Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2004-2495
The (1) Webmail, (2) admin, and (3) SMTP services in Ability Mail Server 1.18 allow remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous connections to the service.
[ "cpe:2.3:a:code-crafters:ability_mail_server:1.18:*:*:*:*:*:*:*" ]
CVE-2005-3658
Multiple heap-based buffer overflows in EMC Legato NetWorker 7.1.x before 7.1.4 and 7.2.x before 7.2.1.Build.314, and other products such as Sun Solstice Backup (SBU) 6.0 and 6.1 and StorEdge Enterprise Backup Software (EBS) 7.1 through 7.2L, allow remote attackers to execute arbitrary code or cause a denial of service (unresponsive application) via malformed RPC packets to (1) RPC program number 390109 (nsrd.exe) and (2) RPC program number 390113 (nsrexecd.exe).
[ "cpe:2.3:a:emc:legato_networker:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:7.2_build172:*:*:*:*:*:*:*" ]
CVE-2007-0010
The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.
[ "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*" ]
CVE-2024-12331
File Manager Pro – Filester <= 1.8.6 - Missing Authorization to Authenticated (Subscriber+) Filebird Plugin Installation
The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_install_plugin' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Filebird plugin.
[]
GHSA-fw7m-g7q3-mm9m
Cross-Site Request Forgery (CSRF) vulnerability in Andy Chapman ECT Add to Cart Button allows Stored XSS.This issue affects ECT Add to Cart Button: from n/a through 1.4.
[]
CVE-2024-38564
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
In the Linux kernel, the following vulnerability has been resolved: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE bpf_prog_attach uses attach_type_to_prog_type to enforce proper attach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses bpf_prog_get and relies on bpf_prog_attach_check_attach_type to properly verify prog_type <> attach_type association. Add missing attach_type enforcement for the link_create case. Otherwise, it's currently possible to attach cgroup_skb prog types to other cgroup hooks.
[]
CVE-2020-24589
The Management Console in WSO2 API Manager through 3.1.0 and API Microgateway 2.2.0 allows XML External Entity injection (XXE) attacks.
[ "cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*" ]
GHSA-fc26-c437-49h2
Stack-based buffer overflow in npjp2.dll in LuraWave JP2 Browser Plug-In 1.1.1.11 and other versions before 2.1.1.11 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.
[]
CVE-2017-7742
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
[ "cpe:2.3:a:libsndfile_project:libsndfile:*:*:*:*:*:*:*:*" ]
CVE-2021-40553
piwigo 11.5.0 is affected by a remote code execution (RCE) vulnerability in the LocalFiles Editor.
[ "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*" ]
CVE-2007-4286
Buffer overflow in the Next Hop Resolution Protocol (NHRP) functionality in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (restart) and execute arbitrary code via a crafted NHRP packet.
[ "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*" ]
GHSA-qg25-rr8f-97f2
utilities/register.asp in Nukedit 4.9.6 and earlier allows remote attackers to create new users as part of arbitrary groups, including the administrative group, via a modified groupid parameter when creating a user via the addDB action.
[]
CVE-2023-5251
The Grid Plus plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'grid_plus_save_layout_callback' and 'grid_plus_delete_callback' functions in versions up to, and including, 1.3.2. This makes it possible for authenticated attackers with subscriber privileges or above, to add, update or delete grid layout.
[ "cpe:2.3:a:g5theme:grid_plus:*:*:*:*:*:wordpress:*:*" ]
GHSA-xmg9-3rch-w3ff
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0610, CVE-2019-0640, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655.
[]
GHSA-4rcf-j8r8-4576
Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
[]
GHSA-24xg-98w5-96c8
0irc 1345 build 20060823 allows remote attackers to cause a denial of service (application crash) by operating an IRC server that sends a long string to a client, which triggers a NULL pointer dereference.
[]
GHSA-m3w3-qr42-6xp4
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeisle Multiple Page Generator Plugin – MPG allows SQL Injection.This issue affects Multiple Page Generator Plugin – MPG: from n/a through 3.4.7.
[]
GHSA-gv89-cmj2-j2r6
Argument injection vulnerability in IBM Lotus Notes 6.0.3 and 6.5 allows remote attackers to execute arbitrary code via a notes: URI that uses a UNC network share pathname to provide an alternate notes.ini configuration file to notes.exe.
[]
GHSA-7hxq-2vp3-4xmj
Apache OFBiz up to version 18.12.05 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles URLs provided by external, unauthenticated users. Upgrade to 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12599
[]
GHSA-4fqx-74rv-638w
Pivotal Concourse SQL Injection Vulnerability
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.
[]
CVE-2017-1000115
Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository
[ "cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
CVE-2021-24234
Ivory Search < 4.6.1 - Reflected Cross Site Scripting (XSS)
The Search Forms page of the Ivory Search WordPress lugin before 4.6.1 did not properly sanitise the tab parameter before output it in the page, leading to a reflected Cross-Site Scripting issue when opening a malicious crafted link as a high privilege user. Knowledge of a form id is required to conduct the attack.
[ "cpe:2.3:a:ivorysearch:ivory_search:*:*:*:*:*:wordpress:*:*" ]
CVE-2005-2407
A design error in Opera 8.01 and earlier allows user-assisted attackers to execute arbitrary code by overlaying a malicious new window above a file download dialog box, then tricking the user into double-clicking on the "Run" button, aka "link hijacking".
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*" ]
GHSA-fgmq-fxrw-4cf2
Unrestricted file upload vulnerability in index.php in Atomymaxsite 2.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file, as exploited in the wild in October 2012.
[]
GHSA-5g88-9rgx-mvq2
SQL injection vulnerability in status/service/acknowledge in Opsview before 4.4.1 allows remote attackers to execute arbitrary SQL commands via the service_selection parameter.
[]
CVE-2018-20432
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.
[ "cpe:2.3:o:dlink:covr-2600r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:covr-2600r:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:covr-3902_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:covr-3902:-:*:*:*:*:*:*:*" ]
GHSA-xxxm-cq2q-5v69
IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 257132.
[]
GHSA-j479-78hc-x5ch
Cross-Site Request Forgery (CSRF) vulnerability in Kaloyan K. Tsvetkov Broken Images allows Cross-Site Scripting (XSS).This issue affects Broken Images: from n/a through 0.2.
[]
GHSA-22w7-gmrw-m5qp
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. A malicious application may be able to elevate privileges.
[]
CVE-2021-24439
Browser Screenshots < 1.7.6 - Contributor+ Stored XSS
The Browser Screenshots WordPress plugin before 1.7.6 allowed authenticated users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks as the image_class parameter of the browser-shot shortcode was not escaped.
[ "cpe:2.3:a:prothemedesign:browser_screenshots:*:*:*:*:*:wordpress:*:*" ]
GHSA-4392-4w2j-v4vh
Authorization Bypass Through User-Controlled Key vulnerability in PruvaSoft Informatics Apinizer Management Console allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Apinizer Management Console: before 2024.05.1.
[]
GHSA-gf34-4mw4-72q6
u'SMEM partition can be manipulated in case of any compromise on HLOS, thus resulting in access to memory outside of SMEM address range which could lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6574AU, QCA8081, QCM2150, QCN7605, QCN7606, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[]
GHSA-pxhq-xq33-27qf
Unspecified vulnerability in HP ProCurve 9300m Series switches with software 08.0.01c through 08.0.01j allows remote attackers to cause a denial of service via unknown vectors, a different switch series than CVE-2006-4015.
[]
CVE-2024-39419
A user without ship permissions can ship the orders
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*" ]
CVE-2020-8907
Priviged Escalation in Google Cloud Platform's Guest-OSLogin
A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "docker" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "docker" user from the OS Login entry.
[ "cpe:2.3:a:google:guest-oslogin:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" ]
CVE-2023-38041
A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
[ "cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2023-30262
An issue found in MIM software Inc MIM License Server and MIMpacs services v.6.9 thru v.7.0 fixed in v.7.0.10 allows a remote unauthenticated attacker to execute arbitrary code via the RMI Registry service.
[ "cpe:2.3:a:mimsoftware:mim_concurrent_license_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:mimsoftware:mim_local_concurrent_license_server:*:*:*:*:*:*:*:*" ]
CVE-2006-4989
Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.
[ "cpe:2.3:a:patrick_michaelis:wili-cms:0.1.1:*:*:*:*:*:*:*" ]
CVE-2019-11597
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*" ]
CVE-2024-40812
A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2022-0895
Static Code Injection in microweber/microweber
Static Code Injection in GitHub repository microweber/microweber prior to 1.3.
[ "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*" ]
GHSA-jhg8-jhwv-ch4j
Text Rider 2.4 stores sensitive data in the data directory under the web document root with insufficient access control, which allows remote attackers to obtain usernames and password hashes by directly accessing data/userlist.txt.
[]
GHSA-7p5f-7qpj-wpgq
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.
[]
GHSA-rjg3-r8f3-xp64
Server-Side Request Forgery (SSRF) vulnerability in Poll Maker Team Poll Maker – Best WordPress Poll Plugin.This issue affects Poll Maker – Best WordPress Poll Plugin: from n/a through 4.6.2.
[]
CVE-2015-0487
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect integrity via vectors related to PIA Core Technology, a different vulnerability than CVE-2015-0472.
[ "cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.54:*:*:*:*:*:*:*" ]
CVE-2016-10945
The PageLines theme 1.1.4 for WordPress has wp-admin/admin-post.php?page=pagelines CSRF.
[ "cpe:2.3:a:pagelines:pagelines:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-34535
Digital Watchdog DW MEGApix IP cameras A7.2.2_20211029 allows unauthenticated attackers to view internal paths and scripts via web files.
[ "cpe:2.3:o:dw:megapix_firmware:4.2.0.32842:*:*:*:*:*:*:*", "cpe:2.3:h:dw:megapix:-:*:*:*:*:*:*:*" ]
GHSA-9q3j-vp3j-6rc7
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view/student_profile.php. The manipulation of the argument std_index leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-265102 is the identifier assigned to this vulnerability.
[]
CVE-2007-3081
PHP remote file inclusion vulnerability in sampleecommerce.php in Comdev eCommerce 4.1 allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter.
[ "cpe:2.3:a:comdev:comdev_ecommerce:4.1:*:*:*:*:*:*:*" ]
CVE-2004-0252
TYPSoft FTP Server 1.10 allows remote attackers to cause a denial of service (CPU consumption) via an empty USER name.
[ "cpe:2.3:a:typsoft:typsoft_ftp_server:1.1:*:*:*:*:*:*:*" ]
GHSA-39f8-m89f-hv2p
CSRF vulnerability in Smoothwall Express 3.
[]
GHSA-5qv5-jwvp-cwxw
Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.
[]
CVE-2024-26158
Microsoft Install Service Elevation of Privilege Vulnerability
Microsoft Install Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
CVE-2023-34961
Chamilo v1.11.x up to v1.11.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the /feedback/comment field.
[ "cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*" ]
CVE-2014-7327
The Macau Business (aka com.magzter.macaubusiness) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:magzter:macau_business:3:*:*:*:*:android:*:*" ]
CVE-2024-12039
Improper Restriction of Excessive Authentication Attempts in langgenius/dify
langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in a complete compromise of the application.
[]
GHSA-wmcg-jxc8-7m7p
The MapPress Maps for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the width and height parameters in all versions up to, and including, 2.88.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-jw2f-vcgp-295r
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&find=.
[]
CVE-2024-26062
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
GHSA-rmgx-g94r-75jg
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.
[]
GHSA-xmx2-vxw5-6rg6
NEC UM8000, UM4730 and prior non-InMail voicemail systems with all known software versions may permit an infinite number of login attempts in the telephone user interface (TUI), effectively allowing brute force attacks.
[]
GHSA-m65c-wmw9-vmpp
Apache Zeppelin: Replacing other users notebook, bypassing any permissions
Authentication Bypass by Spoofing vulnerability by replacing to exsiting notes in Apache Zeppelin. This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0.Users are recommended to upgrade to version 0.11.0, which fixes the issue.
[]
GHSA-rrx7-84fw-cxr2
samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file.
[]
CVE-2019-8656
This was addressed with additional checks by Gatekeeper on files mounted through a network share. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. Extracting a zip file containing a symbolic link to an endpoint in an NFS mount that is attacker controlled may bypass Gatekeeper.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-25pf-65p9-qghp
Cross-Site Request Forgery (CSRF) vulnerability in Blackbam TinyMCE Advanced qTranslate fix editor problems allows Stored XSS. This issue affects TinyMCE Advanced qTranslate fix editor problems: from n/a through 1.0.0.
[]
GHSA-h73v-7w7m-qj4r
A vulnerability classified as problematic was found in FabulaTech USB over Network 6.0.6.1. Affected by this vulnerability is the function 0x220408 in the library ftusbbus2.sys of the component IOCT Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2009-10003
capnsquarepants wordcraft tag.php cross site scripting
A vulnerability was found in capnsquarepants wordcraft up to 0.6. It has been classified as problematic. Affected is an unknown function of the file tag.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 0.7 is able to address this issue. The patch is identified as be23028633e8105de92f387036871c03f34d3124. It is recommended to upgrade the affected component. VDB-219714 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:wordcraft_project:wordcraft:*:*:*:*:*:*:*:*" ]
CVE-2008-1236
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
GHSA-wq4r-h44x-wppw
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Oracle Management Service). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[]
CVE-2023-50718
NocoDB SQL Injection vulnerability
NocoDB is software for building databases as spreadsheets. Prior to version 0.202.10, an authenticated attacker with create access could conduct a SQL Injection attack on MySQL DB using unescaped `table_name`. This vulnerability may result in leakage of sensitive data in the database. Version 0.202.10 contains a patch for the issue.
[ "cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*" ]
GHSA-44mr-92xw-jfrv
An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.
[]
GHSA-jfmq-4g4m-99rh
Nimbus JOSE+JWT vulnerable to padding oracle attack
Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack.
[]
GHSA-vxgf-mfh8-2484
The advanced-ajax-page-loader plugin before 2.7.7 for WordPress has no protection against the reading of uploaded files when not logged in.
[]
GHSA-j5qp-ff5h-ffgc
A vulnerability was found in GZ Scripts Car Listing Script PHP 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file /preview.php. The manipulation of the argument page/sort_by leads to cross site scripting. The attack can be initiated remotely. VDB-233350 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2018-9344
In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ]
GHSA-gx2j-3fvm-rqj3
In the Linux kernel, the following vulnerability has been resolved:drm/amdkfd: fix a potential ttm->sg memory leakMemory is allocated for ttm->sg by kmalloc in kfd_mem_dmamap_userptr, but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!
[]
CVE-2018-8357
An elevation of privilege vulnerability exists in Microsoft browsers allowing sandbox escape, aka "Microsoft Browser Elevation of Privilege Vulnerability." This affects Internet Explorer 11, Microsoft Edge.
[ "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*" ]
CVE-2020-5418
Cloud Controller allows users with no roles to list droplets
Cloud Foundry CAPI (Cloud Controller) versions prior to 1.98.0 allow authenticated users having only the "cloud_controller.read" scope, but no roles in any spaces, to list all droplets in all spaces (whereas they should see none).
[ "cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*", "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*" ]
CVE-2020-15926
Rocket.Chat through 3.4.2 allows XSS where an attacker can send a specially crafted message to a channel or in a direct message to the client which results in remote code execution on the client side.
[ "cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*" ]
CVE-2019-18199
An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, and because of password-based authentication, they are vulnerable to replay attacks.
[ "cpe:2.3:o:fujitsu:lx390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:lx390:gk381:*:*:*:*:*:*:*" ]
GHSA-4x24-p8p8-r7hm
Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class. Successful exploitation could lead to arbitrary code execution.
[]
GHSA-p62j-qhrf-4hmm
A validation issue was addressed with improved input sanitization. This issue affected versions prior to iOS 12.
[]
CVE-2021-46899
SyncTrayzor 1.1.29 enables CEF (Chromium Embedded Framework) remote debugging, allowing a local attacker to control the application.
[ "cpe:2.3:a:antonymale:synctrayzor:1.1.29:*:*:*:*:*:*:*" ]
CVE-2013-2846
Use-after-free vulnerability in the media loader in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2013-2840.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*" ]
GHSA-p23x-hc9c-jfq6
An issue was discovered in Contiki-NG through 4.1. There is a buffer over-read in lookup in os/storage/antelope/lvm.c while parsing AQL (lvm_register_variable, lvm_set_variable_value, create_intersection, create_union).
[]
CVE-2024-58095
jfs: add check read-only before txBeginAnon() call
In the Linux kernel, the following vulnerability has been resolved: jfs: add check read-only before txBeginAnon() call Added a read-only check before calling `txBeginAnon` in `extAlloc` and `extRecord`. This prevents modification attempts on a read-only mounted filesystem, avoiding potential errors or crashes. Call trace: txBeginAnon+0xac/0x154 extAlloc+0xe8/0xdec fs/jfs/jfs_extent.c:78 jfs_get_block+0x340/0xb98 fs/jfs/inode.c:248 __block_write_begin_int+0x580/0x166c fs/buffer.c:2128 __block_write_begin fs/buffer.c:2177 [inline] block_write_begin+0x98/0x11c fs/buffer.c:2236 jfs_write_begin+0x44/0x88 fs/jfs/inode.c:299
[]
CVE-2014-2023
Multiple SQL injection vulnerabilities in the Tapatalk plugin 4.9.0 and earlier and 5.x through 5.2.1 for vBulletin allow remote attackers to execute arbitrary SQL commands via a crafted xmlrpc API request to (1) unsubscribe_forum.php or (2) unsubscribe_topic.php in mobiquo/functions/.
[ "cpe:2.3:a:tapatalk:tapatalk:1.0.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.0.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.0.2:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.1.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.1.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.1.2:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.2.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.2.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.2.3:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:1.2.6:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:2.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.1.2:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.1.3:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.1.4:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.1.5:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.2.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.9.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.9.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.9.2:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:3.9.3:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.0.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.1.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.2.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.2.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.3.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.3.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.4.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.5.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.5.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.5.2:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.6.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.7.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.7.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.7.2:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.8.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.8.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:4.9.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.0.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.0.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.1.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.1.1:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.1.2:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.1.3:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.2.0:*:*:*:*:vbulletin:*:*", "cpe:2.3:a:tapatalk:tapatalk:5.2.1:*:*:*:*:vbulletin:*:*" ]
CVE-2024-4089
A DLL hijack vulnerability was reported in Lenovo Super File that could allow a local attacker to execute code with elevated privileges.
[ "cpe:2.3:a:lenovo:superfile:*:*:*:*:*:*:*:*" ]
CVE-2023-48725
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*" ]
GHSA-pj5q-r35x-xmj7
The Message Filter for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the updateFilter() and deleteFilter() functions in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to update and delete filters.
[]
CVE-2023-50223
Inductive Automation Ignition ExtendedDocumentCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability
Inductive Automation Ignition ExtendedDocumentCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the ExtendedDocumentCodec class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22127.
[ "cpe:2.3:a:inductiveautomation:ignition:-:*:*:*:*:*:*:*" ]
CVE-2014-6384
Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D15, 12.3 before 12.3R9, 13.1 before 13.1R4-S3, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 does not properly handle double quotes in authorization attributes in the TACACS+ configuration, which allows local users to bypass the security policy and execute commands via unspecified vectors.
[ "cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x44:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x44:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.1x47:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*" ]
CVE-2019-10210
Postgresql Windows installer before versions 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 is vulnerable via superuser writing password to unprotected temporary file.
[ "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2019-1074
An elevation of privilege vulnerability exists in Microsoft Windows where certain folders, with local service privilege, are vulnerable to symbolic link attack. An attacker who successfully exploited this vulnerability could potentially access unauthorized information. The update addresses this vulnerability by not allowing symbolic links in these scenarios., aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1082.
[ "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-24qx-986r-jvf4
MailEnable before 8.60 allows Stored XSS via malformed use of "<img/src" with no ">" character in the body of an e-mail message.
[]
GHSA-6vfm-c4q2-cjcr
The GetYourGuide Ticketing WordPress plugin before 1.0.4 does not sanitise and escape some parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
GHSA-jjvc-94pp-59jx
When Octopus Tentacle is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.
[]
CVE-2025-0215
UpdraftPlus - Backup/Restore <= 1.24.12 - Reflected Cross-Site Scripting
The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the showdata and initiate_restore parameters in all versions up to, and including, 1.24.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an admin user into performing an action such as clicking on a link.
[]
CVE-2009-2383
SQL injection vulnerability in BTE_RW_webajax.php in the Related Sites plugin 2.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the guid parameter.
[ "cpe:2.3:a:blogtrafficexchange:related-sites:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
CVE-2022-27351
Zoo Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /public_html/apply_vacancy. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[ "cpe:2.3:a:phpgurukul:zoo_management_system:1.0:*:*:*:*:*:*:*" ]