id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-m55v-8766-rh84 | A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < 2021.3.1). The starview+.exe application lacks proper validation of user-supplied data when parsing scene files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. | [] |
|
GHSA-whvw-59jf-hrx9 | Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation. | [] |
|
CVE-2024-31213 | InstantCMS Open Redirect vulnerability | InstantCMS is a free and open source content management system. An open redirect was found in the ICMS2 application version 2.16.2 when being redirected after modifying one's own user profile. An attacker could trick a victim into visiting their web application, thinking they are still present on the ICMS2 application. They could then host a website stating "To update your profile, please enter your password," upon which the user may type their password and send it to the attacker. As of time of publication, a patched version is not available. | [
"cpe:2.3:a:instantsoft:instantcms:*:*:*:*:*:*:*:*"
] |
CVE-2025-24586 | WordPress Shipment Tracker for Woocommerce plugin <= 1.4.23 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bitsstech Shipment Tracker for Woocommerce allows Reflected XSS. This issue affects Shipment Tracker for Woocommerce: from n/a through 1.4.23. | [] |
CVE-2012-2889 | Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-vm7f-687f-4r4g | NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | [] |
|
CVE-2024-43382 | Snowflake JDBC driver versions >= 3.2.6 and <= 3.19.1 have an Incorrect Security Setting that can result in data being uploaded to an encrypted stage without the additional layer of protection provided by client side encryption. | [
"cpe:2.3:a:snowflake:snowflake_jdbc:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-21147 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:java_se:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm_for_jdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm_enterprise_edition:*:*:*:*:*:*:*:*"
] |
|
GHSA-ghmj-xphc-2mq4 | The ProBot bot through 2021-02-08 for Discord might allow attackers to interfere with the intended purpose of the "Send an image when a user joins the server" feature (or possibly have unspecified other impact) because the uploader web service allows double extensions (such as .html.jpg) with the text/html content type. NOTE: there may not be cases in which an uploader web service is customer controlled; however, the nature of the issue has substantial interaction with customer controlled configuration. | [] |
|
CVE-2024-56156 | Halo Vulnerable to Stored XSS and RCE via File Upload Bypass | Halo is an open source website building tool. Prior to version 2.20.13, a vulnerability in Halo allows attackers to bypass file type validation controls. This bypass enables the upload of malicious files including executables and HTML files, which can lead to stored cross-site scripting attacks and potential remote code execution under certain circumstances. This issue has been patched in version 2.20.13. | [] |
GHSA-6g8f-89g9-p58q | Unrestricted file upload vulnerability in ui/artifact/upload in JFrog Artifactory before 4.16 allows remote attackers to (1) deploy an arbitrary servlet application and execute arbitrary code by uploading a war file or (2) possibly write to arbitrary files and cause a denial of service by uploading an HTML file. | [] |
|
GHSA-2rxv-434v-p63q | Exploitable denial of service vulnerabilities exists in the Service Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted packet can cause a denial of service. An attacker can send a large packet to 4000/tcp to trigger this vulnerability. | [] |
|
GHSA-xqj5-x7c8-6f4h | Uncontrolled search path in software installer for Intel(R) PROSet/Wireless WiFi in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
GHSA-pgpc-54gc-3694 | In the Linux kernel, the following vulnerability has been resolved:wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_paramIn the `wilc_parse_join_bss_param` function, the TSF field of the `ies`
structure is accessed after the RCU read-side critical section is
unlocked. According to RCU usage rules, this is illegal. Reusing this
pointer can lead to unpredictable behavior, including accessing memory
that has been updated or causing use-after-free issues.This possible bug was identified using a static analysis tool developed
by myself, specifically designed to detect RCU-related issues.To address this, the TSF value is now stored in a local variable
`ies_tsf` before the RCU lock is released. The `param->tsf_lo` field is
then assigned using this local variable, ensuring that the TSF value is
safely accessed. | [] |
|
CVE-2023-22499 | Interactive permission prompt spoofing in Deno | Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Multi-threaded programs were able to spoof interactive permission prompt by rewriting the prompt to suggest that program is waiting on user confirmation to unrelated action. A malicious program could clear the terminal screen after permission prompt was shown and write a generic message. This situation impacts users who use Web Worker API and relied on interactive permission prompt. The reproduction is very timing sensitive and can’t be reliably reproduced on every try. This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers). The problem has been fixed in Deno v1.29.3; it is recommended all users update to this version. Users are advised to upgrade. Users unable to upgrade may run with --no-prompt flag to disable interactive permission prompts. | [
"cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*"
] |
CVE-2019-8248 | Adobe Illustrator CC versions 23.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | [
"cpe:2.3:a:adobe:illustrator_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-8g46-vcjj-g5qj | An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the Jsi_Strlen function in the src/jsiChar.c file. | [] |
|
CVE-2024-12682 | Smart Maintenance Mode < 1.5.2 - Admin+ Stored XSS | The Smart Maintenance Mode WordPress plugin before 1.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] |
CVE-2006-3951 | PHP remote file inclusion vulnerability in moodle.php in Mam-moodle alpha component (com_moodle) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | [
"cpe:2.3:a:mam-moodle_alpha_component:mam-moodle_alpha_component:*:*:*:*:*:*:*:*"
] |
|
GHSA-5hjq-8gx9-79g4 | RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled. | [] |
|
GHSA-3w7r-6cvf-4pv4 | Apple Mail.app 3.5 on Mac OS X, when "Store draft messages on the server" is enabled, stores draft copies of S/MIME email in plaintext on the email server, which allows server owners and remote man-in-the-middle attackers to read sensitive mail. | [] |
|
CVE-2024-13576 | Gumlet Video <= 1.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Gumlet Video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gumlet' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2018-4162 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-5468 | Directory traversal vulnerability in the WP e-Commerce Shop Styling plugin before 2.6 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter to includes/download.php. | [
"cpe:2.3:a:wpshopstyling:wp_e-commerce_shop_styling:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-rcxx-v2p8-25mw | The KFAI Community Radio (aka com.skyblue.pra.kfai) application 2.0.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2020-36743 | The Product Catalog Simple plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.13. This is due to missing or incorrect nonce validation on the implecode_save_products_meta() function. This makes it possible for unauthenticated attackers to update product meta via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:implecode:product_catalog_simple:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2009-2534 | RealNetworks Helix Server and Helix Mobile Server before 13.0.0 allow remote attackers to cause a denial of service (daemon crash) via an RTSP SETUP request that (1) specifies the / URI or (2) lacks a / character in the URI. | [
"cpe:2.3:a:realnetworks:helix_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_server:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_server:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_server_mobile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_server_mobile:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-8560 | Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.4.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via a ; (semicolon) character in a print job, a different vulnerability than CVE-2015-8327. | [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*"
] |
|
GHSA-g894-8f9c-q7gh | A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP. | [] |
|
GHSA-jg84-q5c2-38cr | An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerability is for the pass cookie, which contains the hashed password and can be leaked via JavaScript. | [] |
|
GHSA-rxmx-rf7q-7wh5 | slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests. | [] |
|
GHSA-hqv2-j5qr-cwc5 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-fjgp-7ffr-h6wc | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via vectors related to Outside In PDF Export SDKutside In PDF Export SDK, a different vulnerability than CVE-2015-4809. | [] |
|
CVE-2024-13376 | Industrial <= 1.7.8 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update | The Industrial theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the _ajax_get_total_content_import_items() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | [] |
GHSA-45m2-f9mw-223r | Due to missing authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform, an authenticated attacker could call an underlying transaction, which leads to disclosure of user related information. There is no impact on integrity or availability. | [] |
|
CVE-2015-5320 | Jenkins before 1.638 and LTS before 1.625.2 do not properly verify the shared secret used in JNLP slave connections, which allows remote attackers to connect as slaves and obtain sensitive information or possibly gain administrative access by leveraging knowledge of the name of a slave. | [
"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-4010 | The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function. | [
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-45843 | glFusion CMS v1.7.9 is affected by a reflected Cross Site Scripting (XSS) vulnerability. The value of the title request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. This input was echoed unmodified in the application's response. | [
"cpe:2.3:a:glfusion:glfusion:1.7.9:*:*:*:*:*:*:*"
] |
|
GHSA-75p6-52g3-rqc8 | Keycloak vulnerable to privilege escalation on Token Exchange feature | A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services. | [] |
CVE-2020-12278 | An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352. | [
"cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-vx4w-xwhh-229f | Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.21 and 1.5.x before 1.5.8 allows remote attackers to inject arbitrary web script or HTML via vectors involving a %00 sequence in an Ajax link URL associated with a Wicket app. | [] |
|
CVE-2024-45015 | drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() | In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()
For cases where the crtc's connectors_changed was set without enable/active
getting toggled , there is an atomic_enable() call followed by an
atomic_disable() but without an atomic_mode_set().
This results in a NULL ptr access for the dpu_encoder_get_drm_fmt() call in
the atomic_enable() as the dpu_encoder's connector was cleared in the
atomic_disable() but not re-assigned as there was no atomic_mode_set() call.
Fix the NULL ptr access by moving the assignment for atomic_enable() and also
use drm_atomic_get_new_connector_for_encoder() to get the connector from
the atomic_state.
Patchwork: https://patchwork.freedesktop.org/patch/606729/ | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*"
] |
GHSA-wh97-9rvp-m9hj | In SAP Application Interface Framework File Adapter - version 702, a high privilege user can use a function module to traverse through various layers and execute OS commands directly. By this, such user can control the behaviour of the application. This leads to considerable impact on confidentiality, integrity and availability. | [] |
|
GHSA-cpf3-gq5c-48p5 | Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the WP Maintenance Mode & Site Under Construction WordPress plugin before 1.8.2, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE. | [] |
|
GHSA-m4jc-jx4g-52vw | jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file. | [] |
|
GHSA-pwhr-p68w-296x | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior. | [] |
CVE-2023-6961 | The WP Meta SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Referer’ header in all versions up to, and including, 4.5.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:joomunited:wp_meta_seo:-:*:*:*:*:wordpress:*:*"
] |
|
CVE-2021-23265 | Improper Privilege Management in Crafter Studio | A logged-in and authenticated user with a Reviewer Role may lock a content item. | [
"cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*"
] |
GHSA-6g6g-gvqj-c448 | inc/init.php in Archive Mode (Light) in MyBB (aka MyBulletinBoard) 1.1.4 calls the extract function with EXTR_OVERWRITE on HTTP POST and GET variables, which allows remote attackers to overwrite arbitrary variables, as demonstrated via an SQL injection using the _SERVER[HTTP_CLIENT_IP] parameter in archive/index.php. | [] |
|
CVE-2000-1158 | NAI Sniffer Agent uses base64 encoding for authentication, which allows attackers to sniff the network and easily decrypt usernames and passwords. | [
"cpe:2.3:a:network_associates:sniffer_agent:3.0.10:*:*:*:*:*:*:*"
] |
|
GHSA-9fmx-59hw-pgp3 | An attacker could exploit this vulnerability in Hitachi ABB Power Grids Ellipse Enterprise Asset Management (EAM) versions prior to and including 9.0.25 by tricking a user to click on a link containing malicious code that would then be run by the web browser. This can result in the compromise of confidential information, or even the takeover of the user’s session. | [] |
|
GHSA-q4jm-588w-2cpr | The google-document-embedder plugin before 2.6.1 for WordPress has XSS. | [] |
|
GHSA-7945-5mcv-f2pp | LibOSDP vulnerable to a null pointer deref in osdp_reply_name | Issue:At ospd_common.c, on the osdp_reply_name function, any reply id between REPLY_ACK and REPLY_XRD is valid, but names array do not declare all of the range. On a case of an undefined reply id within the range, name will be null (`name = names[reply_id - REPLY_ACK];`). Null name will casue a crash on next line: `if (name[0] == '\0')` as null[0] is invalid.Attack:As this logic is not limited to a secure connection, attacker may trigger this vulnerability without any prior knowledge.ImpactDenial of ServicePatchThe issue has been patched in 24409e98a260176765956ec766a04cb35984fab1 | [] |
GHSA-xmf4-vfcf-qcjg | A vulnerability was found in Fujian mwcms 1.0.0. It has been declared as critical. Affected by this vulnerability is the function uploadeditor of the file /uploadeditor.html?action=uploadimage of the component Image Upload. The manipulation of the argument upfile leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2019-2500 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-41737 | Server-Side Request Forgery (SSRF) in SAP CRM ABAP (Insights Management) | SAP CRM ABAP (Insights
Management) allows an authenticated attacker to enumerate HTTP endpoints in the
internal network by specially crafting HTTP requests. On successful
exploitation this can result in information disclosure. It has no impact on
integrity and availability of the application. | [
"cpe:2.3:a:sap:crm_abap_insights_management:bbpcrm_700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_abap_insights_management:bbpcrm_701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_abap_insights_management:bbpcrm_702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_abap_insights_management:bbpcrm_712:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_abap_insights_management:bbpcrm_713:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_abap_insights_management:bbpcrm_714:*:*:*:*:*:*:*"
] |
GHSA-2w8h-hch2-v23h | mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a 'tarslip' attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server. | [] |
|
GHSA-87xv-c682-h5x7 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [] |
|
CVE-2017-12607 | A vulnerability in OpenOffice's PPT file parser before 4.1.4, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution. | [
"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-m6p5-m5xh-8xgm | Observable behavioral discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. | [] |
|
GHSA-5p82-8q2f-r9x5 | An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack. Fixed in version 6.4.1. | [] |
|
GHSA-2xwj-cxrx-46h4 | Cisco IOS 15.1 through 15.3 and IOS XE 3.3 and 3.5 before 3.5.2E; 3.7 before 3.7.5S; and 3.8, 3.9, and 3.10 before 3.10.2S allow remote attackers to cause a denial of service (I/O memory consumption and device reload) via a malformed IPv6 packet, aka Bug ID CSCui59540. | [] |
|
CVE-2022-33217 | Memory corruption in Qualcomm IPC due to buffer copy without checking the size of input while starting communication with a compromised kernel. in Snapdragon Mobile | [
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-37673 | `CHECK`-fail in `MapStage` in TensorFlow | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L513) does not check that the `key` input is a valid non-empty tensor. We have patched the issue in GitHub commit d7de67733925de196ec8863a33445b73f9562d1d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*"
] |
CVE-2015-3102 | Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3099. | [
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*"
] |
|
CVE-2010-2692 | Cross-site scripting (XSS) vulnerability in 2daybiz Custom T-Shirt Design Script allows remote attackers to inject arbitrary web script or HTML via a review comment. | [
"cpe:2.3:a:2daybiz:custom_t-shirt_design_script:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-11359 | Cross-site scripting (XSS) vulnerability in display.php in I, Librarian 4.10 allows remote attackers to inject arbitrary web script or HTML via the project parameter. | [
"cpe:2.3:a:i-librarian:i\\,_librarian:4.10:*:*:*:*:*:*:*"
] |
|
GHSA-5fm6-8c62-xw4m | Adobe Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a local privilege escalation vulnerability that could enable a user without administrator privileges to delete arbitrary files and potentially execute arbitrary code as SYSTEM. Exploitation of this issue requires an attacker to socially engineer a victim, or the attacker must already have some access to the environment. | [] |
|
CVE-2023-49991 | Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow via the function CountVowelPosition at synthdata.c. | [
"cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*"
] |
|
GHSA-rmcv-f79g-83q3 | A vulnerability classified as critical was found in SourceCodester Online Student Clearance System 1.0. This vulnerability affects unknown code of the file /Admin/login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-gg52-28m4-mv74 | Buffer overflow in xlock program allows local users to execute commands as root. | [] |
|
GHSA-x232-x9vj-7xwq | IBM InfoSphere Information Server 11.7 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 244368. | [] |
|
CVE-2013-3489 | Buffer overflow in Media Player Classic - Home Cinema (MPC-HC) before 1.7.0 allows remote attackers to execute arbitrary code via a crafted RealMedia .rm file | [
"cpe:2.3:a:mpc-hc:mpc-hc:*:*:*:*:*:*:*:*"
] |
|
GHSA-h8jm-2fp8-hwf5 | Unspecified vulnerability in HP SOA Registry Foundation 6.63 and 6.64 allows remote authenticated users to gain privileges via unknown vectors. | [] |
|
GHSA-v4qp-qmv7-6wm8 | Cross-Site Request Forgery (CSRF) vulnerability in Yoast Yoast Local Premium.This issue affects Yoast Local Premium: from n/a through 14.8. | [] |
|
GHSA-cvfq-xpqg-547q | DFLabs PTK 1.0.5 stores data files with predictable names under the web document root with insufficient access control, which allows remote attackers to read logs, images, or reports via a direct request to the file in the (1) log, (2) images, or (3) report directory. | [] |
|
GHSA-m5ff-xqmw-4569 | The Supermicro BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password. | [] |
|
CVE-2020-24216 | An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private. | [
"cpe:2.3:o:szuray:iptv\\/h.264_video_encoder_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uaioe264-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uce264-1-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uce264-1wb-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uce264-4-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uce264-8-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhae264-16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-16p32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-1p2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-1p2-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-1s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-1w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-1ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhce264-4p8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1-4k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-16l-3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-16s-2u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1l-4k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1lw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1s-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1w-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1wb-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1wb-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1wbs-2b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1wbs-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-1ws-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-2-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-4-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-4l-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-8-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-8l-3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe264-8s-2u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-16-3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-1l-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-1l-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-1lw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-1wb-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-4l-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use264-8-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uve264-1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uve264-1lw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:szuray:iptv\\/h.265_video_encoder_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uaioe265-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhae265-1-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhae265-1wb-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhae265-4-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1-4k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-16-3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-16l-3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1lw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1s-4k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1s-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1w-4k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1w-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1wb-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1wb-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-1wbs-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-2-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-4-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-4s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-4s-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-8-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-8l-3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhe265-8s-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uhse265-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-16l-3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1l-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1l-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1lw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1w-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1wb-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1wb-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-1wb-mini:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-2-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-4-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-4l-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:use265-8-1u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uve265-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:szuray:uve265-1w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtechdigital:h.264_iptv_encoder_1080p\\@60hz_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:jtechdigital:h.264_iptv_encoder_1080p\\@60hz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:provideoinstruments:vecaster-hd-h264_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:provideoinstruments:vecaster-hd-h264:-:*:*:*:*:*:*:*",
"cpe:2.3:o:provideoinstruments:vecaster-hd-hevc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:provideoinstruments:vecaster-hd-hevc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:provideoinstruments:vecaster-4k-hevc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:provideoinstruments:vecaster-4k-hevc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:provideoinstruments:vecaster-hd-sdi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:provideoinstruments:vecaster-hd-sdi:-:*:*:*:*:*:*:*"
] |
|
GHSA-fr29-vww3-q54m | Multiple cross-site request forgery (CSRF) vulnerabilities in the optionsPageRequest function in admin.php in WP Fastest Cache plugin before 0.8.3.5 for WordPress allow remote attackers to hijack the authentication of unspecified victims for requests that call the (1) saveOption, (2) deleteCache, (3) deleteCssAndJsCache, or (4) addCacheTimeout method via the wpFastestCachePage parameter in the WpFastestCacheOptions/ page. | [] |
|
CVE-2015-0525 | The Gateway Provisioning service in EMC Secure Remote Services Virtual Edition (ESRS VE) 3.02 and 3.03 allows remote attackers to execute arbitrary OS commands via unspecified vectors. | [
"cpe:2.3:a:emc:secure_remote_services:3.02:*:*:*:virtual:*:*:*",
"cpe:2.3:a:emc:secure_remote_services:3.03:*:*:*:virtual:*:*:*"
] |
|
GHSA-67p3-5m2h-325j | An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61. | [] |
|
CVE-2024-1913 |
An attacker who successfully exploited these vulnerabilities could cause the robot to stop, make the robot controller inaccessible, or execute arbitrary code.
The vulnerability could potentially be exploited to perform unauthorized actions by an attacker. This vulnerability arises under specific condition when specially crafted message is processed by the system.
Below are reported vulnerabilities in the Robot Ware versions.
* IRC5- RobotWare 6 < 6.15.06 except 6.10.10, and 6.13.07
* OmniCore- RobotWare 7 < 7.14
| [] |
|
CVE-2002-1244 | Format string vulnerability in Pablo FTP Server 1.5, 1.3, and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format strings in the USER command. | [
"cpe:2.3:a:pablo_software_solutions:pablo_ftp_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pablo_software_solutions:pablo_ftp_server:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pablo_software_solutions:pablo_ftp_server:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pablo_software_solutions:pablo_ftp_server:1.5:*:*:*:*:*:*:*"
] |
|
GHSA-rwrc-24vx-qh33 | The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute. | [] |
|
CVE-2018-12413 | TIBCO Messaging - Apache Kafka Distribution - Schema Repository Vulnerable to CSRF Attacks | The Schema repository server (tibschemad) component of TIBCO Software Inc.'s TIBCO Messaging - Apache Kafka Distribution - Schema Repository - Community Edition, and TIBCO Messaging - Apache Kafka Distribution - Schema Repository - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc. TIBCO Messaging - Apache Kafka Distribution - Schema Repository - Community Edition: 1.0.0, and TIBCO Messaging - Apache Kafka Distribution - Schema Repository - Enterprise Edition: 1.0.0. | [
"cpe:2.3:a:tibco:messaging_-_apache_kafka_distribution_-_schema_repository:1.0.0:*:*:*:community:*:*:*",
"cpe:2.3:a:tibco:messaging_-_apache_kafka_distribution_-_schema_repository:1.0.0:*:*:*:enterprise:*:*:*"
] |
GHSA-rhjj-f6gq-6gx2 | OpenStack Dashboard (Horizon) Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in OpenStack Dashboard (Horizon) 2014.2 before 2014.2.4 and 2015.1.x before 2015.1.1 allows remote attackers to inject arbitrary web script or HTML via the description parameter in a heat template, which is not properly handled in the help_text attribute in the Field class. | [] |
GHSA-qv84-wq8g-5gw7 | Unquoted Windows search path vulnerability in Symantec Network Access Control (SNAC) 12.1 before RU2 allows local users to gain privileges via unspecified vectors. | [] |
|
GHSA-qm8w-7xj7-x5m6 | An Insufficient Verification of Data Authenticity vulnerability in FortiManager 6.2.1, 6.2.0, 6.0.6 and below may allow an unauthenticated attacker to perform a Cross-Site WebSocket Hijacking (CSWSH) attack. | [] |
|
GHSA-rw83-v3pw-m362 | Withdrawn: safeurl-python contains Server-Side Request Forgery | WithdrawnThis advisory has been withdrawn as a duplicate of [GHSA-jgh8-vchw-q3g7](https://github.com/advisories/GHSA-jgh8-vchw-q3g7).Original DescriptionisInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF. | [] |
CVE-2006-5965 | PassGo SSO Plus 2.1.0.32, and probably earlier versions, uses insecure permissions (Everyone/Full Control) for the PassGo Technologies directory, which allows local users to gain privileges by modifying critical programs. | [
"cpe:2.3:a:passgo:sso_plus:2.1.0.32:*:*:*:*:*:*:*"
] |
|
GHSA-8mjg-c853-xc3w | An issue was discovered in Trusted Firmware-M through 2.0.0. The lack of argument verification in the logging subsystem allows attackers to read sensitive data via the login function. | [] |
|
CVE-2005-1316 | Cross-site scripting (XSS) vulnerability in Horde Accounts module before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the parent's frame page title. | [
"cpe:2.3:a:horde:accounts:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:accounts:2.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-mwmq-3358-vg7q | PHP iCalendar 2.24 and earlier allows remote attackers to bypass authentication by setting the phpicalendar and phpicalendar_login cookies to 1. | [] |
|
CVE-2003-0765 | The IN_MIDI.DLL plugin 3.01 and earlier, as used in Winamp 2.91, allows remote attackers to execute arbitrary code via a MIDI file with a large "Track data size" value. | [
"cpe:2.3:a:nullsoft:winamp:2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:3.1:*:*:*:*:*:*:*"
] |
|
GHSA-952x-v9p9-3683 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | [] |
|
GHSA-5r2q-vxr7-pxg5 | Multiple SQL injection vulnerabilities in QuadComm Q-Shop allow remote attackers to execute arbitrary SQL commands via certain parameters to (1) search.asp, (2) browse.asp, (3) details.asp, (4) showcat.asp, (5) users.asp, (6) addtomylist.asp, (7) modline.asp, (8) cart.asp, or (9) newuser.asp. | [] |
|
CVE-2021-26569 | Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests. | [
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-6546 | Unspecified vulnerability in phpns before 2.1.3 has unknown impact and attack vectors related to "activation permissions." | [
"cpe:2.3:a:alecwh:phpns:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alecwh:phpns:2.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-57f6-ph2r-458q | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. | [] |
|
CVE-2023-35066 | SQLi in Infodrom Sofwares E-Invoice Approval System | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Infodrom Software E-Invoice Approval System allows SQL Injection.This issue affects E-Invoice Approval System: before v.20230701.
| [
"cpe:2.3:a:infodrom:e-invoice_approval_system:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.