id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-wvg8-qgr2-x6cj | In RGXFWChangeOSidPriority of rgxfwutils.c, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2002-1530 | The administrative web interface (STEMWADM) for SurfControl SuperScout Email Filter allows users to obtain usernames and plaintext passwords via a request to the userlist.asp program, which includes the passwords in a user editing form. | [
"cpe:2.3:a:surfcontrol:superscout_email_filter:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:surfcontrol:superscout_email_filter:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:surfcontrol:superscout_email_filter:4.0:*:smtp:*:*:*:*:*"
] |
|
CVE-2021-22286 | SECURITY – Denial of Service Vulnerabilities in SPIET800 INFI-Net to Ethernet Transfer module and PNI800 S+ Ethernet communication interface module | Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to cause the denial of service or make the module unresponsive. | [
"cpe:2.3:o:abb:pni800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:pni800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:spiet800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:spiet800:-:*:*:*:*:*:*:*"
] |
CVE-2022-28006 | Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \admin\employee_delete.php. | [
"cpe:2.3:a:attendance_and_payroll_system_project:attendance_and_payroll_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2009-1127 | win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not correctly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k NULL Pointer Dereferencing Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] |
|
CVE-2023-50825 | WordPress iframe Shortcode Plugin <= 2.0 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Terrier Tenacity iframe Shortcode allows Stored XSS.This issue affects iframe Shortcode: from n/a through 2.0.
| [
"cpe:2.3:a:jacksonwhelan:iframe_shortcode:*:*:*:*:*:wordpress:*:*"
] |
GHSA-fcqh-f378-gwwh | Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. | [] |
|
CVE-2018-16048 | An issue was discovered in GitLab Community and Enterprise Edition before 11.0.6, 11.1.x before 11.1.5, and 11.2.x before 11.2.2. There is Missing Authorization Control for API Repository Storage. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-f6hj-xq5g-h43f | A vulnerability has been found in Apereo CAS 6.6 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login. The manipulation of the argument redirect_uri leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2022-22786 | Update package downgrade in Zoom Client for Meetings for Windows | The Zoom Client for Meetings for Windows before version 5.10.0 and Zoom Rooms for Conference Room for Windows before version 5.10.0, fails to properly check the installation version during the update process. This issue could be used in a more sophisticated attack to trick a user into downgrading their Zoom client to a less secure version. | [
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*"
] |
CVE-2024-13709 | Linear <= 2.8.1 - Cross-Site Request Forgery to Cache Reset | The Linear plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8.1. This is due to missing or incorrect nonce validation on the 'linear-debug'. This makes it possible for unauthenticated attackers to reset the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
CVE-2015-3028 | McAfee Advanced Threat Defense (MATD) before 3.4.4.63 allows remote authenticated users to bypass intended restrictions and change or update configuration settings via crafted parameters. | [
"cpe:2.3:a:mcafee:advanced_threat_defense:*:*:*:*:*:*:*:*"
] |
|
GHSA-xppm-x368-2qjm | In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables. | [] |
|
CVE-2023-25439 | Stored Cross Site Scripting (XSS) vulnerability in Square Pig FusionInvoice 2023-1.0, allows attackers to execute arbitrary code via the description or content fields to the expenses, tasks, and customer details. | [
"cpe:2.3:a:squarepiginteractive:fusioninvoice:2023-1.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-2456 | The Ecwid Ecommerce Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 6.12.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-8p63-mwfp-hjrv | Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information. | [] |
|
CVE-2017-18691 | An issue was discovered on Samsung mobile devices with M(6.0) and N(7.0) (Exynos8890 chipsets) software. There are multiple Buffer Overflows in TSP sysfs cmd_store. The Samsung ID is SVE-2016-7500 (January 2017). | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_8890:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-44380 | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetTime param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] |
|
GHSA-4998-58vc-p397 | A vulnerability in Cisco Jabber for Windows could allow an unauthenticated, local attacker to access sensitive communications made by the Jabber client. An attacker could exploit this vulnerability to gain information to conduct additional attacks. The vulnerability is due to the way Cisco Jabber for Windows handles random number generation for file folders. An attacker could exploit the vulnerability by fixing the random number data used to establish Secure Sockets Layer (SSL) connections between clients. An exploit could allow the attacker to decrypt secure communications made by the Cisco Jabber for Windows client. Cisco Bug IDs: CSCve44806. | [] |
|
CVE-2009-4024 | Argument injection vulnerability in the ping function in Ping.php in the Net_Ping package before 2.4.5 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: this has also been reported as a shell metacharacter problem. | [
"cpe:2.3:a:pear:pear:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pear:pear:2.4.3:*:*:*:*:*:*:*"
] |
|
GHSA-fc6c-wh46-2q9r | In the Linux kernel, the following vulnerability has been resolved:nfs: Fix KMSAN warning in decode_getfattr_attrs()Fix the following KMSAN warning:CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)=====================================================
BUG: KMSAN: uninit-value in decode_getfattr_attrs+0x2d6d/0x2f90
decode_getfattr_attrs+0x2d6d/0x2f90
decode_getfattr_generic+0x806/0xb00
nfs4_xdr_dec_getattr+0x1de/0x240
rpcauth_unwrap_resp_decode+0xab/0x100
rpcauth_unwrap_resp+0x95/0xc0
call_decode+0x4ff/0xb50
__rpc_execute+0x57b/0x19d0
rpc_execute+0x368/0x5e0
rpc_run_task+0xcfe/0xee0
nfs4_proc_getattr+0x5b5/0x990
__nfs_revalidate_inode+0x477/0xd00
nfs_access_get_cached+0x1021/0x1cc0
nfs_do_access+0x9f/0xae0
nfs_permission+0x1e4/0x8c0
inode_permission+0x356/0x6c0
link_path_walk+0x958/0x1330
path_lookupat+0xce/0x6b0
filename_lookup+0x23e/0x770
vfs_statx+0xe7/0x970
vfs_fstatat+0x1f2/0x2c0
__se_sys_newfstatat+0x67/0x880
__x64_sys_newfstatat+0xbd/0x120
x64_sys_call+0x1826/0x3cf0
do_syscall_64+0xd0/0x1b0
entry_SYSCALL_64_after_hwframe+0x77/0x7fThe KMSAN warning is triggered in decode_getfattr_attrs(), when calling
decode_attr_mdsthreshold(). It appears that fattr->mdsthreshold is not
initialized.Fix the issue by initializing fattr->mdsthreshold to NULL in
nfs_fattr_init(). | [] |
|
GHSA-qhgj-87jj-53vh | ERS Data System 1.8.1.0 allows remote attackers to execute arbitrary code, related to "com.branaghgroup.ecers.update.UpdateRequest" object deserialization. | [] |
|
GHSA-hj53-2vf5-rh93 | packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly handle exceptions thrown by post dissectors, which allows remote attackers to cause a denial of service (application crash) via a certain series of packets, as demonstrated by enabling the (1) PRP or (2) MATE post dissector. | [] |
|
GHSA-r82f-4c78-r455 | In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c. | [] |
|
CVE-2021-21911 | A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:advantech:r-seenet:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-5jf7-wfpr-3mrj | McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote authenticated users to read arbitrary files via a crafted URL. | [] |
|
CVE-2024-22949 | JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. | [
"cpe:2.3:o:jfree:jfreechart:*:*:*:*:*:*:*:*"
] |
|
GHSA-f6r4-gh32-pq92 | Array index error in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome before 41.0.2272.76 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging renderer access to provide an invalid port index that triggers an out-of-bounds write operation, a different vulnerability than CVE-2015-1212. | [] |
|
CVE-2004-2419 | Keene Digital Media Server 1.0.2 allows local users to obtain usernames and passwords by reading the dmscore.db file on the local system. | [
"cpe:2.3:a:keene:digital_media_server:1.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-ww64-hr59-ghr5 | Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command. | [] |
|
GHSA-3w7q-pf6h-jf9g | Multiple cross-site scripting (XSS) vulnerabilities in EJ3 BlackBook 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) bookCopyright and (2) ver parameters to (a) footer.php, and the (3) bookName, (4) bookMetaTags, and (5) estiloCSS parameters to (b) header.php. | [] |
|
GHSA-3h7q-rfh9-xm4v | Synapse V2 state resolution weakness allows Denial of Service (DoS) | ImpactA remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.105.1, can dispatch specially crafted events to exploit a weakness in how the auth chain cover index is calculated. This can induce high CPU consumption and accumulate excessive data in the database of such instances, resulting in a denial of service.Servers in private federations, or those that do not federate, are not affected.PatchesServer administrators should upgrade to 1.105.1 or later.WorkaroundsOne can:ban the malicious users or ACL block servers from the rooms; and/orleave the room and purge the room using the admin APIFor more informationIf you have any questions or comments about this advisory, please email us at [security AT element.io](mailto:[email protected]). | [] |
CVE-2010-1010 | SQL injection vulnerability in the MK Wastebasket (mk_wastebasket) extension 2.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:matthias_kall:mk_wastebasket:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
|
GHSA-52v5-4c5v-67f2 | Possible integer overflow happens when mmap find function will increment refcount every time when it invokes and can lead to use after free issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MDM9607, MDM9640, MSM8909W, MSM8917, MSM8953, Nicobar, QCS605, QM215, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM660, SDM670, SDM710, SDM845, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130 | [] |
|
CVE-2011-1760 | utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument. | [
"cpe:2.3:a:maynard_johnson:oprofile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:maynard_johnson:oprofile:0.9.5:*:*:*:*:*:*:*"
] |
|
CVE-2012-5947 | Buffer overflow in the vsflex7l ActiveX control in IBM SPSS SamplePower 3.0 before FP1 allows remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:ibm:spss_samplepower:3.0.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-4718 | IBM Jazz for Service Management 3.13 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172123. | [
"cpe:2.3:a:ibm:jazz_for_service_management:1.1.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-2956 | Stack-based buffer overflow in the readRadianceHeader function in (1) src/fileformat/rgbeio.cpp in pfstools 1.6.2 and (2) src/Fileformat/rgbeio.cpp in Qtpfsgui 1.8.11 allows remote attackers to execute arbitrary code via a crafted Radiance RGBE (.hdr) file. | [
"cpe:2.3:a:pfstools:pfstools:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qtpfsgui:qtpfsgui:1.8.11:*:*:*:*:*:*:*"
] |
|
GHSA-v2jq-794f-f847 | Missing Authorization vulnerability in Adnan Analytify allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Analytify: from n/a through 5.5.0. | [] |
|
GHSA-w7fm-92w5-g2m4 | Dell EMC ECS, versions prior to 3.5, contains an Exposure of Resource vulnerability. A remote unauthenticated attacker can access the list of DT (Directory Table) objects of all internally running services and gain knowledge of sensitive data of the system. | [] |
|
CVE-2019-20030 | An attacker with knowledge of the modem access number on a NEC UM8000 voicemail system may use SSH tunneling or standard Linux utilities to gain access to the system's LAN port. All versions are affected. | [
"cpe:2.3:o:nec:um8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:um8000:-:*:*:*:*:*:*:*"
] |
|
GHSA-789c-4pgv-92rh | The Lana Downloads Manager WordPress plugin before 1.8.0 is affected by an arbitrary file download vulnerability that can be exploited by users with "Contributor" permissions or higher. | [] |
|
GHSA-465v-95qw-94v6 | Multiple direct static code injection vulnerabilities in RunCMS before 1.6.1 allow remote authenticated administrators to inject arbitrary PHP code via the (1) header and (2) footer parameters to modules/system/admin.php in a meta-generator action, (3) the disclaimer parameter to modules/system/admin.php in a disclaimer action, (4) the disclaimer parameter to modules/mydownloads/admin/index.php in a mydownloadsConfigAdmin action, (5) the disclaimer parameter to modules/newbb_plus/admin/forum_config.php, (6) the disclaimer parameter to modules/mylinks/admin/index.php in a myLinksConfigAdmin action, or (7) the intro parameter to modules/sections/admin/index.php in a secconfig action, which inject PHP sequences into (a) sections/cache/intro.php, (b) mylinks/cache/disclaimer.php, (c) mydownloads/cache/disclaimer.php, (d) newbb_plus/cache/disclaimer.php, (e) system/cache/disclaimer.php, (f) system/cache/footer.php, (g) system/cache/header.php, or (h) system/cache/maintenance.php in modules/. | [] |
|
CVE-2006-0068 | SQL injection vulnerability in Primo Cart 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) q parameter to search.php and (2) email parameter to user.php. | [
"cpe:2.3:a:primo_place:primo_cart:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-34798 | WordPress Debug Log – Manger Tool plugin <= 1.4.5 - Sensitive Data Exposure vulnerability | Insertion of Sensitive Information into Log File vulnerability in Lukman Nakib Debug Log – Manger Tool.This issue affects Debug Log – Manger Tool: from n/a through 1.4.5. | [] |
CVE-2023-1221 | Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-3hw8-h4fg-g6wr | An issue was discovered in the Gantt-Chart module before 5.5.5 for Jira. Due to missing validation of user input, it is vulnerable to a persistent XSS attack. An attacker can embed the attack vectors in the dashboard of other users. To exploit this vulnerability, an attacker has to be authenticated. | [] |
|
CVE-2007-6080 | SQL injection vulnerability in modules/banners/click.php in the banners module for bcoos 1.0.10 allows remote attackers to execute arbitrary SQL commands via the bid parameter. NOTE: it was later reported that 1.0.13 is also affected. | [
"cpe:2.3:a:bcoos:bcoos:1.0.10:*:*:*:*:*:*:*"
] |
|
CVE-2024-1388 | The Yuki theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the reset_customizer_options() function in all versions up to, and including, 1.3.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to reset the theme's settings. | [] |
|
GHSA-m8x6-6r63-qvj2 | Cross site scripting via canonical tag in Contao | ImpactUntrusted users can inject malicious code into the canonical tag, which is then executed on the web page (front end).PatchesUpdate to Contao 4.13.3.WorkaroundsDisable canonical tags in the root page settings.Referenceshttps://contao.org/en/security-advisories/cross-site-scripting-via-canonical-urlFor more informationIf you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). | [] |
GHSA-7h6m-c395-86jj | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0968, CVE-2019-0977, CVE-2019-1009, CVE-2019-1011, CVE-2019-1012, CVE-2019-1013, CVE-2019-1015, CVE-2019-1016, CVE-2019-1046, CVE-2019-1047, CVE-2019-1048, CVE-2019-1049, CVE-2019-1050. | [] |
|
GHSA-fjx8-vjm4-2pff | A cross-site scripting (XSS) vulnerability in General Solutions Steiner GmbH CASE 3 Taskmanagement V 3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Tasktyp parameter. | [] |
|
GHSA-8r87-vg52-hc7f | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect integrity via vectors related to PIA Core Technology. | [] |
|
CVE-2017-12672 | In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-3:*:*:*:*:*:*:*"
] |
|
GHSA-p7wq-886q-gph3 | Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in Yugabyte DB allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte DB: v2.17.0.0. | [] |
|
CVE-2000-0790 | The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a default execute option for the first file that is listed in the folder. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*"
] |
|
GHSA-x943-vqmm-c5qp | Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063. | [] |
|
GHSA-gmw5-xjxq-3255 | A stored Cross Site Scripting vulnerability in the "related recommendations" feature in Ppress v.0.0.9 allows a remote attacker to execute arbitrary code via a crafted script to the article.title, article.category, and article.tags parameters. | [] |
|
CVE-2005-1715 | Cross-site scripting (XSS) vulnerability in index.php for TOPo 2.2 (2.2.178) allows remote attackers to inject arbitrary web script or HTML via the (1) m, (2) s, (3) ID, or (4) t parameters, or the (5) field name, (6) Your Web field, or (7) email field in the comments section. | [
"cpe:2.3:a:ej3:topo:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ej3:topo:2.2.178:*:*:*:*:*:*:*"
] |
|
CVE-2015-7963 | SafeNet Authentication Service for AD FS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | [
"cpe:2.3:a:gemalto:safenet_authentication_service_for_ad_fs_agent:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-20027 | A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls. | [
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_e10200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_e10400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_e10800:-:*:*:*:*:*:*:*"
] |
|
GHSA-mjwp-9g5x-mxxc | A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials. | [] |
|
GHSA-m2v7-9rhw-324g | The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers to cause a denial of service (crash) via unspecified vectors. | [] |
|
CVE-2009-4762 | MoinMoin 1.7.x before 1.7.3 and 1.8.x before 1.8.3 checks parent ACLs in certain inappropriate circumstances during processing of hierarchical ACLs, which allows remote attackers to bypass intended access restrictions by requesting an item, a different vulnerability than CVE-2008-6603. | [
"cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-3437 | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the filesystem of the underlying operating system. | [
"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*"
] |
GHSA-f92r-w6xq-p3pv | HCL Domino v10 and v11 is susceptible to a Denial of Service (DoS) vulnerability due to insufficient validation of input to its public API. An unauthenticated attacker could could exploit this vulnerability to crash the Domino server. | [] |
|
GHSA-mpwq-52cf-rphx | Multiple SQL injection vulnerabilities in the checkUser function in inc/DBInterface.php in XchangeBoard 1.70 and earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) userNick or (2) password parameters. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] |
|
GHSA-qgww-8j69-35gr | Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) "jolt", (2) "jolt2", (3) "raped", (4) "hping2", (5) "bloop", (6) "bubonic", (7) "mutant", (8) "trash", and (9) "trash2." | [] |
|
CVE-2024-13658 | NGG Smart Image Search <= 3.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting | The NGG Smart Image Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'hr_SIS_nextgen_searchbox' shortcode in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
GHSA-qm6m-xm7j-wx44 | The The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.4.2.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | [] |
|
CVE-2024-0657 | The Internal Link Juicer: SEO Auto Linker for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings such as 'ilj_settings_field_links_per_page' in all versions up to, and including, 2.23.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [
"cpe:2.3:a:internallinkjuicer:internal_link_juicer:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2013-4093 | The SecureSphere Operations Manager (SOM) Management Server in Imperva SecureSphere 9.0.0.5 allows remote attackers to obtain sensitive information via (1) a direct request to dwr/call/plaincall/AsyncOperationsContainer.getOperationState.dwr, which reveals the installation path in the s0.filePath field, or (2) a T/keyManagement request to plain/settings.html, which reveals a temporary path in an error message. | [
"cpe:2.3:a:imperva:securesphere:9.0.0.5:*:*:*:*:*:*:*"
] |
|
CVE-2024-24548 | Payment EX Ver1.1.5b and earlier allows a remote unauthenticated attacker to obtain the information of the user who purchases merchandise using Payment EX. | [
"cpe:2.3:a:estore-wss:payment_ex:*:*:*:*:*:*:*:*"
] |
|
GHSA-hm29-m2fx-r7p5 | An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It allows Denial of Service. Inputting an overly long string into a Markdown field could cause a denial of service. | [] |
|
CVE-1999-0799 | Buffer overflow in bootpd 2.4.3 and earlier via a long boot file location. | [
"cpe:2.3:o:cmu:bootpd:*:*:*:*:*:*:*:*"
] |
|
GHSA-f69v-xrj8-rhxf | org.xwiki.platform:xwiki-platform-rest-server allows SQL injection in query endpoint of REST API | ImpactIt is possible for a remote unauthenticated user to escape from the HQL execution context and perform a blind SQL injection to execute arbitrary SQL statements on the database backend, including when "Prevent unregistered users from viewing pages, regardless of the page rights" and "Prevent unregistered users from editing pages, regardless of the page rights" options are enabled.Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries.The vulnerability may be tested in a default installation of XWIki Standard Flavor, including using the official Docker containers.An example query, which leads to SQL injection with MySQL/MariaDB backend is shown below:When executed, the response from the server will come after a delay of 10 extra seconds, indicating successful execution of the injected SQL statement.An example of a query for the PostgreSQL database backend is shown below:Both requests employ database backend dependent techniques of breaking out of HQL query context, described, for example, here: https://www.sonarsource.com/blog/exploiting-hibernate-injections.PatchesThis has been patched in 16.10.1, 16.4.6 and 15.10.16.WorkaroundsThere is no known workaround, other than upgrading XWiki.Referenceshttps://jira.xwiki.org/browse/XWIKI-22691For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])AttributionSergey Anufrienko from Kaspersky ICS-CERT vulnerability research team reported this vulnerability. | [] |
GHSA-rrx7-386p-58w6 | Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (CPU consumption) via a -1 value in the field that specifies the size of the vector<T> value. | [] |
|
GHSA-phf7-cpqm-749x | In the Linux kernel, the following vulnerability has been resolved:btrfs: add a sanity check for btrfs root in btrfs_search_slot()Syzbot reports a null-ptr-deref in btrfs_search_slot().The reproducer is using rescue=ibadroots, and the extent tree root is
corrupted thus the extent tree is NULL.When scrub tries to search the extent tree to gather the needed extent
info, btrfs_search_slot() doesn't check if the target root is NULL or
not, resulting the null-ptr-deref.Add sanity check for btrfs root before using it in btrfs_search_slot(). | [] |
|
CVE-2021-21350 | XStream is vulnerable to an Arbitrary Code Execution attack | XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. | [
"cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_enterprise_default_management:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_virtual_account_management:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_virtual_account_management:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_virtual_account_management:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_activity_monitoring:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] |
GHSA-v8m7-8jc9-52rg | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2019-6821 | CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum. | [
"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_premium_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*"
] |
|
GHSA-rh24-q2xr-hfgm | In the Linux kernel, the following vulnerability has been resolved:gfs2: Fix slab-use-after-free in gfs2_qd_deallocIn gfs2_put_super(), whether withdrawn or not, the quota should
be cleaned up by gfs2_quota_cleanup().Otherwise, struct gfs2_sbd will be freed before gfs2_qd_dealloc (rcu
callback) has run for all gfs2_quota_data objects, resulting in
use-after-free.Also, gfs2_destroy_threads() and gfs2_quota_cleanup() is already called
by gfs2_make_fs_ro(), so in gfs2_put_super(), after calling
gfs2_make_fs_ro(), there is no need to call them again. | [] |
|
CVE-2024-46711 | mptcp: pm: fix ID 0 endp usage after multiple re-creations | In the Linux kernel, the following vulnerability has been resolved:
mptcp: pm: fix ID 0 endp usage after multiple re-creations
'local_addr_used' and 'add_addr_accepted' are decremented for addresses
not related to the initial subflow (ID0), because the source and
destination addresses of the initial subflows are known from the
beginning: they don't count as "additional local address being used" or
"ADD_ADDR being accepted".
It is then required not to increment them when the entrypoint used by
the initial subflow is removed and re-added during a connection. Without
this modification, this entrypoint cannot be removed and re-added more
than once. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*"
] |
GHSA-5686-6p98-r8f5 | The Physics Chemistry Biology Quiz (aka com.pdevsmcqs.pcbmcqseries) application 1.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2014-5698 | The Furdiburb (aka com.sheado.lite.pet) application 1.1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:sheado:furdiburb:1.1.2:*:*:*:*:android:*:*"
] |
|
GHSA-6w3v-66mj-2qm6 | Moderate severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j | A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected. An authentication of incoming AMQP connections in Apache Qpid Broker-J is performed by special entities called "Authentication Providers". Each Authentication Provider can support several SASL mechanisms which are offered to the connecting clients as part of SASL negotiation process. The client chooses the most appropriate SASL mechanism for authentication. Authentication Providers of following types supports PLAIN SASL mechanism: Plain, PlainPasswordFile, SimpleLDAP, Base64MD5PasswordFile, MD5, SCRAM-SHA-256, SCRAM-SHA-1. XOAUTH2 SASL mechanism is supported by Authentication Providers of type OAuth2. If an AMQP port is configured with any of these Authentication Providers, the Broker may be vulnerable. | [] |
CVE-2024-24708 | WordPress W3SPEEDSTER Plugin <= 7.19 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEEDSTER.This issue affects W3SPEEDSTER: from n/a through 7.19.
| [] |
GHSA-2q8g-m887-7m34 | In Gallagher Command Centre Server v8.10 prior to v8.10.1134(MR4), v8.00 prior to v8.00.1161(MR5), v7.90 prior to v7.90.991(MR5), v7.80 prior to v7.80.960(MR2) and v7.70 or earlier, an authenticated user connecting to OPCUA can view all data that would be replicated in a multi-server setup without privilege checks being applied. | [] |
|
GHSA-3x33-4vmh-52pp | Huawei USG5500 with software V300R001C00 and V300R001C00 allows attackers to bypass the anti-DDoS module of the USGs to cause a denial of service condition on the backend server. | [] |
|
GHSA-wf52-hx48-jm6v | vRealize Operations (vROps) contains a privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2. | [] |
|
CVE-2024-57019 | TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "limit" parameter in setVpnAccountCfg. | [] |
|
GHSA-6469-9hp8-4jpq | An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 13.2 and iPadOS 13.2, macOS Catalina 10.15.1. Improper URL processing may lead to data exfiltration. | [] |
|
CVE-2022-29226 | Trivial authentication bypass in Envoy | Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementation assumes that access tokens are always validated thus allowing access in the presence of any access token attached to the request. Users are advised to upgrade. There is no known workaround for this issue. | [
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
] |
GHSA-fm5r-92mg-2vjc | In TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 in the shadow.sample file, root is hardcoded in the firmware. | [] |
|
GHSA-j4ff-2v8v-prrg | Windows Graphics Component Elevation of Privilege Vulnerability | [] |
|
CVE-2024-7517 | Privileged escalation via crafted use of portcfg command | A command injection vulnerability in Brocade Fabric OS before 9.2.0c, and 9.2.1 through 9.2.1a on IP extension platforms could allow a local authenticated attacker to perform a privileged escalation via crafted use of the portcfg command.
This specific exploitation is only possible on IP Extension platforms: Brocade 7810, Brocade 7840, Brocade 7850 and on Brocade X6 or X7 directors with an SX-6 Extension blade installed. The attacker must be logged into the switch via SSH or serial console to conduct the attack. | [
"cpe:2.3:o:brocade:fabric_os:-:*:*:*:*:*:*:*"
] |
GHSA-cpvv-6mq2-5cpj | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Software LLC HTML Forms allows Stored XSS. This issue affects HTML Forms: from n/a through 1.5.2. | [] |
|
CVE-2013-4139 | The Stage File Proxy module 7.x-1.x before 7.x-1.4 for Drupal allows remote attackers to cause a denial of service (file operations performance degradation and failure) via a large number of requests. | [
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] |
|
GHSA-cg3q-59w7-rvc2 | Reliance on Cookies without Validation and Integrity Checking in getgrav/grav | grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability in one application to cause a compromise in another. | [] |
GHSA-72c6-gcpg-6rw3 | The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_CARD, allowing for an unauthenticated attacker to return the card value data of any user | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.