Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2024-23875
Cross-Site Scripting (XSS) vulnerability in Cups Easy
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuancedisplay.php, in the issuanceno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[ "cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*" ]
CVE-2016-4631
ImageIO in Apple iOS before 9.3.3, OS X before 10.11.6, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF file.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2008-3435
LinkedIn Browser Toolbar 3.0.3.1100 and earlier does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
[ "cpe:2.3:a:linkedin:browser_toolbar:*:*:*:*:*:*:*:*" ]
GHSA-gf7f-q52v-9537
Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
[]
GHSA-cj3x-772q-mc28
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
[]
CVE-2024-11138
DedeCMS friendlink_add.php unrestricted upload
A vulnerability classified as problematic has been found in DedeCMS 5.7.116. This affects an unknown part of the file /dede/uploads/dede/friendlink_add.php. The manipulation of the argument logoimg leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "cpe:2.3:a:dedecms:dedecms:5.7.116:*:*:*:*:*:*:*" ]
CVE-2020-36558
A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-ggv4-4qfx-2gh6
In the Linux kernel, the following vulnerability has been resolved:lib: alloc_tag_module_unload must wait for pending kfree_rcu callsBen Greear reports following splat: ------------[ cut here ]------------ net/netfilter/nf_nat_core.c:1114 module nf_nat func:nf_nat_register_fn has 256 allocated at module unload WARNING: CPU: 1 PID: 10421 at lib/alloc_tag.c:168 alloc_tag_module_unload+0x22b/0x3f0 Modules linked in: nf_nat(-) btrfs ufs qnx4 hfsplus hfs minix vfat msdos fat ... Hardware name: Default string Default string/SKYBAY, BIOS 5.12 08/04/2020 RIP: 0010:alloc_tag_module_unload+0x22b/0x3f0 codetag_unload_module+0x19b/0x2a0 ? codetag_load_module+0x80/0x80nf_nat module exit calls kfree_rcu on those addresses, but the free operation is likely still pending by the time alloc_tag checks for leaks.Wait for outstanding kfree_rcu operations to complete before checking resolves this warning.Reproducer: unshare -n iptables-nft -t nat -A PREROUTING -p tcp grep nf_nat /proc/allocinfo # will list 4 allocations rmmod nft_chain_nat rmmod nf_nat # will WARN.[[email protected]: add comment]
[]
CVE-2019-12674
Cisco Firepower Threat Defense Software Multi-instance Container Escape Vulnerabilities
Multiple vulnerabilities in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their FTD instance and execute commands with root privileges in the host namespace. These vulnerabilities are due to insufficient protections on the underlying filesystem. An attacker could exploit these vulnerabilities by modifying critical files on the underlying filesystem. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running FTD instances.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_9300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4145_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*" ]
GHSA-pmqc-v2g6-qw5w
Authorization Bypass Through User-Controlled Key vulnerability in Mia Technology Inc. MİA-MED allows Authentication Abuse.This issue affects MİA-MED: before 1.0.7.
[]
GHSA-cvhq-cvvf-jw9r
Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.
[]
GHSA-xc6c-mh6c-56hr
Cross-site scripting (XSS) vulnerability in the ThreeWP Email Reflector plugin before 1.16 for WordPress allows remote attackers to inject arbitrary web script or HTML via the Subject of an email.
[]
CVE-2024-6854
Arbitrary File Overwrite in h2oai/h2o-3
In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server's file structure, thereby overwriting it. This vulnerability can be exploited to overwrite any file on the target server with a trained model file, although the content of the overwrite is not controllable by the attacker.
[]
GHSA-c4mh-mf74-4fcf
Xen 4.3.x writes hypervisor mappings to certain shadow pagetables when live migration is performed on hosts with more than 5TB of RAM, which allows local 64-bit PV guests to read or write to invalid memory and cause a denial of service (crash).
[]
GHSA-4rpc-xhhq-h2cq
This vulnerability allows remote attackers to execute arbitrary code on affected installations of IronCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. When parsing the VECTOR element, the process does not properly initialize a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17672.
[]
CVE-2010-2836
Memory leak in the SSL VPN feature in Cisco IOS 12.4, 15.0, and 15.1, when HTTP port redirection is enabled, allows remote attackers to cause a denial of service (memory consumption) by improperly disconnecting SSL sessions, leading to connections that remain in the CLOSE-WAIT state, aka Bug ID CSCtg21685.
[ "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mra:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0m:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1\\(1\\)xb1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1t:*:*:*:*:*:*:*" ]
GHSA-3f45-qgc4-vqqg
IBM Jazz Team Server, as used in Rational Collaborative Lifecycle Management; Rational Quality Manager 3.x before 3.0.1.6 iFix 3, 4.x before 4.0.7, and 5.x before 5.0.1; and other Rational products, does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
[]
CVE-2024-27435
nvme: fix reconnection fail due to reserved tag allocation
In the Linux kernel, the following vulnerability has been resolved: nvme: fix reconnection fail due to reserved tag allocation We found a issue on production environment while using NVMe over RDMA, admin_q reconnect failed forever while remote target and network is ok. After dig into it, we found it may caused by a ABBA deadlock due to tag allocation. In my case, the tag was hold by a keep alive request waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the request maked as idle and will not process before reset success. As fabric_q shares tagset with admin_q, while reconnect remote target, we need a tag for connect command, but the only one reserved tag was held by keep alive command which waiting inside admin_q. As a result, we failed to reconnect admin_q forever. In order to fix this issue, I think we should keep two reserved tags for admin queue.
[]
CVE-2006-6759
A certain ActiveX control in rpau3260.dll in RealNetworks RealPlayer 10.5 allows remote attackers to cause a denial of service (Internet Explorer crash) by invoking the RealPlayer.Initialize method with certain arguments.
[ "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*" ]
GHSA-mqv5-xgm5-g729
Cross-site scripting (XSS) vulnerability in the A-Form PC and PC/Mobile before 3.1 plug-ins for Movable Type allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-2676.
[]
GHSA-xv86-3hxg-hv4r
Multiple cross-site scripting (XSS) vulnerabilities in unspecified administration pages in the EntityBulkDelete module 7.x-1.0 for Drupal allow remote attackers to inject arbitrary web script or HTML via unknown vectors involving creating or editing (1) comments, (2) taxonomy terms, or (3) nodes.
[]
CVE-2004-0199
Help and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm).
[ "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*" ]
CVE-2019-6517
BD FACSLyric Research Use Only, Windows 10 Professional Operating System, U.S. and Malaysian Releases, between November 2017 and November 2018 and BD FACSLyric IVD Windows 10 Professional Operating System US release does not properly enforce user access control to privileged accounts, which may allow for unauthorized access to administrative level functions.
[ "cpe:2.3:o:bd:facslyric:-:*:*:*:*:*:*:*", "cpe:2.3:o:bd:facslyric_ivd:-:*:*:*:*:*:*:*" ]
GHSA-66qf-7h58-9q6q
A remote code execution (RCE) vulnerability in the upload_file function of LRQA Nettitude PoshC2 after commit 123db87 allows authenticated attackers to execute arbitrary code via a crafted POST request.
[]
GHSA-8vhj-8348-wg28
IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at BabaCAD4Image!ShowPlugInOptions+0x0000000000009ae0."
[]
GHSA-w9f5-vpqq-grqj
In the Linux kernel, the following vulnerability has been resolved:netfilter: conntrack: clamp maximum hashtable size to INT_MAXUse INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See:0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls")Note: hashtable resize is only possible from init_netns.
[]
GHSA-g7q2-c4xh-c3xc
The EWWW Image Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.8.1. This is due to missing or incorrect nonce validation on the ewww_ngg_bulk_init() function. This makes it possible for unauthenticated attackers to perform bulk image optimization via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-v4v8-f5rh-744r
SQL injection vulnerability in index.php in phpMyRealty (PMR) 2.0.0 allows remote attackers to execute arbitrary SQL commands via the location parameter.
[]
CVE-2025-22123
f2fs: fix to avoid accessing uninitialized curseg
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid accessing uninitialized curseg syzbot reports a f2fs bug as below: F2FS-fs (loop3): Stopped filesystem due to reason: 7 kworker/u8:7: attempt to access beyond end of device BUG: unable to handle page fault for address: ffffed1604ea3dfa RIP: 0010:get_ckpt_valid_blocks fs/f2fs/segment.h:361 [inline] RIP: 0010:has_curseg_enough_space fs/f2fs/segment.h:570 [inline] RIP: 0010:__get_secs_required fs/f2fs/segment.h:620 [inline] RIP: 0010:has_not_enough_free_secs fs/f2fs/segment.h:633 [inline] RIP: 0010:has_enough_free_secs+0x575/0x1660 fs/f2fs/segment.h:649 <TASK> f2fs_is_checkpoint_ready fs/f2fs/segment.h:671 [inline] f2fs_write_inode+0x425/0x540 fs/f2fs/inode.c:791 write_inode fs/fs-writeback.c:1525 [inline] __writeback_single_inode+0x708/0x10d0 fs/fs-writeback.c:1745 writeback_sb_inodes+0x820/0x1360 fs/fs-writeback.c:1976 wb_writeback+0x413/0xb80 fs/fs-writeback.c:2156 wb_do_writeback fs/fs-writeback.c:2303 [inline] wb_workfn+0x410/0x1080 fs/fs-writeback.c:2343 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3317 worker_thread+0x870/0xd30 kernel/workqueue.c:3398 kthread+0x7a9/0x920 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Commit 8b10d3653735 ("f2fs: introduce FAULT_NO_SEGMENT") allows to trigger no free segment fault in allocator, then it will update curseg->segno to NULL_SEGNO, though, CP_ERROR_FLAG has been set, f2fs_write_inode() missed to check the flag, and access invalid curseg->segno directly in below call path, then resulting in panic: - f2fs_write_inode - f2fs_is_checkpoint_ready - has_enough_free_secs - has_not_enough_free_secs - __get_secs_required - has_curseg_enough_space - get_ckpt_valid_blocks : access invalid curseg->segno To avoid this issue, let's: - check CP_ERROR_FLAG flag in prior to f2fs_is_checkpoint_ready() in f2fs_write_inode(). - in has_curseg_enough_space(), save curseg->segno into a temp variable, and verify its validation before use.
[]
CVE-2018-1421
IBM WebSphere DataPower Appliances 7.1, 7.2, 7.5, 7.5.1, 7.5.2, and 7.6 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 139023.
[ "cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*" ]
GHSA-9cj3-p33g-x9hg
The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
[]
CVE-2022-21690
Cross-Site Scripting in Onionshare
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions The path parameter of the requested URL is not sanitized before being passed to the QT frontend. This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.
[ "cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*" ]
CVE-2015-1080
WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" ]
CVE-1999-0651
The rsh/rlogin service is running.
[]
GHSA-qqgf-6922-rxxc
Eval injection vulnerability in left.php in phpMyAdmin 2.5.1 up to 2.5.7, when LeftFrameLight is FALSE, allows remote attackers to execute arbitrary PHP code via a crafted table name.
[]
GHSA-mqqh-4pfq-f7mp
PHP remote file inclusion vulnerability in index.php in Textpattern CMS 4.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the inc parameter.
[]
CVE-2005-1025
The FTP server in AS/400 4.3, when running in IFS mode, allows remote attackers to obtain sensitive information via a symlink attack using RCMD and the ADDLNK utility, as demonstrated using the QSYS.LIB library.
[ "cpe:2.3:h:ibm:iseries_as_400:4.3:*:*:*:*:*:*:*" ]
GHSA-x634-2qxx-86r9
Cross-site request forgery (CSRF) vulnerability in post_bug.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2rc1 allows remote attackers to hijack the authentication of arbitrary users for requests that create bug reports.
[]
GHSA-x49h-w39r-5qq6
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
[]
CVE-2015-5156
The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-mhw9-mfg4-96qr
An issue was discovered in Mattermost Server before 5.11.0. Invite IDs were improperly generated.
[]
GHSA-326f-jv9v-g2jj
NVIDIA BMC contains a vulnerability in IPMI handler, where an unauthorized attacker can use certain oracles to guess a valid BMC username, which may lead to an information disclosure.
[]
GHSA-2jc7-c7q8-q3g4
PunBB 1.2.10 and earlier allows remote attackers to cause a denial of service (resource consumption) by registering many user accounts quickly.
[]
GHSA-rj56-mm47-cqp3
Dr.ID Access Control System from SECOM does not properly validate a specific page parameter, allowing unauthenticated remote attackers to inject SQL commands to read, modify, and delete database contents.
[]
CVE-2024-43778
OS command injection vulnerability in multiple digital video recorders provided by TAKENAKA ENGINEERING CO., LTD. allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings.
[ "cpe:2.3:o:takenaka_engineering:hdvr-400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:hdvr-800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:hdvr-1600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:ahd04t-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:ahd08t-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:ahd16t-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:nvr04t-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:nvr08t-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:takenaka_engineering:nvr16t-a_firmware:*:*:*:*:*:*:*:*" ]
GHSA-vrw5-c37h-4jp2
A vulnerability was found in code-projects Personal Diary Management System 1.0 and classified as critical. Affected by this issue is the function addrecord of the component New Record Handler. The manipulation of the argument filename leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
[]
CVE-2020-7753
Regular Expression Denial of Service (ReDoS)
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
[ "cpe:2.3:a:trim_project:trim:*:*:*:*:*:*:*:*" ]
GHSA-q322-qvg2-4p4w
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Financial Transaction Manager (FTM) for ACH Services 3.0.0.x before fp0015 and 3.0.1.0 before iFix0002 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2013-5726
Tweetbot 1.3.3 for Mac, and 2.8.5 for iPad and iPhone, does not require confirmation of (1) follow or (2) favorite actions, which allows remote attackers to automatically force the user to perform undesired actions, as demonstrated via the tweetbot:///follow/ URL.
[ "cpe:2.3:a:tapbots:tweetbot:1.3.3:-:*:*:*:mac:*:*", "cpe:2.3:a:tapbots:tweetbot:2.8.5:-:*:*:*:ipad:*:*", "cpe:2.3:a:tapbots:tweetbot:2.8.5:-:*:*:*:iphone:*:*" ]
CVE-2021-1299
Cisco SD-WAN Command Injection Vulnerabilities
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:o:cisco:sd-wan_firmware:18.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sd-wan_firmware:18.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sd-wan_firmware:18.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sd-wan_firmware:18.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sd-wan_firmware:19.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sd-wan_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sd-wan_firmware:20.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:sd-wan_vsmart_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_1000_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100b_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100m_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100wm_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_2000_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_5000_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_cloud_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*" ]
CVE-2018-10937
A cross site scripting flaw exists in the tetonic-console component of Openshift Container Platform 3.11. An attacker with the ability to create pods can use this flaw to perform actions on the K8s API as the victim.
[ "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*" ]
GHSA-r546-gvfj-5x9w
Multiple integer overflows in (1) libGLESv2/renderer/Renderer9.cpp and (2) libGLESv2/renderer/Renderer11.cpp in Almost Native Graphics Layer Engine (ANGLE), as used in Google Chrome before 29.0.1547.57, allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
CVE-2022-41182
Due to lack of proper memory management, when a victim opens manipulated Parasolid Part and Assembly (.x_b, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
[ "cpe:2.3:a:sap:3d_visual_enterprise_author:9.0:*:*:*:*:*:*:*" ]
CVE-2022-24070
Apache Subversion mod_dav_svn is vulnerable to memory corruption
Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.
[ "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-3cp8-2w4x-m8xp
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18 and iPadOS 18. An attacker may be able to use Siri to enable Auto-Answer Calls.
[]
GHSA-r9rm-x6jp-8r54
IBM DB2 UDB 8 before Fixpak 17 allows remote attackers to cause a denial of service (instance crash) via a crafted CONNECT/ATTACH data stream that simulates a V7 client connect/attach request. NOTE: this may overlap CVE-2008-3858. NOTE: this issue exists because of an incomplete fix for CVE-2008-3959.
[]
CVE-2023-50739
A buffer overflow vulnerability has been identified in the Internet Printing Protocol (IPP) in various Lexmark devices.
A buffer overflow vulnerability has been identified in the Internet Printing Protocol (IPP) in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
[]
CVE-2020-9481
Apache ATS 6.0.0 to 6.2.3, 7.0.0 to 7.1.9, and 8.0.0 to 8.0.6 is vulnerable to a HTTP/2 slow read attack.
[ "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
CVE-2024-46830
KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS Grab kvm->srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly leave nested VMX/SVM if SMM mode is being toggled, and leaving nested VMX reads guest memory. Note, kvm_vcpu_ioctl_x86_set_vcpu_events() can also be called from KVM_RUN via sync_regs(), which already holds SRCU. I.e. trying to precisely use kvm_vcpu_srcu_read_lock() around the problematic SMM code would cause problems. Acquiring SRCU isn't all that expensive, so for simplicity, grab it unconditionally for KVM_SET_VCPU_EVENTS. ============================= WARNING: suspicious RCU usage 6.10.0-rc7-332d2c1d713e-next-vm #552 Not tainted ----------------------------- include/linux/kvm_host.h:1027 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by repro/1071: #0: ffff88811e424430 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x7d/0x970 [kvm] stack backtrace: CPU: 15 PID: 1071 Comm: repro Not tainted 6.10.0-rc7-332d2c1d713e-next-vm #552 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Call Trace: <TASK> dump_stack_lvl+0x7f/0x90 lockdep_rcu_suspicious+0x13f/0x1a0 kvm_vcpu_gfn_to_memslot+0x168/0x190 [kvm] kvm_vcpu_read_guest+0x3e/0x90 [kvm] nested_vmx_load_msr+0x6b/0x1d0 [kvm_intel] load_vmcs12_host_state+0x432/0xb40 [kvm_intel] vmx_leave_nested+0x30/0x40 [kvm_intel] kvm_vcpu_ioctl_x86_set_vcpu_events+0x15d/0x2b0 [kvm] kvm_arch_vcpu_ioctl+0x1107/0x1750 [kvm] ? mark_held_locks+0x49/0x70 ? kvm_vcpu_ioctl+0x7d/0x970 [kvm] ? kvm_vcpu_ioctl+0x497/0x970 [kvm] kvm_vcpu_ioctl+0x497/0x970 [kvm] ? lock_acquire+0xba/0x2d0 ? find_held_lock+0x2b/0x80 ? do_user_addr_fault+0x40c/0x6f0 ? lock_release+0xb7/0x270 __x64_sys_ioctl+0x82/0xb0 do_syscall_64+0x6c/0x170 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7ff11eb1b539 </TASK>
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.10.97:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*" ]
GHSA-8cw6-5qvp-q3wj
Exposure of Sensitive Information to an Unauthorized Actor in Apache Spark via crafted URL
In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not.
[]
CVE-2014-10392
The cforms2 plugin before 10.2 for WordPress has XSS.
[ "cpe:2.3:a:cformsii_project:cformsii:*:*:*:*:*:wordpress:*:*" ]
GHSA-pgjv-446p-p2p9
A cross-site request forgery (CSRF) vulnerability exists in Streama up to and including v1.10.3. The application does not have CSRF checks in place when performing actions such as uploading local files. As a result, attackers could make a logged-in administrator upload arbitrary local files via a CSRF attack and send them to the attacker.
[]
GHSA-8296-pfrx-5qgf
The Send PDF for Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of form submissions due to a missing capability check on the hooks function in all versions up to, and including, 1.0.2.3. This makes it possible for unauthenticated attackers to download information about contact form entries with PDFs.
[]
GHSA-f9r8-4r5p-xq44
GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.
[]
GHSA-jfp3-jv85-rhfp
Microsoft Intune for Android Mobile Application Management Tampering Vulnerability
[]
CVE-2013-3073
A Symlink Traversal vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34.
[ "cpe:2.3:o:netgear:wndr4700_firmware:1.0.0.34:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4700:-:*:*:*:*:*:*:*" ]
GHSA-wcqq-qgq5-g383
Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.
[]
CVE-2018-1000002
Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.
[ "cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*" ]
CVE-2004-0298
CesarFTP 0.99e allows remote attackers to cause a denial of service (CPU consumption) via a long RETR parameter.
[ "cpe:2.3:a:aclogic:cesarftp:0.99e:*:*:*:*:*:*:*" ]
CVE-2024-50629
Improper encoding or escaping of output vulnerability in the webapi component in Synology BeeStation OS (BSM) before 1.1-65374 and Synology DiskStation Manager (DSM) before 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 allow remote attackers to read limited files via unspecified vectors.
[]
CVE-2024-9847
Cross-Site Request Forgery (CSRF) in flatpressblog/flatpress
FlatPress CMS version latest is vulnerable to Cross-Site Request Forgery (CSRF) attacks that allow an attacker to enable or disable plugins on behalf of a victim user. The attacker can craft a malicious link or script that, when clicked by an authenticated user, will send a request to the FlatPress CMS server to perform the desired action on behalf of the victim user. Since the request is authenticated, the server will process it as if it were initiated by the legitimate user, effectively allowing the attacker to perform unauthorized actions. This vulnerability is fixed in version 1.4.dev.
[]
GHSA-qqj9-5c87-9cx7
HCL Nomad server on Domino did not configure certain HTTP Security headers by default which could allow an attacker to obtain sensitive information via unspecified vectors.
[]
GHSA-x539-2w6c-w45r
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Miscellaneous). Supported versions that are affected are 2.0.0, 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Private Banking accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
[]
GHSA-4gwr-f7fq-56wc
A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
[]
CVE-2014-7296
The default configuration in the accessibility engine in SpagoBI 5.0.0 does not set FEATURE_SECURE_PROCESSING, which allows remote authenticated users to execute arbitrary Java code via a crafted XSL document.
[ "cpe:2.3:a:eng:spagobi:5.0:*:*:*:*:*:*:*" ]
CVE-2021-32056
Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall.
[ "cpe:2.3:a:cyrus:imap:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
CVE-2024-47261
51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
[]
GHSA-xcpx-x4rg-25pv
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
GHSA-36cx-c3wx-4c25
The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This makes it possible for unauthenticated attackers to register with an Administrator role if a custom login form is being used. This can be combined with CVE-2025-2797 to bypass the user approval process if an Administrator can be tricked into taking an action such as clicking a link.
[]
GHSA-j4j6-mjqg-x2j7
app/webroot/js/workflows-editor/workflows-editor.js in MISP through 2.5.2 has stored XSS in the editor interface for an ad-hoc workflow.
[]
CVE-2016-2193
PostgreSQL before 9.5.x before 9.5.2 does not properly maintain row-security status in cached plans, which might allow attackers to bypass intended access restrictions by leveraging a session that performs queries as more than one role.
[ "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*" ]
CVE-2021-46914
ixgbe: fix unbalanced device enable/disable in suspend/resume
In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix unbalanced device enable/disable in suspend/resume pci_disable_device() called in __ixgbe_shutdown() decreases dev->enable_cnt by 1. pci_enable_device_mem() which increases dev->enable_cnt by 1, was removed from ixgbe_resume() in commit 6f82b2558735 ("ixgbe: use generic power management"). This caused unbalanced increase/decrease. So add pci_enable_device_mem() back. Fix the following call trace. ixgbe 0000:17:00.1: disabling already-disabled device Call Trace: __ixgbe_shutdown+0x10a/0x1e0 [ixgbe] ixgbe_suspend+0x32/0x70 [ixgbe] pci_pm_suspend+0x87/0x160 ? pci_pm_freeze+0xd0/0xd0 dpm_run_callback+0x42/0x170 __device_suspend+0x114/0x460 async_suspend+0x1f/0xa0 async_run_entry_fn+0x3c/0xf0 process_one_work+0x1dd/0x410 worker_thread+0x34/0x3f0 ? cancel_delayed_work+0x90/0x90 kthread+0x14c/0x170 ? kthread_park+0x90/0x90 ret_from_fork+0x1f/0x30
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2004-1516
CRLF injection vulnerability in index.php in phpWebSite 0.9.3-4 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the block_username parameter in the user module.
[ "cpe:2.3:a:phpwebsite:phpwebsite:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebsite:phpwebsite:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebsite:phpwebsite:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebsite:phpwebsite:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.4:*:*:*:*:*:*:*" ]
CVE-2023-2268
Plane v0.7.1 - Unauthorized access to files
Plane version 0.7.1 allows an unauthenticated attacker to view all stored server files of all users.
[ "cpe:2.3:a:plane:plane:0.7.1:*:*:*:*:*:*:*" ]
CVE-2021-22670
An uninitialized pointer may be exploited in Fatek FvDesigner Version 1.5.76 and prior while the application is processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
[ "cpe:2.3:a:fatek:fvdesigner:*:*:*:*:*:*:*:*" ]
GHSA-vj46-9qg5-hvg2
The TIFFToRGB function in libtiff before 3.8.1 allows remote attackers to cause a denial of service (crash) via a crafted TIFF image with Yr/Yg/Yb values that exceed the YCR/YCG/YCB values, which triggers an out-of-bounds read.
[]
GHSA-qpv7-56jv-92v7
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
[]
GHSA-2fjj-c2r7-57f3
SAP HANA SPS09 1.00.091.00.14186593 allows local users to obtain sensitive information by leveraging the EXPORT statement to export files, aka SAP Security Note 2252941.
[]
CVE-2013-0186
Multiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:-:*:*:*:*:*:*:*" ]
GHSA-62v2-m29j-vgxx
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
GHSA-g9cv-62xc-fj2v
There is a pointer double free vulnerability in some versions of CloudEngine 5800, CloudEngine 6800, CloudEngine 7800 and CloudEngine 12800. When a function is called, the same memory pointer is copied to two functional modules. Attackers can exploit this vulnerability by performing a malicious operation to cause the pointer double free. This may lead to module crash, compromising normal service.
[]
GHSA-6prw-46fm-57hj
Hospital Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
[]
CVE-2023-2253
A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
[ "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*" ]
CVE-2002-2329
ICQ client 2001b, 2002a and 2002b allows remote attackers to cause a denial of service (CPU consumption or crash) via a message with a large number of emoticons.
[ "cpe:2.3:a:mirabilis:icq:2001b:*:*:*:*:*:*:*", "cpe:2.3:a:mirabilis:icq:2002a:*:*:*:*:*:*:*", "cpe:2.3:a:mirabilis:icq:2002b:*:*:*:*:*:*:*" ]
CVE-2021-45549
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects LAX20 before 1.1.6.28, MK62 before 1.1.6.122, MR60 before 1.1.6.122, MS60 before 1.1.6.122, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.38, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RS400 before 1.5.1.80, and XR1000 before 1.0.0.58.
[ "cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax35:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr1000:-:*:*:*:*:*:*:*" ]
GHSA-648f-mvj9-qmhq
SQL injection vulnerability in ModuleServlet.do in the Storage Manager Profiler in IBM System Storage DS Storage Manager before 10.83.xx.18 on DS Series devices allows remote authenticated users to execute arbitrary SQL commands via the selectedModuleOnly parameter in a state_viewmodulelog action to the ModuleServlet URI.
[]
CVE-2021-41646
Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..
[ "cpe:2.3:a:online_reviewer_system_project:online_reviewer_system:1.0:*:*:*:*:*:*:*" ]
GHSA-vjmg-qh6v-526r
In Ericsson BSCS iX R18 Billing & Rating iX R18, MX is a web base module in BSCS iX that is vulnerable to stored XSS via an Alert Dashboard comment. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or exploiting admins' browsers by using the beef framework.
[]
GHSA-9fw6-m2v2-f3rp
Memory corruption while receiving a message in Bus Socket Transport Server.
[]
GHSA-756r-25x7-3hx6
The DirectShow loader (loader/dshow/DS_VideoDecoder.c) in MPlayer 1.0rc1 and earlier, as used in xine-lib, does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code, a different vulnerability than CVE-2007-1246.
[]