id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-3281 | WAGO: multiple products - Loss of MAC-Address-Filtering after reboot | WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter. | [
"cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101\\/000-010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8101\\/000-010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8206\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8206\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8206\\/025-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8206\\/025-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8207\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8207\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8207\\/025-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8207\\/025-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8208\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8208\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8208\\/025-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8208\\/025-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8210\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8210\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212\\/000-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212\\/000-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212\\/025-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212\\/025-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212\\/025-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212\\/025-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8215_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8216\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8216\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8216\\/025-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8216\\/025-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8206\\/040-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8206\\/040-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8206\\/040-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8206\\/040-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8210\\/040-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8210\\/040-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8211\\/040-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8211\\/040-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212\\/040-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212\\/040-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212\\/040-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212\\/040-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8212\\/040-010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8212\\/040-010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8213\\/040-010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8213\\/040-010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8216\\/040-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8216\\/040-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8217\\/025-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8217\\/025-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8217\\/600-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8217\\/600-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:750-8217\\/625-000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:750-8217\\/625-000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*"
] |
CVE-2015-8371 | Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected. | [
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha10:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha11:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha7:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha8:*:*:*:*:*:*",
"cpe:2.3:a:getcomposer:composer:1.0.0:alpha9:*:*:*:*:*:*"
] |
|
CVE-2024-50609 | An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c. | [] |
|
GHSA-2ffg-9hw7-35q4 | When etcupdate encounters conflicts while merging files, it saves a version containing conflict markers in /var/db/etcupdate/conflicts. This version does not preserve the mode of the input file, and is world-readable. This applies to files that would normally have restricted visibility, such as /etc/master.passwd.An unprivileged local user may be able to read encrypted root and user passwords from the temporary master.passwd file created in /var/db/etcupdate/conflicts. This is possible only when conflicts within the password file arise during an update, and the unprotected file is deleted when conflicts are resolved. | [] |
|
GHSA-p24x-78x9-3f22 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). | [] |
|
CVE-2017-0640 | A remote denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33129467. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2004-0116 | An Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*"
] |
|
GHSA-6h86-pp56-mp6m | The installation procedure in BigBlueButton before 2.2.28 (or earlier) uses ClueCon as the FreeSWITCH password, which allows local users to achieve unintended FreeSWITCH access. | [] |
|
GHSA-fm5m-98hc-jv89 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arni Cinco Subscription Form for Feedblitz allows Stored XSS. This issue affects Subscription Form for Feedblitz: from n/a through 1.0.9. | [] |
|
GHSA-f3rq-463v-2j36 | A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. | [] |
|
CVE-2013-0377 | Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Client System Analyzer. | [
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2001-0423 | Buffer overflow in ipcs in Solaris 7 x86 allows local users to execute arbitrary code via a long TZ (timezone) environmental variable, a different vulnerability than CAN-2002-0093. | [
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*"
] |
|
CVE-2025-27497 | OpenDJ Denial of Service (Dos) using alias loop | OpenDJ is an LDAPv3 compliant directory service. OpenDJ prior to 4.9.3 contains a denial-of-service (DoS) vulnerability that causes the server to become unresponsive to all LDAP requests without crashing or restarting. This issue occurs when an alias loop exists in the LDAP database. If an ldapsearch request is executed with alias dereferencing set to "always" on this alias entry, the server stops responding to all future requests. Fortunately, the server can be restarted without data corruption. This vulnerability is fixed in 4.9.3. | [] |
CVE-2025-25454 | Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanSpeed2. | [] |
|
GHSA-3g8x-qh85-fr9c | IBM Security Directory Server 6.4.0 stores sensitive information in URLs. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referer header or browser history. IBM X-Force ID: 166623. | [] |
|
GHSA-m9jm-rhrm-gcxj | Path traversal in org.springframework.integration:spring-integration-zip | Spring-integration-zip versions prior to 1.0.1 exposes an arbitrary file write vulnerability, which can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z) that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. | [] |
GHSA-cmph-x6r4-4whr | netfilter: nft_set_rbtree: skip sync GC for new elements in this transactionNew elements in this transaction might expired before such transaction
ends. Skip sync GC for such elements otherwise commit path might walk
over an already released object. Once transaction is finished, async GC
will collect such expired element. | [] |
|
CVE-2023-34475 | A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] |
|
GHSA-cp99-548m-58v7 | In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished workIn btsdio_probe, &data->work was bound with btsdio_work.In
btsdio_send_frame, it was started by schedule_work.If we call btsdio_remove with an unfinished job, there may
be a race condition and cause UAF bug on hdev. | [] |
|
GHSA-hh57-6r48-4q3g | The systrace_exit function in the systrace utility for NetBSD-current and 2.0 before April 16, 2004, and certain FreeBSD ports, does not verify the owner of the /dec/systrace connection before setting euid to 0, which allows local users to gain root privileges. | [] |
|
GHSA-5f79-vhr4-vw2r | Magento Open Source allows Server-Side Request Forgery (SSRF) | Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. An admin-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction. | [] |
GHSA-fj32-6v7m-57pg | Improper Access Control in Elasticsearch | A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index. | [] |
CVE-2014-0668 | Cross-site scripting (XSS) vulnerability in the portal in Cisco Secure Access Control System (ACS) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCue65949. | [
"cpe:2.3:a:cisco:secure_access_control_system:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-26693 | This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4. A plug-in may be able to inherit the application's permissions and access user data. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-xr8h-99r6-56hg | SQL injection vulnerability in index.php in My PHP Baseball Stats (MyPBS) allows remote attackers to execute arbitrary SQL commands via the seasonID parameter. | [] |
|
GHSA-xhgh-53f7-w2q7 | Buffer overflow in the Webserver component on the Huawei E5332 router before 21.344.27.00.1080 allows remote authenticated users to cause a denial of service (reboot) via a long parameter in an API service request message. | [] |
|
GHSA-j78q-39hg-fjq9 | SQL injection vulnerability in Interspire ArticleLive NX 0.3 allows remote attackers to execute arbitrary SQL commands via the Query parameter. | [] |
|
CVE-2023-32300 | WordPress Yoast SEO: Local Plugin <= 14.8 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Yoast Yoast SEO: Local plugin <= 14.8 versions. | [
"cpe:2.3:a:yoast:yoast_seo:*:*:*:*:*:wordpress:*:*"
] |
GHSA-j3v2-x7wg-rgr9 | The library feature for Adobe Content Server 3.0 allows a remote attacker to check out an eBook for an arbitrary length of time via a modified loanMin parameter to download.asp. | [] |
|
CVE-2022-43627 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of SetStaticRouteIPv4Settings requests to the web management portal. When parsing subelements within the StaticRouteIPv4Data element, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16147. | [
"cpe:2.3:o:dlink:dir-1935_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1935_firmware:1.03:b1:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1935_firmware:1.03:b2:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-1935:-:*:*:*:*:*:*:*"
] |
|
GHSA-8gw2-9cr9-mmj8 | Cross-site request forgery (CSRF) vulnerability in Vivvo CMS before 4.0.4 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [] |
|
CVE-2019-3023 | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Stylesheet). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"
] |
|
CVE-2019-14731 | An issue was discovered in ZenTao 11.5.1. There is an XSS (stored) vulnerability that leads to the capture of other people's cookies via the Rich Text Box. | [
"cpe:2.3:a:cnezsoft:zentao:11.5.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-3018 | ipeak Infosystems ibexwebCMS (aka IPeakCMS) 3.5 is vulnerable to an unauthenticated Boolean-based SQL injection via the id parameter on the /cms/print.php page. | [
"cpe:2.3:a:ipeak:ipeakcms:3.5:*:*:*:*:*:*:*"
] |
|
CVE-2016-6955 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] |
|
GHSA-7v5m-mjhx-x6gc | An issue was discovered in Hyland org.alfresco:alfresco-content-services through 7.0.1.2. Script Action execution allows executing scripts uploaded outside of the Data Dictionary. This could allow a logged-in attacker to execute arbitrary code inside a sandboxed environment. | [] |
|
GHSA-479g-hqq2-vpr4 | IBM Rhapsody DM 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128461. | [] |
|
CVE-2024-38770 | WordPress Backup and Staging by WP Time Capsule plugin <= 1.22.20 - Authentication Bypass and Privilege Escalation Vulnerability | Improper Privilege Management vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Privilege Escalation, Authentication Bypass.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.20. | [
"cpe:2.3:a:revmakx:backup_and_staging_by_wp_time_capsule:*:*:*:*:*:*:*:*"
] |
GHSA-r986-j2xg-7944 | sastcpd in SAS/Base 8.0 allows local users to execute arbitrary code by setting the authprog environment variable to reference a malicious program, which is then executed by sastcpd. | [] |
|
CVE-2025-30622 | WordPress PostMash <= 1.0.3 - SQL Injection Vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in torsteino PostMash allows SQL Injection. This issue affects PostMash: from n/a through 1.0.3. | [] |
GHSA-xw24-w9w2-xw4q | A privilege escalation vulnerability exists in the IOCTL 0x9c406144 handling of IOBit Advanced SystemCare Ultimate 14.2.0.220. A specially crafted I/O request packet (IRP) can lead to increased privileges. An attacker can send a malicious IRP to trigger this vulnerability. | [] |
|
CVE-2023-29313 | [FG-VD-23-014] Adobe InDesign 2023 Out-of-Bound Read Vulnerability XI Notification | Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2022-44849 | A Cross-Site Request Forgery (CSRF) in the Administrator List of MetInfo v7.7 allows attackers to arbitrarily add Super Administrator account. | [
"cpe:2.3:a:metinfo:metinfo:7.7:*:*:*:*:*:*:*"
] |
|
CVE-2016-3562 | Unspecified vulnerability in the RDBMS Security and SQL*Plus components in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows remote administrators to affect confidentiality via vectors related to DBA. | [
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-c676-8v9r-pxgj | An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.). | [] |
|
GHSA-g5x4-6wrj-6j37 | Missing Authorization vulnerability in Tips and Tricks HQ, wptipsntricks Stripe Payments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stripe Payments: from n/a through 2.0.79. | [] |
|
GHSA-x25r-pmgp-r2rg | Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements. | [] |
|
GHSA-mp68-mcgr-c9f7 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, and CVE-2016-6989. | [] |
|
GHSA-9wwg-r3c7-4vfg | Pimcore Admin UI has Two Factor Authentication disabled for non admin security firewalls | Impact`AdminBundle\Security\PimcoreUserTwoFactorCondition` introduced in v11 disable the two factor authentication for all non-admin security firewalls.An authenticated user can access the system without having to provide the 2 factor credentials.PatchesApply patch https://patch-diff.githubusercontent.com/raw/pimcore/admin-ui-classic-bundle/pull/345.patchWorkaroundsUpgrade to version 1.2.2 or apply the [patch](https://patch-diff.githubusercontent.com/raw/pimcore/admin-ui-classic-bundle/pull/345.patch) manually. | [] |
CVE-2008-4938 | aegis 4.24 and aegis-web 4.24 allow local users to overwrite arbitrary files via a symlink attack on (a) /tmp/#####, (b) /tmp/#####.intro, (c) /tmp/aegis.#####.ae, (d) /tmp/aegis.#####, (e) /tmp/aegis.#####.1, (f) /tmp/aegis.#####.2, (g) /tmp/aegis.#####.log, and (h) /tmp/aegis.#####.out temporary files, related to the (1) bng_dvlpd.sh, (2) bng_rvwd.sh, (3) awt_dvlp.sh, (4) awt_intgrtn.sh, and (5) aegis.cgi scripts. | [
"cpe:2.3:a:aegis:aegis:4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:aegis:aegis-web:4.24:*:*:*:*:*:*:*"
] |
|
CVE-2023-4651 | Server-Side Request Forgery (SSRF) in instantsoft/icms2 | Server-Side Request Forgery (SSRF) in GitHub repository instantsoft/icms2 prior to 2.16.1. | [
"cpe:2.3:a:instantcms:instantcms:*:*:*:*:*:*:*:*"
] |
CVE-2018-7432 | Splunk Enterprise 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allow remote attackers to cause a denial of service via a crafted HTTP request. | [
"cpe:2.3:a:splunk:splunk:*:*:*:*:light:*:*:*",
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2020-0320 | In libstagefright, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-129282427 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-fx38-982m-9mhr | Unrestricted Upload of File with Dangerous Type vulnerability in David DONISA WP donimedia carousel allows Upload a Web Shell to a Web Server.This issue affects WP donimedia carousel: from n/a through 1.0.1. | [] |
|
CVE-2019-17336 | TIBCO Spotfire Web Player Potentially Exposes Credentials For Shared Data Sources | The Data access layer component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to information that can lead to obtaining credentials used to access Spotfire data sources. The attacker would need privileges to save a Spotfire file to the library, and only applies in a situation where NTLM credentials, or a credentials profile is in use. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0. | [
"cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:7.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:7.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:7.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.6.0:*:*:*:*:*:*:*"
] |
GHSA-rgjj-xgcc-3j8h | The Access Control functionality (JMXOpsAccessControlFilter) in JMX Console in JBoss Application Server 4.0.2 and 4.0.5 before 20070416 uses a member variable to store the roles of the current user, which allows remote authenticated administrators to trigger a race condition and gain privileges by logging in during a session by a more privileged administrator, as demonstrated by privilege escalation from Read Mode to Write Mode. | [] |
|
GHSA-5c8j-7c6c-838x | Lack of rate limiting in M-Files Server and M-Files Web products with versions before 21.12.10873.0 in certain type of user accounts allows unlimited amount of attempts and therefore makes brute-forcing login accounts easier. | [] |
|
GHSA-76wg-3c38-9p89 | Windows Mobile Broadband Driver Elevation of Privilege Vulnerability | [] |
|
CVE-2013-1949 | Social Media Widget (social-media-widget) plugin 4.0 for WordPress contains an externally introduced modification (Trojan Horse), which allows remote attackers to force the upload of arbitrary files. | [
"cpe:2.3:a:blinkwebeffects:social-media-widget:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-4951 | Cross Site Scripting (XSS) Issue on "Client Based Authentication Policy Configuration" Screen | A cross site scripting issue was discovered with the pagination function on the "Client-based Authentication Policy Configuration" screen of the GreenRADIUS web admin interface. This issue is found in GreenRADIUS v5.1.1.1 and prior. A fix was included in v5.1.2.2.
| [
"cpe:2.3:a:greenrocketsecurity:greenradius:*:*:*:*:*:*:*:*"
] |
CVE-2009-1930 | The Telnet service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote Telnet servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, aka "Telnet Credential Reflection Vulnerability," a related issue to CVE-2000-0834. | [
"cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
] |
|
CVE-2022-21644 | SQL Injection via search in USOC | USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via usersearch.php. In search terms provided by the user were not sanitized and were used directly to construct a sql statement. The only users permitted to search are site admins. Users are advised to upgrade as soon as possible. There are not workarounds for this issue. | [
"cpe:2.3:a:useful_simple_open-source_cms_project:useful_simple_open-source_cms:*:*:*:*:*:*:*:*"
] |
CVE-2024-43500 | Windows Resilient File System (ReFS) Information Disclosure Vulnerability | Windows Resilient File System (ReFS) Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
CVE-2016-5586 | Unspecified vulnerability in the Oracle Email Center component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote attackers to affect confidentiality and integrity via unknown vectors. | [
"cpe:2.3:a:oracle:email_center:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.6:*:*:*:*:*:*:*"
] |
|
GHSA-q238-m8fr-mjrj | OpenEMR through 5.0.2 has SQL Injection in the Lifestyle demographic filter criteria in library/clinical_rules.php that affects library/patient.inc. | [] |
|
GHSA-m3xj-59h7-ggx6 | The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072. | [] |
|
CVE-2006-1873 | Unspecified vulnerability in Oracle Database Server 9.2.0.7, 10.1.0.4, and 10.2.0.1 has unknown impact and attack vectors in the Oracle Spatial component, aka Vuln# DB08. | [
"cpe:2.3:a:oracle:database_server:9.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2013-4654 | Symlink Traversal vulnerability in TP-LINK TL-WDR4300 and TL-1043ND.. | [
"cpe:2.3:o:tp-link:tl-wdr4300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wdr4300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-1043nd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-1043nd:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-25779 | Baby Care System v1.0 is vulnerable to SQL injection via the 'id' parameter on the contentsectionpage.php page. | [
"cpe:2.3:a:baby_care_system_project:baby_care_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2016-9606 | JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions. | [
"cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-43710 | Interactive Forms (IAF) in GX Software XperienCentral versions 10.31.0 until 10.33.0 was vulnerable to cross site request forgery (CSRF) because the unique token could be deduced using the names of all input fields. | [
"cpe:2.3:a:gxsoftware:xperiencentral:*:*:*:*:*:*:*:*"
] |
|
GHSA-3pqh-mpvw-5fr2 | Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API. | [] |
|
CVE-2024-6396 | Arbitrary File Overwrite and Data Exfiltration in aimhubio/aim | A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution. | [
"cpe:2.3:a:aimhubio:aim:3.19.3:*:*:*:*:*:*:*"
] |
CVE-2024-11643 | Accessibility by AllAccessible <= 1.3.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Option Update | The Accessibility by AllAccessible plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'AllAccessible_save_settings' function in all versions up to, and including, 1.3.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | [
"cpe:2.3:a:allaccessible:accessibility:*:*:*:*:*:*:*:*"
] |
GHSA-r9x8-x33r-r8q2 | A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded browser does not prevent interaction with alternative URI schemes when redirected to corresponding resources by web application code. By setting the homepage URI, the favorite URIs, or redirecting embedded browser users via JavaScript code to alternative scheme resources, a remote low privileged attacker can perform a range of attacks against the device, such as read arbitrary files on the filesystem, execute arbitrary JavaScript code in order to steal or manipulate the information on the screen, or trigger denial of service conditions. | [] |
|
GHSA-q7rv-wc43-365x | IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 143794. | [] |
|
CVE-2006-4681 | Directory traversal vulnerability in Redirect.bat in IBM Director before 5.10 allows remote attackers to read arbitrary files via a .. (dot dot) sequence in the file parameter. | [
"cpe:2.3:a:ibm:director:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-1123 | Google Chrome before 9.0.597.107 does not properly restrict access to internal extension functions, which has unspecified impact and remote attack vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-31821 | An issue found in ALBIS Co. ALBIS v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp ALBIS function. | [
"cpe:2.3:a:albis:albis:13.6.1:*:*:*:*:*:*:*"
] |
|
GHSA-63f2-c3cf-4m52 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2022-26251 | The HTTP interface of Synaman v5.1 and below was discovered to allow authenticated attackers to execute arbitrary code and escalate privileges. | [
"cpe:2.3:a:synametrics:synaman:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-22727 | WordPress MailChimp Subscribe Form plugin <= 4.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PluginOps MailChimp Subscribe Forms allows Stored XSS. This issue affects MailChimp Subscribe Forms : from n/a through 4.1. | [] |
GHSA-6j75-9vmv-439p | A vulnerability classified as critical was found in Project Worlds Online Lawyer Management System 1.0. This vulnerability affects unknown code of the file /approve_lawyer.php. The manipulation of the argument unblock_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-qvf7-37f3-pvmw | The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers "type confusion." | [] |
|
CVE-2021-37638 | Null pointer dereference in `RaggedTensorToTensor` in TensorFlow | TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty. We have patched the issue in GitHub commit 301ae88b331d37a2a16159b65b255f4f9eb39314. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*"
] |
CVE-2021-46070 | A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel. | [
"cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:*"
] |
|
GHSA-5r72-jhpg-7v5v | Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30197. | [] |
|
CVE-2024-38228 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Microsoft SharePoint Server Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*"
] |
CVE-2024-37030 | Arkcompiler Ets Runtime has a use after free vulnerability | in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free. | [
"cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*"
] |
GHSA-rq83-h985-5f5r | SQL injection in admin.php in Online Book Store 1.0 allows remote attackers to execute arbitrary SQL commands and bypass authentication. | [] |
|
GHSA-7f2v-5877-rx3x | Code injection in REDAXO | An issue was discovered in REDAXO version 5.15.1, allows attackers to execute arbitrary code and obtain sensitive information via modules.modules.php. | [] |
CVE-2017-11196 | Pulse Connect Secure 8.3R1 has CSRF in logout.cgi. The logout function of the admin panel is not protected by any CSRF tokens, thus allowing an attacker to logout a user by making them visit a malicious web page. | [
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3r1.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-27848 | broccoli-compass v0.2.4 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function. | [
"cpe:2.3:a:broccoli-compass_project:broccoli-compass:0.2.4:*:*:*:*:node.js:*:*"
] |
|
GHSA-9wg5-4w44-rm5v | Fabasoft Cloud Enterprise Client 23.3.0.130 allows a user to escalate their privileges to local administrator. | [] |
|
GHSA-3rjg-586v-gcmf | Beauty Parlour Booking Script 1.0 has SQL Injection via the /list gender or city parameter. | [] |
|
GHSA-ggh9-7q27-c7v4 | Siemens Automation License Manager (ALM) before 5.3 SP3 allows remote attackers to write to files, rename files, create directories, or delete directories via crafted packets. | [] |
|
CVE-2016-2087 | Directory traversal vulnerability in the client in HexChat 2.11.0 allows remote IRC servers to read or modify arbitrary files via a .. (dot dot) in the server name. | [
"cpe:2.3:a:hexchat_project:hexchat:2.11.0:*:*:*:*:*:*:*"
] |
|
GHSA-6vcx-5chv-mvq3 | This document describes a security vulnerability in Blade Maintenance Entity, Integrated Maintenance Entity and Maintenance Entity products. All J/H-series NonStop systems have a security vulnerability associated with an open UDP port 17185 on the Maintenance LAN which could result in information disclosure, denial-of-service attacks or local memory corruption against the affected system and a complete control of the system may also be possible. This vulnerability exists only if one gains access to the Maintenance LAN to which Blade Maintenance Entity, Integrated Maintenance Entity or Maintenance Entity product is connected. **Workaround:** Block the UDP port 17185(In the Maintenance LAN Network Switch/Firewall). Fix: Install following SPRs, which are already available: * T1805A01^AAI (Integrated Maintenance Entity) * T4805A01^AAZ (Blade Maintenance Entity). These SPRs are also usable with the following RVUs: * J06.19.00 ? J06.23.01. No fix planned for the following RVUs: J06.04.00 ? J06.18.01. No fix planned for H-Series NonStop systems. No fix planned for the product T2805 (Maintenance Entity). | [] |
|
GHSA-64rj-5cf2-pc5w | A vulnerability in the web-based UI of Cisco Prime Collaboration Assurance could allow an authenticated, remote attacker to overwrite files on the file system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a specific UI input field to provide a custom path location. A successful exploit could allow the attacker to overwrite files on the file system. | [] |
|
CVE-2006-0878 | Noah's Classifieds 1.3 allows remote attackers to obtain the installation path via a direct request to include files, as demonstrated by classifieds/gorum/category.php. | [
"cpe:2.3:a:phpoutsourcing:noahs_classifieds:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpoutsourcing:noahs_classifieds:1.3:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.