Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-xwv2-23r9-3p5j
Multiple cross-site scripting (XSS) vulnerabilities in ESCON SupportPortal Professional Edition 3.0 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted SRC attribute of an IFRAME element, (3) a crafted CONTENT attribute of an HTTP-EQUIV="Set-Cookie" META element, or (4) an innerHTML attribute within an XML document.
[]
GHSA-83fh-hgc9-f5wp
A buffer overflow vulnerability in epsc_print_page() in devices/gdevepsc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
[]
CVE-2010-4607
Multiple cross-site scripting (XSS) vulnerabilities in Habari 0.6.5, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) additem_form parameter to system/admin/dash_additem.php and the (2) status_data[] parameter to system/admin/dash_status.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:habariproject:habari:0.6.5:*:*:*:*:*:*:*" ]
CVE-2018-7767
The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the type input parameter.
[ "cpe:2.3:a:schneider-electric:u.motion_builder:*:*:*:*:*:*:*:*" ]
GHSA-64jj-v5hp-7m47
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service via a crafted psd image file.
[]
CVE-2018-5228
The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers.
[ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ]
CVE-2019-12101
coap_decode_option in coap.c in LibNyoci 0.07.00rc1 mishandles certain packets with "Uri-Path: (null)" and consequently allows remote attackers to cause a denial of service (segmentation fault).
[ "cpe:2.3:a:libnyoci_project:libnyoci:0.07.00:rc1:*:*:*:*:*:*" ]
GHSA-w488-4fq5-xcff
An issue was discovered on Samsung mobile devices with Q(10.0) and R(11.0) (Exynos chipsets) software. They allow attackers to obtain sensitive information by reading a log. The Samsung ID is SVE-2020-18596 (October 2020).
[]
CVE-2022-41621
Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable information disclosure via local access.
[ "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*" ]
GHSA-hq2w-83f9-f353
Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
CVE-2008-0859
Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption.
[ "cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:5.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:kerio_mailserver:6.4.2:*:*:*:*:*:*:*" ]
GHSA-fpgj-qg8m-8xg3
Missing Authorization vulnerability in WeyHan Ng Post Teaser.This issue affects Post Teaser: from n/a through 4.1.5.
[]
CVE-2022-46302
Remote Code Execution with Root Privileges via Broad Apache Permissions
Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.
[ "cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p28:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p29:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:1.6.0:p30:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*" ]
CVE-2022-38439
AEM Reflected XSS Arbitrary code execution
Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
GHSA-3m25-4622-6q4x
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) software. The InputMethod application can cause a system crash via a malformed serializable object in an Intent. The Samsung ID is SVE-2016-7123 (February 2017).
[]
CVE-2022-0666
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in microweber/microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
[ "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*" ]
CVE-2008-5496
SQL injection vulnerability in showcategory.php in PozScripts Business Directory Script allows remote attackers to execute arbitrary SQL commands via the cid parameter.
[ "cpe:2.3:a:pozscripts:business_directory_script:*:*:*:*:*:*:*:*" ]
CVE-2019-19897
In IXP EasyInstall 6.2.13723, there is Remote Code Execution via the Agent Service. An unauthenticated attacker can communicate with the Agent Service over TCP port 20051, and execute code in the NT AUTHORITY\SYSTEM context of the target system by using the Execute Command Line function.
[ "cpe:2.3:a:ixpdata:easyinstall:6.2.13723:*:*:*:*:*:*:*" ]
CVE-2020-22661
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to erase the backup secondary official image and write secondary backup unauthorized image.
[ "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*" ]
GHSA-p6hf-772c-jqqx
An issue was discovered in libmodbus before 3.0.7 and 3.1.x before 3.1.5. There is an out-of-bounds read for the MODBUS_FC_WRITE_MULTIPLE_REGISTERS case, aka VD-1301.
[]
GHSA-66mr-84vv-39v3
Cross-site scripting (XSS) vulnerability in Dada Mail before 2.10 Alpha 1 allows remote attackers to execute arbitrary Javascript via archived messages.
[]
GHSA-799f-r78p-gq9c
Use of Uninitialized Resource in acc_reader.
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations.
[]
GHSA-4645-h4xp-pj82
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
[]
CVE-2016-0025
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office 2016, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word_for_mac:2011:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word_for_mac:2016:*:*:*:*:*:*:*" ]
GHSA-mqmh-wfj6-f3xm
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Campus Explorer Campus Explorer Widget allows Reflected XSS.This issue affects Campus Explorer Widget: from n/a through 1.4.
[]
CVE-2013-6981
Cisco IOS XE 3.7S(.1) and earlier allows remote attackers to cause a denial of service (Packet Processor crash) via fragmented MPLS IP packets, aka Bug ID CSCul00709.
[ "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.5\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.6\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.6\\(.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.6\\(.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1s\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1s\\(.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1s\\(.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1s\\(.3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2s\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2s\\(.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2s\\(.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3s\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3s\\(.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.3s\\(.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4s\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4s\\(.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4s\\(.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4s\\(.3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4s\\(.4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4s\\(.5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.4s\\(.6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5s\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5s\\(.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.5s\\(.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6s\\(.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6s\\(.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.6s\\(.2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.7s\\(.0\\):*:*:*:*:*:*:*" ]
GHSA-42x3-92h6-pppq
WebKit, as used in Apple iOS before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-01-28-1.
[]
GHSA-5v3w-6m5m-92vj
Vulnerability in the Oracle Financial Services Price Creation and Discovery component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Price Creation and Discovery. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Price Creation and Discovery, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Price Creation and Discovery accessible data as well as unauthorized read access to a subset of Oracle Financial Services Price Creation and Discovery accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
GHSA-2xxx-v399-cp66
usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath.
[]
GHSA-g9q6-4662-jfw9
An issue in mokumoku chohu mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[]
GHSA-ccxq-4rr7-hcmq
The PrestaShop e-commerce platform module stripejs contains a Blind SQL injection vulnerability up to version 4.5.5. The method `stripejsValidationModuleFrontController::initContent()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
[]
GHSA-355f-mpqr-3mwv
An issue was discovered in LibVNCServer before 0.9.13. There is a memory leak in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
[]
GHSA-446h-xh8r-vwqx
** DISPUTED ** data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm."
[]
CVE-2016-10718
Brave Browser before 0.13.0 allows a tab to close itself even if the tab was not opened by a script, resulting in denial of service.
[ "cpe:2.3:a:brave:brave_browser:*:*:*:*:*:*:*:*" ]
GHSA-mpq3-wvj2-7h5r
Improper Authentication vulnerability in Play.Ht allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Play.Ht: from n/a through 3.6.4.
[]
CVE-2015-2644
Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.3 allows remote attackers to affect confidentiality via unknown vectors related to Security.
[ "cpe:2.3:a:oracle:supply_chain_products_suite:9.3.3:*:*:*:*:*:*:*" ]
GHSA-4gm5-xfm8-4jhf
An RPC server is enabled by default on the gateway's LAN of ALEOS before 4.12.0, 4.9.5, and 4.4.9.
[]
GHSA-qhxh-892c-372c
Unspecified vulnerability in the channel process in IBM WebSphere MQ 7.0 before 7.0.1.2 allows remote authenticated users to cause a denial of service (daemon crash) via "incorrect channel control data."
[]
CVE-2021-47368
enetc: Fix illegal access when reading affinity_hint
In the Linux kernel, the following vulnerability has been resolved: enetc: Fix illegal access when reading affinity_hint irq_set_affinity_hit() stores a reference to the cpumask_t parameter in the irq descriptor, and that reference can be accessed later from irq_affinity_hint_proc_show(). Since the cpu_mask parameter passed to irq_set_affinity_hit() has only temporary storage (it's on the stack memory), later accesses to it are illegal. Thus reads from the corresponding procfs affinity_hint file can result in paging request oops. The issue is fixed by the get_cpu_mask() helper, which provides a permanent storage for the cpumask_t parameter.
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2008-4621
SQL injection vulnerability in bannerclick.php in ZeeScripts Zeeproperty allows remote attackers to execute arbitrary SQL commands via the adid parameter.
[ "cpe:2.3:a:zeescripts:zeeproperty:*:*:*:*:*:*:*:*" ]
GHSA-p5rf-j39p-frph
SQL injection vulnerability in the session handling functionality in bridge/coppermine.inc.php in Coppermine Photo Gallery (CPG) 1.4.17 and earlier allows remote attackers to execute arbitrary SQL commands via an input field associated with the session_id variable, as exploited in the wild in April 2008. NOTE: the fix for CVE-2008-1840 was intended to address this vulnerability, but is actually inapplicable.
[]
CVE-2021-45043
HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter.
[ "cpe:2.3:a:hd-network_real-time_monitoring_system_project:hd-network_real-time_monitoring_system:2.0:*:*:*:*:*:*:*" ]
GHSA-vp43-mc38-mmg5
Improper Input Validation vulnerability in Hillstone Networks Hillstone Networks Web Application Firewall on 5.5R6 allows Command Injection.This issue affects Hillstone Networks Web Application Firewall: from 5.5R6-2.6.7 through 5.5R6-2.8.13.
[]
CVE-2016-4780
An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "Thunderbolt" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-5xmr-4hp2-hm52
In NotificationChannel of NotificationChannel.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-241764350
[]
GHSA-jv4f-v7gg-5mvh
A vulnerability regarding improper limitation of a pathname to a restricted directory ('Path Traversal') is found in the Language Settings functionality. This allows remote attackers to read specific files containing non-sensitive information via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500.
[]
GHSA-8hc8-mhjh-c5rj
Under certain conditions the Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge) - version 1.0, allows an attacker to access highly sensitive information which would otherwise be restricted causing high impact on confidentiality.
[]
GHSA-w492-8wmj-crw3
NetIQ Access Manager (NAM) 4.x before 4.0.1 HF3 allows remote authenticated administrators to discover service-account passwords via a request to (1) roma/jsp/volsc/monitoring/dev_services.jsp or (2) roma/jsp/debug/debug.jsp.
[]
GHSA-hvxg-wm6p-c93r
The functionality for synchronization in HGiga OAKlouds' certain moudules has an OS Command Injection vulnerability, allowing remote attackers to inject system commands within specific request parameters. This enables the execution of arbitrary code on the remote server without permission.
[]
CVE-2004-1033
Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.
[ "cpe:2.3:a:thibault_godouet:fcron:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:thibault_godouet:fcron:2.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" ]
CVE-2022-44898
The MsIo64.sys component in Asus Aura Sync through v1.07.79 does not properly validate input to IOCTL 0x80102040, 0x80102044, 0x80102050, and 0x80102054, allowing attackers to trigger a memory corruption and cause a Denial of Service (DoS) or escalate privileges via crafted IOCTL requests.
[ "cpe:2.3:a:asus:aura_sync:*:*:*:*:*:*:*:*" ]
GHSA-g49f-3j9m-vhq2
In Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges.
[]
CVE-2024-42770
A Stored Cross Site Scripting (XSS) vulnerability was found in "/core/signup_user.php" of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via the "user_email" parameter.
[ "cpe:2.3:a:kashipara:hotel_management:1.0:*:*:*:*:*:*:*" ]
GHSA-752v-qjgq-xgm6
Microsoft Windows 2008, 7, Vista, 2003, 2000, and XP, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. NOTE: due to a typo, some sources map CVE-2010-4562 to a ProFTPd mod_sql vulnerability, but that issue is covered by CVE-2010-4652.
[]
CVE-2006-3915
Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) by iterating over any native function, as demonstrated with the window.alert function, which triggers a null dereference.
[ "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*" ]
GHSA-gghc-g8cj-4vfv
Stored XSS vulnerability in Jenkins Git Plugin
Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the `/git/notifyCommit` endpoint.Jenkins Git Plugin 4.8.3 rejects Git SHA-1 checksum parameters that do not match the expected format. Existing values are sanitized when displayed on the UI.This vulnerability is only exploitable in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#SECURITY-2452).
[]
CVE-2007-4834
Multiple PHP remote file inclusion vulnerabilities in phpRealty 0.02 allow remote attackers to execute arbitrary PHP code via a URL in the MGR parameter to (1) index.php, (2) p_ins.php, and (3) u_ins.php in manager/admin/.
[ "cpe:2.3:a:phprealty:phprealty:0.02:*:*:*:*:*:*:*" ]
CVE-2017-15637
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_server.lua file.
[ "cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*" ]
GHSA-qvpq-7937-r8m2
There is a reachable assertion abort in the function calcstepsizes() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
[]
CVE-2017-2956
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine, related to manipulation of the navigation pane. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
CVE-2022-25237
Bonita Web 2021.2 is affected by a authentication/authorization bypass vulnerability due to an overly broad exclude pattern used in the RestAPIAuthorizationFilter. By appending ;i18ntranslation or /../i18ntranslation/ to the end of a URL, users with no privileges can access privileged API endpoints. This can lead to remote code execution by abusing the privileged API actions.
[ "cpe:2.3:a:bonitasoft:bonita_web:2021.2:*:*:*:*:*:*:*" ]
CVE-2019-12180
An issue was discovered in SmartBear ReadyAPI through 2.8.2 and 3.0.0 and SoapUI through 5.5. When opening a project, the Groovy "Load Script" is automatically executed. This allows an attacker to execute arbitrary Groovy Language code (Java scripting language) on the victim machine by inducing it to open a malicious Project. The same issue is present in the "Save Script" function, which is executed automatically when saving a project.
[ "cpe:2.3:a:smartbear:readyapi:*:*:*:*:*:*:*:*", "cpe:2.3:a:smartbear:soapui:*:*:*:*:*:*:*:*" ]
CVE-2007-4541
Multiple cross-site scripting (XSS) vulnerabilities in Olate Download (od) 3.4.2 allow remote attackers to inject arbitrary web script or HTML via (1) the PHP_SELF variable in modules/core/uim.php and (2) [url] tags in a comment in modules/core/fldm.php.
[ "cpe:2.3:a:olate:olatedownload:3.4.2:*:*:*:*:*:*:*" ]
CVE-2021-29272
bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the "script" string.
[ "cpe:2.3:a:microco:bluemonday:*:*:*:*:*:*:*:*" ]
GHSA-23xp-gwgx-qmr4
The HTTP framework on Cisco SPA300, SPA500, and SPA51x devices allows remote attackers to cause a denial of service (device outage) via a series of malformed HTTP requests, aka Bug ID CSCut67385.
[]
GHSA-4f2r-gxmm-56p6
Gifsicle v1.9.3 was discovered to contain a heap buffer overflow via the ambiguity_error component at /src/clp.c.
[]
GHSA-r9r7-cxf2-frj8
Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an information disclosure vulnerability. The device does not sufficiently validate the output of device in certain specific scenario, the attacker can gain information in the victim's smartphone to launch the attack, successful exploit could cause information disclosure.
[]
CVE-2014-3191
Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView::updateLayoutAndStyleForPainting function in core/frame/FrameView.cpp and the RenderLayerScrollableArea::setScrollOffset function in core/rendering/RenderLayerScrollableArea.cpp.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" ]
CVE-2020-14678
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
CVE-2015-1237
Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.
[ "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-gq3x-jvfr-pfm4
Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
[]
CVE-2006-4534
Unspecified vulnerability in Microsoft Word 2000, 2002, and Office 2003 allows remote user-assisted attackers to execute arbitrary code via unspecified vectors involving a crafted file resulting in a malformed stack, as exploited by malware with names including Trojan.Mdropper.Q, Mofei, and Femo.
[ "cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2001:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2001:*:*:*:*:mac_os:*:*", "cpe:2.3:a:microsoft:office:2001:sr1:*:*:*:mac_os:*:*", "cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*" ]
CVE-2023-45158
An OS command injection vulnerability exists in web2py 2.24.1 and earlier. When the product is configured to use notifySendHandler for logging (not the default configuration), a crafted web request may execute an arbitrary OS command on the web server using the product.
[ "cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*" ]
CVE-2017-3380
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*" ]
GHSA-rw8v-g4fm-gw3v
In the Linux kernel, the following vulnerability has been resolved:NFSD: Prevent a potential integer overflowIf the tag length is >= U32_MAX - 3 then the "length + 4" addition can result in an integer overflow. Address this by splitting the decoding into several steps so that decode_cb_compound4res() does not have to perform arithmetic on the unsafe length value.
[]
GHSA-3866-cc7f-3jx4
The Master Slider plugin 3.2.7 and 3.5.1 for WordPress has XSS via the wp-admin/admin-ajax.php Name input field of the MSPanel.Settings value on Callback.
[]
CVE-2020-12385
Improper input validation in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*" ]
CVE-2024-44082
In OpenStack Ironic before 26.0.1 and ironic-python-agent before 9.13.1, there is a vulnerability in image processing, in which a crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. The affected/fixed version details are: Ironic: <21.4.3, >=22.0.0 <23.0.2, >=23.1.0 <24.1.2, >=25.0.0 <26.0.1; Ironic-python-agent: <9.4.2, >=9.5.0 <9.7.1, >=9.8.0 <9.11.1, >=9.12.0 <9.13.1.
[]
CVE-2006-4648
PHP remote file inclusion vulnerability in bp_ncom.php in BinGo News (BP News) 3.01 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the bnrep parameter.
[ "cpe:2.3:a:bingo_news:bingo_news:*:*:*:*:*:*:*:*" ]
CVE-2024-57707
An issue in DataEase v1 allows an attacker to execute arbitrary code via the user account and password components.
[]
CVE-2020-13531
A use-after-free vulnerability exists in a way Pixar OpenUSD 20.08 processes reference paths textual USD files. A specially crafted file can trigger the reuse of a freed memory which can result in further memory corruption and arbitrary code execution. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file.
[ "cpe:2.3:a:pixar:openusd:20.08:*:*:*:*:*:*:*" ]
GHSA-6v8r-9m26-29m5
An issue was discovered in Mattermost Mobile Apps before 1.26.0. A view cache can persist on a device after a logout.
[]
GHSA-79qw-gqpf-pwg7
Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
CVE-2011-5181
Cross-site scripting (XSS) vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*" ]
GHSA-pjxv-8cr6-cx99
Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
[]
CVE-2024-49876
drm/xe: fix UAF around queue destruction
In the Linux kernel, the following vulnerability has been resolved: drm/xe: fix UAF around queue destruction We currently do stuff like queuing the final destruction step on a random system wq, which will outlive the driver instance. With bad timing we can teardown the driver with one or more work workqueue still being alive leading to various UAF splats. Add a fini step to ensure user queues are properly torn down. At this point GuC should already be nuked so queue itself should no longer be referenced from hw pov. v2 (Matt B) - Looks much safer to use a waitqueue and then just wait for the xa_array to become empty before triggering the drain. (cherry picked from commit 861108666cc0e999cffeab6aff17b662e68774e3)
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*" ]
GHSA-q6c3-c7qx-wh5h
A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.
[]
CVE-2014-5569
The Star Girl (aka com.animoca.google.starGirl) application 3.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:animoca:star_girl:3.4.1:*:*:*:*:android:*:*" ]
GHSA-7fqh-mgxh-pgrj
An improper authorization flaw was found in the Smart Class feature of Foreman. An attacker can use it to change configuration of any host registered in Red Hat Satellite, independent of the organization the host belongs to. This flaw affects all Red Hat Satellite 6 versions.
[]
CVE-2024-11203
EmbedPress – Embed PDF, 3D Flipbook, Social Feeds, Google Docs, Vimeo, Wistia, YouTube Videos, Audios, Google Maps in Gutenberg Block & Elementor <= 4.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'provider_name'
The EmbedPress – Embed PDF, 3D Flipbook, Social Feeds, Google Docs, Vimeo, Wistia, YouTube Videos, Audios, Google Maps in Gutenberg Block & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘provider_name parameter in all versions up to, and including, 4.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-8j4q-8455-qxw3
The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
[]
GHSA-6jrf-rcjf-245r
changedetection.io path traversal using file URI scheme without supplying hostname
SummaryThe validation for the file URI scheme falls short, and results in an attacker being able to read any file on the system. This issue only affects instances with a webdriver enabled, and `ALLOW_FILE_URI` false or not defined.DetailsThe check used for URL protocol, `is_safe_url`, allows `file:` as a URL scheme:https://github.com/dgtlmoon/changedetection.io/blob/e0abf0b50507a8a3d0c1d8522ab23519b3e4cdf4/changedetectionio/model/Watch.py#L11-L13It later checks if local files are permitted, but one of the preconditions for the check is that the URL starts with `file://`. The issue comes with the fact that the file URI scheme is not required to have double slashes.A valid file URI must therefore begin with either `file:/path` (no hostname), `file:///path` (empty hostname), or `file://hostname/path`. — [Wikipedia](https://en.wikipedia.org/wiki/File_URI_scheme#Number_of_slash_characters)https://github.com/dgtlmoon/changedetection.io/blob/e0abf0b50507a8a3d0c1d8522ab23519b3e4cdf4/changedetectionio/processors/__init__.py#L37-L41PoCOpen up a changedetection.io instance with a webdriver configuredCreate a new watch: `file:/etc/passwd` or a similar path for your operating system. Enable webdriver modeWait for it to be checkedOpen previewNotice contents of the file
[]
GHSA-fx6f-fpfv-5hmc
Malicious Package in uploader-plugin
Version 1.0.2 of `uploader-plugin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationRemove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.Users may consider downgrading to version 1.0.1
[]
CVE-2025-22594
WordPress Better User Shortcodes Plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hccoder – Sándor Fodor Better User Shortcodes allows Reflected XSS.This issue affects Better User Shortcodes: from n/a through 1.0.
[]
CVE-2014-8663
SQL injection vulnerability in Data Basis (BW-WHM-DBA) in SAP NetWeaver Business Warehouse allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:sap:netweaver_business_warehouse:-:*:*:*:*:*:*:*" ]
CVE-2004-1733
Directory traversal vulnerability in MyDMS 1.4.2 and other versions allows remote registered users to read arbitrary files via .. (dot dot) sequences in the URL.
[ "cpe:2.3:a:mydms:mydms:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mydms:mydms:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mydms:mydms:1.4.2:*:*:*:*:*:*:*" ]
CVE-2003-1264
TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.
[ "cpe:2.3:h:d-link:di-614\\+:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:longshine_technologie:longshine_wireless_ethernet_access_point:lcs-883r-ac-b:*:*:*:*:*:*:*" ]
GHSA-w423-gq2m-hcxp
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the collab object that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-5qjw-rhhh-cjx7
includes/functions.php in Craig Knudsen WebCalendar before 1.0.5 does not protect the noSet variable from external modification, which allows remote attackers to set arbitrary global variables via a URL with modified values in the noSet parameter, which leads to resultant vulnerabilities that probably include remote file inclusion and other issues.
[]
CVE-2019-15009
The /json/profile/removeStarAjax.do resource in Atlassian Fisheye and Crucible before version 4.8.0 allows remote attackers to remove another user's favourite setting for a project via an improper authorization vulnerability.
[ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ]