Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-8gq7-wx9r-qgf6
Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L).
[]
CVE-2019-3402
The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter.
[ "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
GHSA-55w9-w6p5-whvv
A vulnerability, which was classified as problematic, has been found in LinZhaoguan pb-cms up to 2.0.1. This issue affects some unknown processing of the file /admin#article/edit?id=2 of the component Edit Article Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2015-6391
Cisco Unified SIP 3905 phones allow remote attackers to cause a denial of service (resource consumption and functionality loss) via a large amount of network traffic, aka Bug ID CSCuh51331.
[ "cpe:2.3:o:cisco:unified_sip_phone_3900_firmware:8.1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_sip_phone_3900_firmware:8.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_sip_phone_3900_firmware:8.1\\(2\\)sr1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_sip_phone_3900_firmware:8.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_sip_phone_3900_firmware:8.1\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_sip_phone_3900_firmware:9.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_sip_phone_3900_firmware:9.2\\(2\\):*:*:*:*:*:*:*" ]
CVE-2018-16974
An issue was discovered in Elefant CMS before 2.0.7. There is a PHP Code Execution Vulnerability in apps/filemanager/upload/drop.php by using /filemanager/api/rm/.htaccess to remove the .htaccess file, and then using a filename that ends in .php followed by space characters (for bypassing the blacklist).
[ "cpe:2.3:a:elefantcms:elefant:*:*:*:*:*:*:*:*" ]
CVE-2023-4592
Improper Neutralization of Input During Web Page Generation in WPN-XM Serverstack
A Cross-Site Scripting vulnerability has been detected in WPN-XM Serverstack affecting version 0.8.6. This vulnerability could allow a remote attacker to send a specially crafted JavaScript payload through the /tools/webinterface/index.php parameter and retrieve the cookie session details of an authenticated user, resulting in a session hijacking.
[ "cpe:2.3:a:wpn-xm:wpn-xm:0.8.6:*:*:*:*:*:*:*" ]
CVE-2002-1309
Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia ColdFusion 6.0 allows remote attackers to execute arbitrary via an HTTP GET request with a long .cfm file name.
[ "cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*" ]
GHSA-x65h-73q2-v23r
PHP remote file inclusion vulnerability in e/class/CheckLevel.php in Phome Empire CMS 3.7 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the check_path parameter.
[]
GHSA-w8hf-8qg5-jgq3
Multiple cross-site scripting (XSS) vulnerabilities in Issuetracker phpBugTracker before 1.7.0 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters.
[]
CVE-2024-6183
EZ-Suite EZ-Partner Forgot Password cross site scripting
A vulnerability classified as problematic has been found in EZ-Suite EZ-Partner 5. Affected is an unknown function of the component Forgot Password Handler. The manipulation leads to basic cross site scripting. It is possible to launch the attack remotely. VDB-269154 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:ez-suite:ez-partner:5:*:*:*:*:*:*:*" ]
CVE-2006-6054
The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.
[ "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*" ]
CVE-2023-41957
WordPress Simple Membership plugin <= 4.3.4 - Unauthenticated Membership Role Privilege Escalation vulnerability
Improper Privilege Management vulnerability in smp7, wp.Insider Simple Membership allows Privilege Escalation.This issue affects Simple Membership: from n/a through 4.3.4.
[ "cpe:2.3:a:smp7_wpinsider:simple_membership:*:*:*:*:*:*:*:*" ]
CVE-2016-1776
Web Server in Apple OS X Server before 5.1 does not properly restrict access to .DS_Store and .htaccess files, which allows remote attackers to obtain sensitive configuration information via an HTTP request.
[ "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*" ]
GHSA-fpwp-hqx7-wxhv
LibreOffice before 2017-01-02 has an out-of-bounds write caused by a heap-based buffer overflow related to the tools::Polygon::Insert function in tools/source/generic/poly.cxx.
[]
GHSA-7whh-qpqx-cq9v
Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of X_B or X_T files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18637.
[]
GHSA-4w56-vr39-rvqr
Null pointer dereference vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
[]
GHSA-v3ph-2ff8-mh78
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Form count property. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6477.
[]
CVE-2006-4603
NCH Swift Sound Web Dictate 1.02 allows remote attackers to bypass authentication via a null password.
[ "cpe:2.3:a:nch_software:swift_sound_web_dictate:1.02:*:*:*:*:*:*:*" ]
GHSA-gfvm-x7mf-cgqp
PivotX before 2.2.2 allows remote attackers to obtain sensitive information via a direct request to (1) includes/ping.php and (2) includes/spamping.php, which reveals the installation path in an error message.
[]
GHSA-32gp-xwx5-8mwj
The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its style attributes in all versions up to, and including, 4.22.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-q7ch-p7wx-7pf8
In the Linux kernel, the following vulnerability has been resolved:ila: block BH in ila_output()As explained in commit 1378817486d6 ("tipc: block BH before using dst_cache"), net/core/dst_cache.c helpers need to be called with BH disabled.ila_output() is called from lwtunnel_output() possibly from process context, and under rcu_read_lock().We might be interrupted by a softirq, re-enter ila_output() and corrupt dst_cache data structures.Fix the race by using local_bh_disable().
[]
GHSA-p83g-f9xr-p3gp
Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
[]
CVE-2003-0452
Buffer overflows in osh before 1.7-11 allow local users to execute arbitrary code and bypass shell restrictions via (1) long environment variables or (2) long "file redirections."
[ "cpe:2.3:a:gunnar_ritter:osh:*:*:*:*:*:*:*:*" ]
GHSA-453g-5mrh-qccr
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
[]
CVE-2007-4232
PHP remote file inclusion vulnerability in admin/inc/change_action.php in Andreas Robertz PHPNews 0.93 allows remote attackers to execute arbitrary PHP code via a URL in the format_menue parameter.
[ "cpe:2.3:a:andreas_robertz:phpnews:0.93:*:*:*:*:*:*:*" ]
GHSA-9ccm-g362-2r35
XWork in Apache Struts Reveals Sensitive Information
XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
[]
CVE-2018-21227
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.34, R6400v2 before 1.0.2.34, R6700 before 1.0.1.30, R6900 before 1.0.1.30, R6900P before 1.0.0.62, R7000 before 1.0.9.12, R7000P before 1.0.0.62, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
[ "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*" ]
GHSA-9pwv-pqg3-7wh4
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WooCommerce WooCommerce One Page Checkout allows PHP Local File Inclusion.This issue affects WooCommerce One Page Checkout: from n/a through 2.3.0.
[]
CVE-2018-0784
ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Elevation Of Privilege Vulnerability". This CVE is unique from CVE-2018-0808.
[ "cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*" ]
GHSA-6h3v-5cxg-3c62
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized read access to a subset of Oracle Marketing accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N).
[]
CVE-2021-41637
Weak access control permissions in MELAG FTP Server 2.2.0.4 allow the "Everyone" group to read the local FTP configuration file, which includes among other information the unencrypted passwords of all FTP users.
[ "cpe:2.3:a:melag:ftp_server:2.2.0.4:*:*:*:*:*:*:*" ]
GHSA-242x-p4j2-gjjj
Buffer overflow in the daemon function in midirecord.cc in Tuomas Airaksinen Midirecord 2.0 allows local users to execute arbitrary code via a long command line argument (filename). NOTE: This may not be a vulnerability if Midirecord is not installed setuid.
[]
CVE-2011-1291
Google Chrome before 10.0.648.204 does not properly handle base strings, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "buffer error."
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2015-0107
IBM Tivoli IT Asset Management for IT, Tivoli Service Request Manager, and Change and Configuration Management Database 7.1 through 7.1.1.8 and 7.2 and Maximo Asset Management and Maximo Industry Solutions 7.1 through 7.1.1.8, 7.5 before 7.5.0.7 IFIX003, and 7.6 before 7.6.0.0 IFIX002 allow remote authenticated users to conduct directory traversal attacks via unspecified vectors.
[ "cpe:2.3:a:ibm:change_and_configuration_management_database:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:change_and_configuration_management_database:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management_essentials:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_government:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_life_sciences:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_nuclear_power:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_transportation:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_for_utilities:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_service_request_manager:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_service_request_manager:7.2:*:*:*:*:*:*:*" ]
GHSA-cfc8-prq5-vvfr
A vulnerability using PendingIntent in DeX for PC prior to SMR Aug-2022 Release 1 allows attackers to access files with system privilege.
[]
CVE-2020-14493
OpenClinic GA
A low-privilege user may use SQL syntax to write arbitrary files to the OpenClinic GA 5.09.02 and 5.89.05b server, which may allow the execution of arbitrary commands.
[ "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*", "cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*" ]
GHSA-xf25-29fj-q584
A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c (called from TIFFWriteDirectoryTagTransferfunction) in LibTIFF 4.0.9 allows an attacker to cause a denial-of-service through a crafted tiff file. This vulnerability can be triggered by the executable tiffcp.
[]
CVE-2021-36153
Mismanaged state in GRPCWebToHTTP2ServerCodec.swift in gRPC Swift 1.1.0 and 1.1.1 allows remote attackers to deny service by sending malformed requests.
[ "cpe:2.3:a:linuxfoundation:grpc_swift:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:grpc_swift:1.1.1:*:*:*:*:*:*:*" ]
CVE-2024-4959
Frontend Checklist <= 2.3.2 - Admin+ Stored XSS via Items
The Frontend Checklist WordPress plugin through 2.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:jonas_breuer:frontend_checklist:*:*:*:*:*:*:*:*" ]
GHSA-895q-4fm2-43p8
The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the printResultAndDie() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.
[]
GHSA-34wj-p97g-p5hh
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the ReadImage function in input-bmp.c:337:25.
[]
CVE-2024-56591
Bluetooth: hci_conn: Use disable_delayed_work_sync
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_conn: Use disable_delayed_work_sync This makes use of disable_delayed_work_sync instead cancel_delayed_work_sync as it not only cancel the ongoing work but also disables new submit which is disarable since the object holding the work is about to be freed.
[]
CVE-2008-1382
libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
[ "cpe:2.3:a:libpng:libpng:1.0.6:a:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:d:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:e:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:f:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:g:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:h:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:i:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.6:j:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta11:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta12:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta13:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta14:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta15:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta16:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta17:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:beta18:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.7:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:beta9:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.9:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.12:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.12:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.15:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.19:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.21:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.21:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.23:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.24:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.25:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.25:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.27:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.28:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.29:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.30:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.31:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:beta05:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.23:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.24:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta10:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta11:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta12:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta13:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta14:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta15:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta16:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta17:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta18:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta19:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta4:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta5:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta6:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta7:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta8:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.4:beta9:*:*:*:*:*:*" ]
GHSA-mm99-fj7x-hc5q
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
[]
GHSA-fqhw-6hfw-h298
Possible heap overflow due to improper length check of domain while parsing the DNS response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables
[]
GHSA-86gw-g9jv-8vfg
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0848.
[]
CVE-2022-1979
SourceCodester Product Show Room Site p=contact cross site scripting
A vulnerability was found in SourceCodester Product Show Room Site 1.0. It has been declared as problematic. This vulnerability affects p=contact. The manipulation of the Message textbox with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely but requires authentication. Exploit details have been disclosed to the public.
[ "cpe:2.3:a:product_show_room_site_project:product_show_room_site:1.0:*:*:*:*:*:*:*" ]
GHSA-xrqh-hpg9-64g6
Cross-Site Request Forgery (CSRF) vulnerability in Tim Whitlock Loco Translate allows Cross Site Request Forgery.This issue affects Loco Translate: from n/a through 2.6.9.
[]
GHSA-8hgq-8qm6-pq2v
IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 186023.
[]
GHSA-q2j2-c4mj-23jx
Cross-site scripting (XSS) vulnerability in the subscription functionality in the Project issue tracking module before 4.7.x-1.5, 4.7.x-2.x before 4.7.x-2.5, and 5.x-1.x before 5.x-1.1 for Drupal allows remote authenticated users with project create or edit permissions to inject arbitrary web script or HTML via unspecified vectors involving a (1) individual or (2) overview form.
[]
GHSA-6c7g-8gf8-56hg
In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118143575
[]
CVE-2022-41497
ClipperCMS 1.3.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the pkg_url parameter at /manager/index.php.
[ "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*" ]
CVE-2017-11272
Adobe Digital Editions 4.5.4 and earlier has a security bypass vulnerability.
[ "cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*" ]
CVE-2024-41002
crypto: hisilicon/sec - Fix memory leak for sec resource release
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/sec - Fix memory leak for sec resource release The AIV is one of the SEC resources. When releasing resources, it need to release the AIV resources at the same time. Otherwise, memory leakage occurs. The aiv resource release is added to the sec resource release function.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2024-21909
Denial of service in CBOR library
PeterO.Cbor versions 4.0.0 through 4.5.0 are vulnerable to a denial of service vulnerability. An attacker may trigger the denial of service condition by providing crafted data to the DecodeFromBytes or other decoding mechanisms in PeterO.Cbor. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.
[ "cpe:2.3:a:peteroupc:cbor:*:*:*:*:*:.net:*:*" ]
CVE-2019-1803
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Root Privilege Escalation Vulnerability
A vulnerability in the filesystem management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker with administrator rights to gain elevated privileges as the root user on an affected device. The vulnerability is due to overly permissive file permissions of specific system files. An attacker could exploit this vulnerability by authenticating to an affected device, creating a crafted command string, and writing this crafted string to a specific file location. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid administrator credentials for the device.
[ "cpe:2.3:o:cisco:nexus_9000_series_application_centric_infrastructure:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*" ]
CVE-2012-4107
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary commands via crafted parameters to a file-related command, aka Bug ID CSCtq86489.
[ "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*" ]
CVE-2015-1109
NetworkExtension in Apple iOS before 8.3 stores credentials in VPN configuration logs, which makes it easier for physically proximate attackers to obtain sensitive information by reading a log file.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
GHSA-7j7g-hmvx-g72h
Passcode Lock in Apple iOS before 7.0.3 on iPhone devices allows physically proximate attackers to bypass the passcode-failure disabled state by leveraging certain incorrect visibility of the passcode-entry view after use of the Phone app.
[]
CVE-2022-29327
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the urladd parameter in /goform/websURLFilterAddDel.
[ "cpe:2.3:o:dlink:dir-816_firmware:1.10cnb04:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-816:a2:*:*:*:*:*:*:*" ]
GHSA-9xqc-gh6j-q62h
Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm Force US LLC CartFlows Pro allows Cross Site Request Forgery.This issue affects CartFlows Pro: from n/a through 1.11.12.
[]
GHSA-49w5-c2q7-xqvq
An issue in JerryscriptProject jerryscript v.3.0.0 allows an attacker to obtain sensitive information via a crafted script to the arrays.
[]
CVE-2022-41209
SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses encryption method which lacks proper diffusion and does not hide the patterns well. This can lead to information disclosure. In certain scenarios, application might also be susceptible to replay attacks.
[ "cpe:2.3:a:sap:customer_data_cloud:7.4:*:*:*:*:android:*:*" ]
GHSA-5gf9-2q38-pjpq
The time-sheets plugin before 1.5.2 for WordPress has multiple XSS issues.
[]
CVE-2012-5641
Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.
[ "cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:couchdb:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mochiweb_project:mochiweb:*:*:*:*:*:*:*:*", "cpe:2.3:a:mochiweb_project:mochiweb:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mochiweb_project:mochiweb:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mochiweb_project:mochiweb:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mochiweb_project:mochiweb:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mochiweb_project:mochiweb:2.3.1:*:*:*:*:*:*:*" ]
CVE-2016-7044
The unformat_24bit_color function in the format parsing code in Irssi before 0.8.20, when compiled with true-color enabled, allows remote attackers to cause a denial of service (heap corruption and crash) via an incomplete 24bit color code.
[ "cpe:2.3:a:irssi:irssi:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" ]
CVE-2020-29451
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate Jira projects via an Information Disclosure vulnerability in the Jira Projects plugin report page. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.14.1.
[ "cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
GHSA-c3h8-f8h6-m66m
Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.31.4 allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function.
[]
CVE-2002-2296
Cross-site scripting (XSS) vulnerability in YaBB.pl in Yet Another Bulletin Board (YaBB) 1 Gold SP 1 allows remote attackers to inject arbitrary web script or HTML via the num parameter.
[ "cpe:2.3:a:yabb:yabb:1_gold_-_sp_1:*:*:*:*:*:*:*" ]
GHSA-4m6r-qqcq-49pc
Stack-based buffer overflow in Sorinara Streaming Audio Player 0.9 allows remote attackers to execute arbitrary code via a crafted .pla file.
[]
GHSA-8vj6-3p64-gcfr
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'size' value in several widgets all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-m5h7-5jvg-wxc8
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls Code Flow starting at STDUJBIG2File+0x00000000000015e9."
[]
CVE-2018-17045
An issue was discovered in CMS MaeloStore V.1.5.0. There is a CSRF vulnerability that can change the administrator password via admin/modul/users/aksi_users.php?act=update.
[ "cpe:2.3:a:cms_maelostore_project:cms_maelostore:1.5.0:*:*:*:*:*:*:*" ]
GHSA-f3p9-58ff-r365
The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file.
[]
CVE-2024-55864
Cross-site scripting vulnerability exists in My WP Customize Admin/Frontend versions prior to ver 1.24.1. If a malicious administrative user customizes the administrative page with some malicious contents, an arbitrary script may be executed on the web browser of the other users who are accessing the page.
[]
GHSA-3mqw-98wg-4fw5
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[]
GHSA-q2g7-cprc-hvrv
PHP remote file inclusion vulnerability in config.php in RPW 1.0.2 allows remote attackers to execute arbitrary PHP code via a URL in the sql_language parameter.
[]
GHSA-wq2q-fqq7-mgvw
A vulnerability was found in OpenBMB XAgent 1.0.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Privileged Mode. The manipulation leads to sandbox issue. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-255265 was assigned to this vulnerability.
[]
GHSA-g328-m8jq-63j6
VMware vCenter Server 5.5 before u3 and 6.0 before u1 does not verify X.509 certificates from TLS LDAP servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2008-5688
MediaWiki 1.8.1, and other versions before 1.13.3, when the wgShowExceptionDetails variable is enabled, sometimes provides the full installation path in a debugging message, which might allow remote attackers to obtain sensitive information via unspecified requests that trigger an uncaught exception.
[ "cpe:2.3:a:mediawiki:mediawiki:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.2:*:*:*:*:*:*:*" ]
CVE-2020-36725
The TI WooCommerce Wishlist and TI WooCommerce Wishlist Pro plugins for WordPress are vulnerable to an Options Change vulnerability in versions up to, and including, 1.21.11 and 1.21.4 via the 'ti-woocommerce-wishlist/includes/export.class.php' file. This makes it possible for authenticated attackers to gain otherwise restricted access to the vulnerable blog and update any settings.
[ "cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:pro:wordpress:*:*", "cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:free:wordpress:*:*" ]
CVE-2021-31951
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1621:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1052:*:*:*:*:*:*:*" ]
GHSA-gxpm-7hmf-39ph
IBM Business Automation Workflow 18.0, 19.0, and 20.0 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183611.
[]
GHSA-437p-qw95-wqqr
Trac vulnerable to denial of service
Unspecified vulnerability in Trac before 0.11.2 allows attackers to cause a denial of service via unknown attack vectors related to "certain wiki markup."
[]
GHSA-wr89-q2gw-q6hh
A vulnerability has been found in Bdtask Hospita AutoManager up to 20240223 and classified as problematic. This vulnerability affects unknown code of the file /investigation/delete/ of the component Investigation Report Handler. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255496. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-q25f-hc6j-2jpw
The Bently Nevada 3700 series of condition monitoring equipment through 2022-04-29 has a maintenance interface on port 4001/TCP with undocumented, hardcoded credentials. An attacker capable of connecting to this interface can thus trivially take over its functionality.
[]
CVE-2024-41912
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls.
[ "cpe:2.3:o:hp:poly_clariti_manager_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:poly_clariti_manager:*:*:*:*:*:*:*:*" ]
GHSA-hfh9-h9qh-9gxw
In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559840.
[]
CVE-2022-46811
WordPress ALD Dropshipping and Fulfillment for AliExpress and WooCommerce plugin <= 1.0.21 - Broken Access Control + CSRF
Missing Authorization vulnerability in VillaTheme(villatheme.com) ALD – Dropshipping and Fulfillment for AliExpress and WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ALD – Dropshipping and Fulfillment for AliExpress and WooCommerce: from n/a through 1.0.21.
[]
GHSA-5xr5-hfmf-pr6p
NVIDIA BMC contains a vulnerability in SPX REST API, where an authorized attacker can inject arbitrary shell commands, which may lead to code execution, denial of service, information disclosure and data tampering.
[]
GHSA-jc9p-889f-c7jp
Snow Inventory Agent through 6.7.0 on Windows uses CPUID to report on processor types and versions that may be deployed and in use across an IT environment. A privilege-escalation vulnerability exists if CPUID is enabled, and thus it should be disabled via configuration settings.
[]
CVE-2022-45144
Algoo Tracim before 4.4.2 allows XSS via HTML file upload.
[ "cpe:2.3:a:algoo:tracim:*:*:*:*:*:*:*:*" ]
CVE-2008-1427
SQL injection vulnerability in the Joobi Acajoom (com_acajoom) 1.1.5 and 1.2.5 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the mailingid parameter in a mailing view action to index.php.
[ "cpe:2.3:a:joobi:acajoom:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:joobi:acajoom:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:com_acajoom:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:com_acajoom:1.2.5:*:*:*:*:*:*:*" ]
CVE-2024-33805
A SQL injection vulnerability in /model/get_student.php in campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-mr5g-mvhg-7rhw
IBM Cloud Pak for Security (CP4S) 1.9.0.0 through 1.9.2.0 could allow an attacker with a valid API key for one tenant to access data from another tenant's account. IBM X-Force ID: 254136.
[]
CVE-2022-0646
A flaw use after free in the Linux kernel Management Component Transport Protocol (MCTP) subsystem was found in the way user triggers cancel_work_sync after the unregister_netdev during removing device. A local user could use this flaw to crash the system or escalate their privileges on the system. It is actual from Linux Kernel 5.17-rc1 (when mctp-serial.c introduced) till 5.17-rc5.
[ "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*" ]
GHSA-8j9x-7hf9-69wq
XXE issue in Airsonic before 10.1.2 during parse.
[]
CVE-2023-33330
WordPress WooCommerce Follow-Up Emails Plugin <= 4.9.50 is vulnerable to SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WooCommerce AutomateWoo.This issue affects AutomateWoo: from n/a through 4.9.50.
[ "cpe:2.3:a:woocommerce:automatewoo:*:*:*:*:*:wordpress:*:*" ]
CVE-2012-5473
The Database activity module in Moodle 2.1.x before 2.1.9, 2.2.x before 2.2.6, and 2.3.x before 2.3.3 allows remote authenticated users to read activity entries of a different group's users via an advanced search.
[ "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*" ]
GHSA-hmcg-r74r-6qp2
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'.
[]