id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-hfqc-4v3r-3625 | The Restaurant Reservations plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the nd_rst_layout attribute of the nd_rst_search shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where an uploaded PHP file may not be directly accessible. | [] |
|
CVE-2006-5403 | Stack-based buffer overflow in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:symantec:automated_support_assistant:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*"
] |
|
GHSA-gc7q-7vg3-h8gf | Stored Cross-site Scripting vulnerability in Jenkins Promoted Builds (Simple) Plugin | Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name of custom promotion levels, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. | [] |
CVE-2020-7908 | In JetBrains TeamCity before 2019.1.5, reverse tabnabbing was possible on several pages. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] |
|
GHSA-rfwr-vfr5-h8m9 | SQL injection vulnerability in the Resend_Email module in Raven Web Services RavenNuke 2.30 allows remote authenticated administrators to execute arbitrary SQL commands via the user_prefix parameter to modules.php. | [] |
|
CVE-2022-2638 | Export All URLs < 4.4 - Admin+ Arbitrary System File Removal | The Export All URLs WordPress plugin before 4.4 does not validate the path of the file to be removed on the system which is supposed to be the CSV file. This could allow high privilege users to delete arbitrary file from the server | [
"cpe:2.3:a:atlasgondal:export_all_urls:*:*:*:*:*:wordpress:*:*"
] |
GHSA-mc4h-vfvq-mc75 | The CallCmd function in toolbar_gaming.dll in the Toolbar Gaming toolbar for Internet Explorer allows remote attackers to cause a denial of service (NULL dereference and browser crash) via unspecified vectors. | [] |
|
GHSA-858g-j2p9-j2xh | Windows Event Tracing Denial of Service Vulnerability. | [] |
|
GHSA-vjvm-4cfh-7m4p | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to embed Javascript code via /rhn/audit/scap/Search.do This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10. | [] |
|
GHSA-7396-j39w-87xq | Tungsten Automation Power PDF PDF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24480. | [] |
|
CVE-2025-1520 | PostHog ClickHouse Table Functions SQL Injection Remote Code Execution Vulnerability | PostHog ClickHouse Table Functions SQL Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of PostHog. Authentication is required to exploit this vulnerability.
The specific flaw exists within the implementation of the SQL parser. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the database account. Was ZDI-CAN-25350. | [] |
GHSA-xw4r-rf67-rf6g | Use of a hard-coded password for a database administrator account created during Wapro ERP installation allows an attacker to retrieve embedded sensitive data stored in the database. The password is same among all Wapro ERP installations. This issue affects Wapro ERP Desktop versions before 8.90.0. | [] |
|
GHSA-94w9-97p3-p368 | CSRF Token Reuse Vulnerability | A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an attacker to inject arbitrary values and forge malicious requests on behalf of a user. This vulnerability can allow an attacker to inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application.Vulnerability DetailsThe vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. The following issues were identified:**Token Injection**: For 'safe' methods, the token was extracted from the cookie and saved to storage without further validation or sanitization.**Lack of Token Association**: The CSRF token was validated against tokens in storage but not associated with a session, nor by using a Double Submit Cookie Method, allowing for token reuse.Specific Go Packages Affectedgithub.com/gofiber/fiber/v2/middleware/csrfRemediationTo remediate this vulnerability, it is recommended to take the following actions:**Update the Application**: Upgrade the application to a fixed version with a patch for the vulnerability.**Implement Proper CSRF Protection**: Review the updated documentation and ensure your application's CSRF protection mechanisms follow best practices.**Choose CSRF Protection Method**: Select the appropriate CSRF protection method based on your application's requirements, either the Double Submit Cookie method or the Synchronizer Token Pattern using sessions.**Security Testing**: Conduct a thorough security assessment, including penetration testing, to identify and address any other security vulnerabilities.Defence-in-depthUsers should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes. | [] |
GHSA-qxg3-x267-qjqv | The rs_ioctl function in drivers/char/amiserial.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | [] |
|
GHSA-hhj5-6fh2-3fp5 | The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerability. A potential attacker can redirect to different domain when using URL parameter with relative entry in the correct format | [] |
|
GHSA-v4q2-mprg-284p | Certain NETGEAR devices are affected by CSRF. This affects RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. | [] |
|
CVE-2017-18699 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R7800 before 1.0.2.40 and R9000 before 1.0.2.52. | [
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*"
] |
|
CVE-2011-1539 | Unspecified vulnerability in HP Proliant Support Pack (PSP) before 8.7 allows remote attackers to obtain sensitive information via unknown vectors. | [
"cpe:2.3:a:hp:proliant_support_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:proliant_support_pack:8.5:*:*:*:*:*:*:*"
] |
|
GHSA-fr6w-xj88-2fch | In the Secure File System in all Android releases from CAF using the Linux kernel, an Integer Overflow to Buffer Overflow vulnerability could potentially exist. | [] |
|
GHSA-rqc4-5489-hg7v | An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap. | [] |
|
GHSA-3g63-p2hp-v8xg | eshop.pl in WebDiscount(e)shop allows remote attackers to execute arbitrary commands via shell metacharacters in the seite parameter. | [] |
|
CVE-2021-38022 | Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-10131 | Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Primavera Products Suite (subcomponent: Web Access). Supported versions that are affected are 8.3, 8.4, 15.1, 15.2, 16.1 and 16.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Primavera P6 Enterprise Project Portfolio Management. CVSS 3.0 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L). | [
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.2:*:*:*:*:*:*:*"
] |
|
GHSA-mpgj-7qvh-h4r8 | Failure to sanitize input in the SSL VPN web portal of FortiOS 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, 6.4.0 through 6.4.4; and FortiProxy 1.2.0 through 1.2.9, 2.0.0 through 2.0.1 may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters. | [] |
|
CVE-2019-13563 | D-Link DIR-655 C devices before 3.02B05 BETA03 allow CSRF for the entire management console. | [
"cpe:2.3:o:dlink:dir-655_firmware:3.02b05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-655:c1:*:*:*:*:*:*:*"
] |
|
GHSA-5546-xcjq-x5xr | IBM QRadar Suite 1.10.12.0 through 1.10.17.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 279976. | [] |
|
GHSA-gpmc-p7f9-wcpr | The AnWP Football Leagues plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 0.16.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | [] |
|
CVE-2019-0861 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0810, CVE-2019-0812, CVE-2019-0829, CVE-2019-0860. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-41996 | Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key. | [
"cpe:2.3:a:diffie-hellman_key_exchange_project:diffie-hellman_key_exchange:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-1112 | Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive information by reading this file. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.4:*:*:*:*:*:*:*"
] |
|
CVE-2019-1842 | Cisco IOS XR Software Secure Shell Authentication Vulnerability | A vulnerability in the Secure Shell (SSH) authentication function of Cisco IOS XR Software could allow an authenticated, remote attacker to successfully log in to an affected device using two distinct usernames. The vulnerability is due to a logic error that may occur when certain sequences of actions are processed during an SSH login event on the affected device. An attacker could exploit this vulnerability by initiating an SSH session to the device with a specific sequence that presents the two usernames. A successful exploit could result in logging data misrepresentation, user enumeration, or, in certain circumstances, a command authorization bypass. See the Details section for more information. | [
"cpe:2.3:o:cisco:ios_xr_firmware:6.1.2.tools:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr_firmware:6.1.3.tools:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr_firmware:6.2.3.tools:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr_firmware:6.4.2.tools:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_16-slot_line_card_chassis:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_16-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_4-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_8-slot_line_card_chassis:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_8-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_fabric_card_chassis:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_line_card_chassis_\\(dual\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_line_card_chassis_\\(multi\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-1_multishelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-3_16-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-3_4-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-3_8-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-3_multishelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-8\\/s-b_crs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-8\\/scrs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-x_16-slot_single-shelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs-x_multishelf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_6008-8-slot_chassis:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:network_convergence_system_5508:-:*:*:*:*:*:*:*"
] |
GHSA-hp3g-p2p5-93pp | An issue has been discovered in GitLab DAST API scanner affecting all versions starting from 1.6.50 before 2.11.0, where Authorization headers was leaked in vulnerability report evidence. | [] |
|
GHSA-54x6-hj78-x95f | HPE System Management Homepage before 7.5.5 allows local users to obtain sensitive information or modify data via unspecified vectors. | [] |
|
CVE-2011-3884 | Google Chrome before 15.0.874.102 does not properly address timing issues during DOM traversal, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-5530 | The (1) pcmd and (2) pmlogger init scripts in Performance Co-Pilot (PCP) before 3.6.10 allow local users to overwrite arbitrary files via a symlink attack on a /var/tmp/##### temporary file. | [
"cpe:2.3:a:sgi:performance_co-pilot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:performance_co-pilot:3.6.8:*:*:*:*:*:*:*"
] |
|
CVE-2022-25936 | Versions of the package servst before 2.0.3 are vulnerable to Directory Traversal due to improper sanitization of the filePath variable.
| [
"cpe:2.3:a:servst_project:servst:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-j5rg-hrw2-2gf7 | A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the “file“ attribute, which in turn allowed the user to access files uploaded for other sources. | [] |
|
CVE-2024-21007 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-28971 | Paragon Active Assurance: Enabling the timescaledb enables IP forwarding | An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA's are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA's to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. The timescaledb feature is installed as an optional package on the Control Center. When the timescaledb container is started, this causes side-effects by bypassing the existing firewall rules and limitations for Test Agent communications. Note: This issue only affects customers hosting their own on-prem Control Center. The Paragon Active Assurance Software as a Service (SaaS) is not affected by this vulnerability since the timescaledb service is not enabled. This issue affects all on-prem versions of Juniper Networks Paragon Active Assurance prior to 4.1.2. | [
"cpe:2.3:a:juniper:paragon_active_assurance:*:*:*:*:*:*:*:*"
] |
CVE-2024-4905 | Kashipara College Management System view_students_each_detail.php sql injection | A vulnerability classified as critical has been found in Kashipara College Management System 1.0. Affected is an unknown function of the file view_students_each_detail.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-264438 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:kashipara:college_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-hg6r-jr74-wf49 | An issue was discovered in Oracle WebCenter Interaction Portal 10.3.3. The portal component is delivered with an insecure default User Profile community configuration that allows anonymous users to retrieve the account names of all portal users via /portal/server.pt/user/user/ requests. When WCI is synchronised with Active Directory (AD), this vulnerability can expose the account names of all AD users. NOTE: this CVE is assigned by MITRE and isn't validated by Oracle because Oracle WebCenter Interaction Portal is out of support. | [] |
|
GHSA-776g-qxh8-7652 | wchar.c in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted fpx image. | [] |
|
GHSA-9vh7-c87x-8q9v | A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in the Digital Phase Locked Loop (DPLL) subsystem in the Linux kernel. This issue could be exploited to trigger a denial of service. | [] |
|
GHSA-qfvq-m4vm-x9px | Multiple cross-site request forgery (CSRF) vulnerabilities on the TP-LINK WR1043N router with firmware TL-WR1043ND_V1_120405 allow remote attackers to hijack the authentication of administrators for requests that (1) enable FTP access (aka "FTP directory traversal") to /tmp via the shareEntire parameter to userRpm/NasFtpCfgRpm.htm, (2) change the FTP administrative password via the nas_admin_pwd parameter to userRpm/NasUserAdvRpm.htm, (3) enable FTP on the WAN interface via the internetA parameter to userRpm/NasFtpCfgRpm.htm, (4) launch the FTP service via the startFtp parameter to userRpm/NasFtpCfgRpm.htm, or (5) enable or disable bandwidth limits via the QoSCtrl parameter to userRpm/QoSCfgRpm.htm. | [] |
|
CVE-2020-15873 | In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php. | [
"cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-4535 | Cross-site scripting (XSS) vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php. | [
"cpe:2.3:a:import_legacy_media_project:import_legacy_media:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2025-24297 | Growatt Cloud portal Cross-site Scripting | Due to lack of server-side input validation, attackers can inject malicious JavaScript code into users personal spaces of the web portal. | [] |
GHSA-px9f-597f-wmcf | Uncontrolled Resource Consumption in Apache OpenMeetings server | If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0 | [] |
GHSA-843r-chv3-752m | freevo.real in freevo 1.8.1 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/*-#####.pid, (2) /tmp/freevo-gdb, (3) /tmp/freevo-gdb.sh, and (4) /tmp/*.stats temporary files. NOTE: this issue is only a vulnerability when a verbose debug mode is activated by modifying source code. | [] |
|
CVE-2007-1072 | The command line interface (CLI) in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier allows local users to obtain privileges or cause a denial of service via unspecified vectors. NOTE: this issue can be leveraged remotely via CVE-2007-1063. | [
"cpe:2.3:o:cisco:unified_ip_phone_firmware_7906g:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_firmware_7911g:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_firmware_7941g:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_firmware_7961g:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_firmware_7970g:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7970g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_firmware_7971g:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7971g:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-3134 | Cisco Email Security Appliance Zip Decompression Engine Denial of Service Vulnerability | A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of zip files. An attacker could exploit this vulnerability by sending an email message with a crafted zip-compressed attachment. A successful exploit could trigger a restart of the content-scanning process, causing a temporary DoS condition. This vulnerability affects Cisco AsyncOS Software for Cisco ESA releases earlier than 13.0. | [
"cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:*"
] |
CVE-2023-35802 | IQ Engine before 10.6r1 on Extreme Network AP devices has a Buffer Overflow in the implementation of the CAPWAP protocol that may be exploited to obtain elevated privileges to conduct remote code execution. Access to the internal management interface/subnet is required to conduct the exploit. | [
"cpe:2.3:o:extremenetworks:iq_engine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap122:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap150w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap3000x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap302w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap305c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap305c-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap305cx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap4000-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap410c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap410c-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap460c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap460s12c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap460s6c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap5010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap5050d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap5050u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap510c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap510cx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap650x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap1130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:extremenetworks:ap550:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-4080 | Cross-site scripting (XSS) vulnerability in index.php AlstraSoft E-Friends allows remote attackers to inject arbitrary web script or HTML via the p_id parameter in a people_card action. NOTE: this might overlap CVE-2006-2564. | [
"cpe:2.3:a:alstrasoft:e-friends:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-c2fh-m553-m5hp | The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f"). | [] |
|
CVE-2023-44019 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the mac parameter in the GetParentControlInfo function. | [
"cpe:2.3:o:tenda:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*",
"cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-37425 | The FILES directive inside a VM template allows execution of uploaded files when the template is instantiated, resulting in a Remote Code Execution (RCE) attack. | Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion. | [
"cpe:2.3:a:opennebula:opennebula:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
GHSA-325v-4jhh-rp36 | parisneo/lollms-webui, in its latest version, is vulnerable to remote code execution due to an insecure dependency on llama-cpp-python version llama_cpp_python-0.2.61+cpuavx2-cp311-cp311-manylinux_2_31_x86_64. The vulnerability arises from the application's 'binding_zoo' feature, which allows attackers to upload and interact with a malicious model file hosted on hugging-face, leading to remote code execution. The issue is linked to a known vulnerability in llama-cpp-python, CVE-2024-34359, which has not been patched in lollms-webui as of commit b454f40a. The vulnerability is exploitable through the application's handling of model files in the 'bindings_zoo' feature, specifically when processing gguf format model files. | [] |
|
CVE-2002-1369 | jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack. | [
"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2019-15256 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv1 Denial of Service Vulnerability | A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. The attacker does not need valid credentials to authenticate the VPN session, nor does the attacker's source address need to match a peer statement in the crypto map applied to the ingress interface of the affected device. An exploit could allow the attacker to exhaust system memory resources, leading to a reload of an affected device. | [
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5510_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5510_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5520_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5520_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5540_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5540_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5550_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5550_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:9.9\\(2.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:201.4\\(1.21\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*"
] |
GHSA-76w8-mqx4-wjrf | Doctrine DBAL SQL injection possibility | The identifier quoting in Doctrine DBAL has a potential security problem when user-input is passed into this function, making the security aspect of this functionality obsolete.
If you make use of AbstractPlatform::quoteIdentifier() or Doctrine::quoteIdentifier() please upgrade immediately. The ORM itself does not use identifier quoting in combination with user-input, however we still urge everyone to update to the latest version of DBAL. | [] |
GHSA-w549-9jg2-4px4 | In display drm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292593; Issue ID: ALPS07292593. | [] |
|
CVE-2023-7016 | Privilege Escalation in SafeNet Authentication Client | A flaw in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows allows an attacker to execute code at a SYSTEM level via local access. | [
"cpe:2.3:a:thalesgroup:safenet_authentication_client:*:*:*:*:*:*:*:*"
] |
GHSA-wmpm-fq7r-jq56 | Imporoper path validation in elFinder.NetCore | This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation. | [] |
CVE-2024-52063 | Potential stack buffer write overflow in Connext applications while parsing malicious XML types document | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45. | [] |
CVE-2017-7863 | FFmpeg before 2017-02-04 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-2948 | Multiple stack-based buffer overflows in stream/stream_cddb.c in MPlayer before 1.0rc1try3 allow remote attackers to execute arbitrary code via a CDDB entry with a long (1) album title or (2) category. | [
"cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*"
] |
|
CVE-2024-13290 | OhDear Integration - Moderately critical - Access bypass - SA-CONTRIB-2024-056 | Incorrect Authorization vulnerability in Drupal OhDear Integration allows Forceful Browsing.This issue affects OhDear Integration: from 0.0.0 before 2.0.4. | [] |
CVE-2021-34490 | Windows TCP/IP Driver Denial of Service Vulnerability | Windows TCP/IP Driver Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*"
] |
CVE-2025-3098 | Video Url <= 1.0.0.3 - Reflected Cross-Site Scripting | The Video Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.0.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
GHSA-wg5j-74wp-pwp4 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | [] |
|
GHSA-wcfr-wfm2-2rjm | An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability. | [] |
|
GHSA-f68h-hfqp-8rmv | Path Traversal in Crafter CMS Crafter Studio | Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system. | [] |
CVE-2022-1269 | Fast Flow < 1.2.12 - Reflected Cross-Site Scripting | The Fast Flow WordPress plugin before 1.2.12 does not sanitise and escape the page parameter before outputting back in an attribute in an admin dashboard, leading to a Reflected Cross-Site Scripting | [
"cpe:2.3:a:fastflow:fastflow:*:*:*:*:*:wordpress:*:*"
] |
GHSA-vw58-48c5-wrpp | IBM Financial Transaction Manager for High Value Payments for Multi-Platform 3.2.0 through 3.2.10 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 183329. | [] |
|
CVE-2018-1153 | Burp Suite Community Edition 1.7.32 and 1.7.33 fail to validate the server certificate in a couple of HTTPS requests which allows a man in the middle to modify or view traffic. | [
"cpe:2.3:a:portswigger:burp_suite:1.7.32:*:*:*:community:*:*:*",
"cpe:2.3:a:portswigger:burp_suite:1.7.33:*:*:*:community:*:*:*"
] |
|
GHSA-q684-cq3q-r3gp | WordPress before 5.5.2 allows XSS associated with global variables. | [] |
|
GHSA-6mg9-mh84-wmf3 | The kingcomposer plugin 2.7.6 for WordPress has wp-admin/admin.php?page=kc-mapper id XSS. | [] |
|
CVE-2008-2289 | Unspecified vulnerability in a tooltip element in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 allows local users to gain privileges via unknown attack vectors. | [
"cpe:2.3:a:symantec:altiris_deployment_solution:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.5.248:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.5.299:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8.378:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8.380.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8_sp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.9.164:*:*:*:*:*:*:*"
] |
|
CVE-2016-5465 | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53, 8.54, and 8.55 allows remote attackers to affect confidentiality and integrity via vectors related to Panel Processor. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"
] |
|
CVE-2014-4420 | The network-statistics interface in the kernel in Apple iOS before 8 and Apple TV before 7 does not properly initialize memory, which allows attackers to obtain sensitive memory-content and memory-layout information via a crafted application, a different vulnerability than CVE-2014-4371, CVE-2014-4419, and CVE-2014-4421. | [
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-7287 | An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop). | [
"cpe:2.3:a:digium:asterisk:15.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:15.2.1:*:*:*:*:*:*:*"
] |
|
GHSA-3937-g562-gx7p | Stack-based buffer overflow in News File Grabber 4.1.0.1 and earlier allows remote attackers to execute arbitrary code via a .nzb file with a long subject field. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-73jj-2jmw-g8c4 | In btu_hcif_pin_code_request_evt, btu_hcif_link_key_request_evt, and btu_hcif_link_key_notification_evt of btu_hcif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure via compromised device firmware with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142638492 | [] |
|
CVE-2023-26328 | ZDI-CAN-20212: Adobe Dimension USD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2005-0786 | SQL injection vulnerability in gb_new.inc in SimpGB allows remote attackers to execute arbitrary SQL commands via the quote parameter to guestbook.php. | [
"cpe:2.3:a:simpgb:simpgb:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-20777 | Cisco Enterprise NFV Infrastructure Software Vulnerabilities | Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the root level, or leak system data from the host to the VM. For more information about these vulnerabilities, see the Details section of this advisory. | [
"cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*"
] |
GHSA-r5f2-9rjc-r66m | Philips SureSigns VS4, A.07.107 and prior. When an actor claims to have a given identity, the software does not prove or insufficiently proves the claim is correct. | [] |
|
CVE-2013-1664 | The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack. | [
"cpe:2.3:a:openstack:cinder_folsom:-:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:compute_\\(nova\\)_essex:-:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:compute_\\(nova\\)_folsom:-:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:folsom:-:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:grizzly:-:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:keystone_essex:-:*:*:*:*:*:*:*"
] |
|
GHSA-452r-p733-r4gh | In gnss, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08580200; Issue ID: ALPS08580200. | [] |
|
CVE-2022-40404 | Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php. | [
"cpe:2.3:a:wedding_planner_project:wedding_planner:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-22fc-mghg-jrwm | An integer overflow or wraparound vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network.We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and later
QuTS hero h5.1.3.2578 build 20231110 and later
QuTScloud c5.1.5.2651 and later | [] |
|
GHSA-3wmv-7php-rhg5 | Jenkins Vulnerable to Cross-Site Request Forgery (CSRF) Attack | Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack. | [] |
CVE-2023-39107 | An arbitrary file overwrite vulnerability in NoMachine Free Edition and Enterprise Client for macOS before v8.8.1 allows attackers to overwrite root-owned files by using hardlinks. | [
"cpe:2.3:a:nomachine:enterprise_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nomachine:free_edition:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nomachine:nomachine:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] |
|
GHSA-4c6r-jh44-7f3r | Savant Webserver 3.1 allows remote attackers to cause a denial of service (crash) via an HTTP GET request with a negative Content-Length value. | [] |
|
CVE-2008-6198 | SQL injection vulnerability in pages.php in Custom Pages 1.0 plugin for MyBulletinBoard (MyBB) allows remote attackers to execute arbitrary SQL commands via the page parameter. | [
"cpe:2.3:a:mybboard:mybb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mybboard:custom_pages_plugin:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-9364 | In the LG LAF component, there is a special command that allowed modification of certain partitions. This could lead to bypass of secure boot. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-455f-vj25-j86c | HCL Workload Automation is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. | [] |
|
CVE-2018-17832 | XSS exists in WUZHI CMS 2.0 via the index.php v or f parameter. | [
"cpe:2.3:a:wuzhicms:wuzhi_cms:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-jwpw-2pjx-j868 | Sync Framework in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows remote attackers to cause a denial of service (SyncShareSvc service outage) via crafted "change batch" data, aka "Windows DLL Loading Denial of Service Vulnerability." | [] |
|
CVE-2011-3864 | Cross-site scripting (XSS) vulnerability in the The Erudite theme before 2.7.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cpage parameter. | [
"cpe:2.3:a:somadesign:the_erudite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:somadesign:the_erudite:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.