple cross-site scripting (XSS) vulnerabilities in OpenWebMail before 2.53 (Stable) allow remote attackers to inject arbitrary web script or HTML via unknown vectors. | [
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:openwebmail.acatysmoof:openwebmail:2.51:*:*:*:*:*:*:*"
] |
|
CVE-2001-0500 | Buffer overflow in ISAPI extension (idq.dll) in Index Server 2.0 and Indexing Service 2000 in IIS 6.0 beta and earlier allows remote attackers to execute arbitrary commands via a long argument to Internet Data Administration (.ida) and Internet Data Query (.idq) files such as default.ida, as commonly exploited by Code Red. | [
"cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:indexing_service:*:*:windows_2000:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_server:*:beta:*:*:*:*:*:*"
] |
|
GHSA-xq9p-h64g-x8mc | Weak default folder permissions | [] |
|
GHSA-pjgq-j3j9-v9h8 | CRLF injection vulnerability in calendar.php in DCP-Portal 5.3.2 and earlier allows remote attackers to conduct HTTP response splitting attacks to spoof web content and poison web caches via CRLF ("%0d%0a") sequences in the PHPSESSID parameter. | [] |
|
GHSA-mmwq-426x-572r | SQL injection vulnerability in the Yet another Newsletter Component (aka YaNC or com_yanc) component before 1.5 beta 3 for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter to index.php. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2018-11993 | Improper check while accessing the local memory stack on MQTT connection request can lead to buffer overflow in snapdragon wear in versions MDM9206, MDM9607 | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*"
] |
|
GHSA-j843-59rp-cr9m | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-2p8j-grjc-cgvh | SQL injection vulnerability in the submitSurvey function in controller.php in JQuarks4s (com_jquarks4s) component 1.0.0 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the q parameter in a submitSurvey action to index.php. | [] |
|
GHSA-f2wm-xj9m-2hvj | Lack of an appropriate action on page navigation in Blink in Google Chrome prior to 58.0.3029.81 for Windows and Mac allowed a remote attacker to potentially confuse a user into making an incorrect security decision via a crafted HTML page. | [] |
|
CVE-2024-26580 | Apache InLong: Logged-in user could exploit an arbitrary file read vulnerability | Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.8.0 through 1.10.0, the attackers can
use the specific payload to read from an arbitrary file. Users are advised to upgrade to Apache InLong's 1.11.0 or cherry-pick [1] to solve it.
[1] https://github.com/apache/inlong/pull/9673 | [
"cpe:2.3:a:apache:inlong:1.4.0:*:*:*:*:*:*:*"
] |
CVE-2007-5394 | Stack-based buffer overflow in AldFs32.dll in Adobe PageMaker 7.0.1 and 7.0.2 allows user-assisted remote attackers to execute arbitrary code via a .PMD file with a crafted font structure, a different vulnerability than CVE-2007-5169 and CVE-2007-6432. | [
"cpe:2.3:a:adobe:pagemaker:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:pagemaker:7.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-f266-v5mw-4629 | Processing DCB/AVB algorithm with an invalid queue index from IOCTL request could lead to arbitrary address modification in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music | [] |
|
CVE-2016-10299 | An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-32577244. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-6924 | The Metro News (aka com.netpia.ha.metro) application 1.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:metroseoul:metro_news:1.6.5:*:*:*:*:android:*:*"
] |
|
GHSA-5jc8-jgjw-38vr | Improper authorization in the Circles app 0.17.7 causes retaining access when an email address was removed from a circle. | [] |
|
GHSA-r4q8-v93h-wrvh | SQL injection vulnerability in mainx_a.php in E-PROMPT C BetMore Site Suite 4.0 through 4.2.0 allows remote attackers to execute arbitrary SQL commands via the bid parameter. | [] |
|
CVE-2010-1984 | Cross-site scripting (XSS) vulnerability in the Taxonomy Breadcrumb module 5.x before 5.x-1.5 and 6.x before 6.x-1.1 for Drupal allows remote authenticated users, with administer taxonomy permissions, to inject arbitrary web script or HTML via the taxonomy term name in a Breadcrumb display. | [
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:5.x-1.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:6.x-0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_nichols:taxonomy_breadcrumb:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] |
|
GHSA-548g-pcc5-4492 | Windows Update Stack Elevation of Privilege Vulnerability | [] |
|
CVE-2014-1915 | Multiple cross-site request forgery (CSRF) vulnerabilities in Command School Student Management System 1.06.01 allow remote attackers to hijack the authentication of (1) administrators for requests that change the administrator password via an update action to sw/admin_change_password.php or (2) unspecified victims for requests that add a topic or blog entry to sw/add_topic.php. NOTE: vector 2 can be leveraged to bypass the authentication requirements for exploiting vector 1 in CVE-2014-1914. | [
"cpe:2.3:a:doug_poulin:command_school_student_management_system:1.06.01:*:*:*:*:*:*:*"
] |
|
GHSA-w53p-2mp4-cpvj | An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [] |
|
CVE-2017-18607 | The avada theme before 5.1.5 for WordPress has CSRF. | [
"cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2021-29432 | Malicious users could control the content of invitation emails | Sydent is a reference matrix identity server. A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. This issue has been fixed in 4469d1d. | [
"cpe:2.3:a:matrix:sydent:*:*:*:*:*:*:*:*"
] |
CVE-2024-49596 | Dell Wyse Management Suite, version WMS 4.4 and prior, contain a Missing Authorization vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service and arbitrary file deletion | [
"cpe:2.3:a:dell:dell_wyse_management_suite_repository:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:wyse_management_suite:-:*:*:*:*:*:*:*"
] |
|
GHSA-vv87-4q98-m4qm | OX App Suite 7.10.4 and earlier allows XSS via a crafted contact object (payload in the position or company field) that is mishandled in the App Suite UI on a smartphone. | [] |
|
GHSA-h7f2-gppj-23p5 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x before 4.0.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to gfx/layers/d3d10/ReadbackManagerD3D10.cpp and unknown other vectors. | [] |
|
CVE-2022-41715 | Memory exhaustion when compiling regular expressions in regexp/syntax | Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected. | [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
] |
GHSA-42pp-ccmj-xrg8 | The vCenter Server contains an arbitrary file deletion vulnerability in a VMware vSphere Life-cycle Manager plug-in. A malicious actor with network access to port 9087 on vCenter Server may exploit this issue to delete non critical files. | [] |
|
GHSA-6mrv-7rf8-prq8 | Unspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to execute arbitrary commands as the DB2 instance owner, related to invocation of TPUT by DB2DART. | [] |
|
GHSA-mpj8-76h7-w3gx | Heap-based buffer overflow in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to path rendering. | [] |
|
GHSA-348f-gwqg-3m3w | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GalleryCreator Gallery Blocks with Lightbox allows Stored XSS. This issue affects Gallery Blocks with Lightbox: from n/a through 3.2.5. | [] |
|
CVE-2010-0847 | Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image. | [
"cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*"
] |
|
GHSA-rqjm-424f-4pr4 | GifIndexToTrueColor in ngiflib.c in MiniUPnP ngiflib 0.4 has a Segmentation fault. | [] |
|
GHSA-9hm7-qmgf-q88w | Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186. | [] |
|
GHSA-599f-hxxf-hgx8 | In getAvailabilityStatus of several Transcode Permission Controllers, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261193935 | [] |
|
GHSA-xffq-h277-r59h | In drachtio-server 0.8.18, /var/log/drachtio has mode 0777 and drachtio.log has mode 0666. | [] |
|
CVE-2023-25094 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the into_class_node function with either the class_name or old_class_name variable. | [
"cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-533g-xcpj-m6xr | Cross-site request forgery (CSRF) vulnerability in administration/administrators.php in Link Up Gold 5.0 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts. | [] |
|
GHSA-cwrq-8w42-mhc5 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Weather Atlas Weather Atlas Widget allows Reflected XSS.This issue affects Weather Atlas Widget: from n/a through 3.0.1. | [] |
|
CVE-2014-1933 | The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. | [
"cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pythonware:python_imaging_library:*:*:*:*:*:*:*:*"
] |
|
GHSA-8wxh-5wv6-x378 | A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes. | [] |
|
CVE-2008-5230 | The Temporal Key Integrity Protocol (TKIP) implementation in unspecified Cisco products and other vendors' products, as used in WPA and WPA2 on Wi-Fi networks, has insufficient countermeasures against certain crafted and replayed packets, which makes it easier for remote attackers to decrypt packets from an access point (AP) to a client and spoof packets from an AP to a client, and conduct ARP poisoning attacks or other attacks, as demonstrated by tkiptun-ng. | [
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*"
] |
|
GHSA-3x48-c5fq-3p9x | The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.35.1. This makes it possible for authenticated attackers, with Contributor-level access and above, and permissions granted by an Administrator, to create new or edit existing forms, including updating the default registration role to Administrator on User Registration forms. | [] |
|
CVE-2015-3279 | Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow. | [
"cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-mqfp-m4wv-8hv5 | An issue was discovered in Bentley MicroStation before 10.17.0.x and Bentley View before 10.17.0.x. Using an affected version of MicroStation or MicroStation-based application to open a J2K file containing crafted data can force an out-of-bounds read. Exploitation of these vulnerabilities within the parsing of J2K files could enable an attacker to read information in the context of the current process. | [] |
|
CVE-2018-13201 | The sell function of a smart contract implementation for TiTok - Ticket Token (Contract Name: MyAdvancedToken7), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets. | [
"cpe:2.3:a:titok_-_ticket_token_project:titok_-_ticket_token:-:*:*:*:*:*:*:*"
] |
|
GHSA-q445-m72p-x8m3 | newsCMSlite stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for newsCMS.mdb. | [] |
|
CVE-2014-3399 | The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.2(.2.4) and earlier does not properly manage session information during creation of a SharePoint handler, which allows remote authenticated users to overwrite arbitrary RAMFS cache files or inject Lua programs, and consequently cause a denial of service (portal outage or system reload), via crafted HTTP requests, aka Bug ID CSCup54208. | [
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] |
|
GHSA-423x-7gwr-q727 | Advanced Authentication versions prior to 6.3 SP4 have a potential broken authentication due to improper session management issue. | [] |
|
GHSA-55mg-c2vp-hrq8 | lib/core.php in the Cool Video Gallery plugin 1.9 for WordPress allows remote attackers to execute arbitrary code via shell metacharacters in the "Width of preview image" and possibly other input fields in the "Video Gallery Settings" page. | [] |
|
GHSA-3c5r-q6c5-xr2g | The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image. | [] |
|
GHSA-5993-2g85-9fjv | The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and earlier does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a denial of service by leveraging permissions to map the memory of a foreign guest. | [] |
|
CVE-2024-0569 | Totolink T8 Setting cstecgi.cgi getSysStatusCfg information disclosure | A vulnerability classified as problematic has been found in Totolink T8 4.1.5cu.833_20220905. This affects the function getSysStatusCfg of the file /cgi-bin/cstecgi.cgi of the component Setting Handler. The manipulation of the argument ssid/key leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.5cu.862_B20230228 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-250785 was assigned to this vulnerability. | [
"cpe:2.3:o:totolink:t8_firmware:4.1.5cu.833_20220905:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] |
GHSA-c5vr-4286-qrcf | Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N). | [] |
|
GHSA-559w-3846-g7jq | A CWE-502 Deserialization of Untrusted Data vulnerability exists in SCADAPack x70 Security Administrator (V1.2.0 and prior) which could allow arbitrary code execution when an attacker builds a custom .SDB file containing a malicious serialized buffer. | [] |
|
CVE-2024-32484 | An reflected XSS vulnerability exists in the handling of invalid paths in the Flask server in Ankitects Anki 24.04. A specially crafted flashcard can lead to JavaScript code execution and result in an arbitrary file read. An attacker can share a malicious flashcard to trigger this vulnerability. | [
"cpe:2.3:a:ankitects:anki:24.04:*:*:*:*:*:*:*"
] |
|
GHSA-65vr-4gg3-qw3m | The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] |
|
GHSA-5x8p-x36c-4gwr | CandidATS version 3.0.0 allows an external attacker to read arbitrary files from the server. This is possible because the application is vulnerable to XXE. | [] |
|
GHSA-63cr-xg3f-8jvr | Leantime allows Stored Cross-Site Scripting (XSS) | SummaryStored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application.DetailsA Stored Cross-Site Scripting (XSS) vulnerability was found that could potentially compromise user data and pose a significant security risk to the platform.PoCCreate a projectNavigate to projectVisit to the integrationAdd malicious payload inside the webhook and save it.Notice the alert dialogue indicating successful execution of the XSS payload.POChttps://youtu.be/kqKFgsOqstgImpactThis XSS vulnerability allows an attacker to execute malicious scripts in the context of a victim's browser when they click on a specially crafted link. This could lead to various malicious activities, including session hijacking, stealing sensitive information such as cookies or login credentials, and potentially compromising the entire platform's security. | [] |
GHSA-h5pf-q287-qfw2 | Use-after-free vulnerability in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to unexpected absence of document data structures. | [] |
|
CVE-2017-0045 | Windows DVD Maker in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, and Windows Vista SP2 does not properly parse crafted .msdvd files, which allows attackers to obtain information to compromise a target system, aka "Windows DVD Maker Cross-Site Request Forgery Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] |
|
GHSA-qggh-q355-r325 | A SQL Injection vulnerability exists in Zoho ManageEngine Applications Manager 13.x before build 13800 via the j_username parameter in a /j_security_check POST request. | [] |
|
CVE-2005-3545 | SQL injection vulnerability in index.php of the report module in ibProArcade 2.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the user parameter. | [
"cpe:2.3:a:ibproarcade:ibproarcade:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-30247 | File Upload vulnerability found in Oretnom23 Storage Unit Rental Management System v.1.0 allows a remote attacker to execute arbitrary code via the update_settings parameter. | [
"cpe:2.3:a:storage_unit_rental_management_system_project:storage_unit_rental_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-fxqx-qj2c-2fc7 | Laundry Booking Management System 1.0 (Latest) and previous versions are affected by a remote code execution (RCE) vulnerability in profile.php through the "image" parameter that can execute a webshell payload. | [] |
|
CVE-2007-6142 | Multiple cross-site scripting (XSS) vulnerabilities in ph03y3nk just another flat file (JAF) CMS 4.0 RC2 allow remote attackers to inject arbitrary web script or HTML via the (1) show parameter to index.php and the (2) print parameter to print.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:salims_softhouse:jaf_cms:4.0_rc2:*:*:*:*:*:*:*"
] |
|
CVE-2022-38979 | The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. | [
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-7j43-4jvq-vg4w | Micro-Star International Z-series motherboards (Z590, Z490, and Z790) and B-series motherboards (B760, B560, B660, and B460) with firmware 7D25v14, 7D25v17 to 7D25v19, and 7D25v1A to 7D25v1H was discovered to contain a write-what-where condition in the in the SW handler for SMI 0xE3. | [] |
|
GHSA-7q22-x757-cmgc | Withdrawn Advisory: Symfony http-security has authentication bypass | Withdrawn AdvisoryThis advisory has been withdrawn because the report is not part of a valid vulnerability. This link is maintained to preserve external references. For more information, see advisory-database/pull/5046.Original DescriptionIn Symfony, a security vulnerability was identified in the FormLoginAuthenticator component, where it failed to adequately handle cases where the username or password field of a login request is empty. This flaw could lead to various security risks, including improper authentication logic handling or denial of service. | [] |
GHSA-jxqh-fx46-p9v3 | Multiple cross-site scripting (XSS) vulnerabilities in RadScripts RadBids Gold 2 allow remote attackers to inject arbitrary web script or HTML via (1) the farea parameter to faq.php or the (2) cat, (3) order, or (4) area parameters to index.php. | [] |
|
GHSA-wp47-9r3h-xfgq | Server-Side Request Forgery in Apache Traffic Control | In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach. | [] |
CVE-2020-20444 | Jact OpenClinic 0.8.20160412 allows the attacker to read server files after login to the the admin account by an infected 'file' GET parameter in '/shared/view_source.php' which "could" lead to RCE vulnerability . | [
"cpe:2.3:a:openclinic_project:openclinic:0.8.20160412:*:*:*:*:*:*:*"
] |
|
GHSA-w9x4-c822-p4wq | A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field. | [] |
|
CVE-2020-27922 | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing a maliciously crafted font file may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-96x4-h72c-272w | HMS Industrial Networks Netbiter WS100 3.30.5 devices and previous have reflected XSS in the login form. | [] |
|
GHSA-47qj-rqv2-98f2 | In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring. | [] |
|
GHSA-jfhm-5ghh-2f97 | cryptography vulnerable to NULL-dereference when loading PKCS7 certificates | SummaryCalling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault.PoCHere is a Python code that triggers the issue:ImpactExploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. | [] |
CVE-2023-41423 | Cross Site Scripting vulnerability in WP Githuber MD plugin v.1.16.2 allows a remote attacker to execute arbitrary code via a crafted payload to the new article function. | [
"cpe:2.3:a:terryl:wp_githuber_md:1.16.2:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-49859 | net: lapbether: fix issue of invalid opcode in lapbeth_open() | In the Linux kernel, the following vulnerability has been resolved:
net: lapbether: fix issue of invalid opcode in lapbeth_open()
If lapb_register() failed when lapb device goes to up for the first time,
the NAPI is not disabled. As a result, the invalid opcode issue is
reported when the lapb device goes to up for the second time.
The stack info is as follows:
[ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442!
[ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[ 1958.315979][T11356] RIP: 0010:napi_enable+0x16a/0x1f0
[ 1958.332310][T11356] Call Trace:
[ 1958.332817][T11356] <TASK>
[ 1958.336135][T11356] lapbeth_open+0x18/0x90
[ 1958.337446][T11356] __dev_open+0x258/0x490
[ 1958.341672][T11356] __dev_change_flags+0x4d4/0x6a0
[ 1958.345325][T11356] dev_change_flags+0x93/0x160
[ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0
[ 1958.346738][T11356] inet_ioctl+0x1c8/0x2d0
[ 1958.349638][T11356] sock_ioctl+0x5d1/0x750
[ 1958.356059][T11356] __x64_sys_ioctl+0x3ec/0x1790
[ 1958.365594][T11356] do_syscall_64+0x35/0x80
[ 1958.366239][T11356] entry_SYSCALL_64_after_hwframe+0x46/0xb0
[ 1958.377381][T11356] </TASK> | [] |
CVE-2014-6980 | The LINE PLAY (aka jp.naver.lineplay.android) application 2.3.1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:naver:line_play:2.3.1.1:*:*:*:*:android:*:*"
] |
|
GHSA-5hwf-735m-h24f | Rejected reason: This CVE ID was unused by the CNA. | [] |
|
GHSA-qf43-p4h7-pjpc | A vulnerability has been found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this vulnerability is an unknown functionality of the file general/system/approve_center/flow_sort/flow/delete.php. The manipulation of the argument id/sort_parent leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-243589 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2016-3385 | The scripting engine in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
CVE-2020-26031 | An issue was discovered in Zammad before 3.4.1. The global-search feature leaks Knowledge Base drafts to Knowledge Base readers (who are authenticated but have insufficient permissions). | [
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-5521 | Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2016-5512. | [
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.5:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.