Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2022-30653
Adobe InCopy Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Adobe InCopy versions 17.2 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-3899-4f66-wx7p
An Arbitrary File Upload in the Upload Image component in SourceCodester Online Library Management System 1.0 allows the user to conduct remote code execution via admin/borrower/index.php?view=add because .php files can be uploaded to admin/borrower/photos (under the web root).
[]
CVE-2022-35701
Adobe Bridge SVG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-h2v6-g6vj-68hg
Pragma FortressSSH 5.0 Build 4 Revision 293 and earlier handles long input to sshd.exe by creating an error-message window and waiting for the administrator to click in this window before terminating the sshd.exe process, which allows remote attackers to cause a denial of service (connection slot exhaustion) via a flood of SSH connections with long data objects, as demonstrated by (1) a long list of keys and (2) a long username.
[]
GHSA-8h2w-mrjw-fq93
The WordPress Button Plugin MaxButtons WordPress plugin before 9.7.8 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks
[]
CVE-2021-43023
Adobe Premiere Rush EPS/TIFF File Memory Corruption Remote Code Execution
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EPS/TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[ "cpe:2.3:a:adobe:premiere_rush:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2022-42993
Password Storage Application v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Setup page.
[ "cpe:2.3:a:password_storage_application_project:password_storage_application:1.0:*:*:*:*:*:*:*" ]
GHSA-8rgg-6f9q-2rcx
When SWFTools 0.9.2 processes a crafted file in swfcombine, it can lead to a NULL Pointer Dereference in the swf_Relocate() function in lib/modules/swftools.c.
[]
GHSA-367v-cj33-9229
The Cobham EXPLORER 710, firmware version 1.07, does not validate its firmware image. Development scripts left in the firmware can be used to upload a custom firmware image that the device runs. This could allow an unauthenticated, local attacker to upload their own firmware that could be used to intercept or modify traffic, spoof or intercept GPS traffic, exfiltrate private data, hide a backdoor, or cause a denial-of-service.
[]
GHSA-8h78-cp55-65qp
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
[]
CVE-2018-4889
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the XPS image conversion. A successful attack can lead to sensitive data exposure.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
GHSA-rcr7-p7pf-h84m
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, remote attackers can cause a denial of service (NULL pointer dereference and application crash) against directory authorities via a malformed descriptor, aka TROVE-2017-010.
[]
GHSA-fwqr-3pvp-pjwq
Deserialization of Untrusted Data in Jenkins
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
[]
GHSA-f43q-2fwm-h7gr
A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
[]
CVE-2020-25143
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. This can occur via /ajax/device_entities.php?entity_type=netscalervsvr&device_id[]= because of /ajax/device_entities.php.
[ "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:community:*:*:*", "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:enterprise:*:*:*", "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:professional:*:*:*" ]
GHSA-3mx4-39m2-w2c8
Multiple SQL injection vulnerabilities in PhotoPost PHP Pro 4.6.x and earlier allow remote attackers to gain users' passwords via the (1) photo parameter to addfav.php, (2) photo parameter to comments.php, (3) credit parameter to comments.php, (4) cat parameter to index.php, (5) ppuser parameter to showgallery.php, (6) cat parameter to showgallery.php, (7) cat parameter to uploadphoto.php, (8) albumid parameter to useralbums.php, or (9) albumid parameter to useralbums.php.
[]
GHSA-628p-46mw-v4f9
The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server.
[]
CVE-2005-2609
index.php in VegaDNS 0.8.1, 0.9.8, and possibly other versions, allows remote attackers to obtain the full server path via an invalid VDNS_Sessid parameter.
[ "cpe:2.3:a:vegadns:vegadns:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:vegadns:vegadns:0.9.8:*:*:*:*:*:*:*" ]
GHSA-frfj-qx44-ggmv
The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time.
[]
CVE-2008-3301
Multiple cross-site scripting (XSS) vulnerabilities in BilboBlog 0.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via the (1) content parameter to admin/update.php, related to conflicting code in widget.php; and allow remote attackers to inject arbitrary web script or HTML via the (2) titleId parameter to head.php, reachable through index.php; the (3) t_lang[lang_copyright] parameter to footer.php; the (4) content parameter to the default URI under admin/; the (5) url, (6) t_lang[lang_admin_help], (7) t_lang[lang_admin_clear_cache], (8) t_lang[lang_admin_home], and (9) t_lang[lang_admin_logout] parameters to admin/homelink.php; and the (10) t_lang[lang_admin_new_post] parameter to admin/post.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:tuxplanet:bilboblog:0.2.1:*:*:*:*:*:*:*" ]
CVE-2016-1954
The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*" ]
CVE-2025-31548
WordPress Ultimate Push Notifications plugin <= 1.1.8 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M. Tuhin Ultimate Push Notifications allows Reflected XSS. This issue affects Ultimate Push Notifications: from n/a through 1.1.8.
[]
CVE-2018-17637
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the loadXML method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6473.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-83vx-xm77-c4mm
Server-Side Request Forgery (SSRF) vulnerability in Group Arge Energy and Control Systems Smartpower Web allows : Server Side Request Forgery.This issue affects Smartpower Web: before 23.01.01.
[]
CVE-2024-13505
Survey Maker <= 5.1.3.3 - Authenticated (Admin+) Stored Cross-Site Scripting via Survey Question
The Survey Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ays_sections[5][questions][8][title]’ parameter in all versions up to, and including, 5.1.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
CVE-2007-6159
SQL injection vulnerability in index.php in Tilde CMS 4.x and earlier allows remote attackers to execute arbitrary SQL commands via the aarstal parameter in a yeardetail action, a different vector than CVE-2006-1500.
[ "cpe:2.3:a:tilde:tilde_cms:4.0:*:*:*:*:*:*:*" ]
GHSA-wghf-mhcc-gjh8
A vulnerability in the key store of Cisco Application Services Engine Software could allow an authenticated, local attacker to read sensitive information of other users on an affected device. The vulnerability is due to insufficient authorization limitations. An attacker could exploit this vulnerability by logging in to an affected device locally with valid credentials. A successful exploit could allow the attacker to read the sensitive information of other users on the affected device.
[]
CVE-2020-10041
A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). A stored Cross-Site-Scripting (XSS) vulnerability is present in different locations of the web application. An attacker might be able to take over a session of a legitimate user.
[ "cpe:2.3:o:siemens:sicam_mmu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sicam_mmu:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sicam_sgu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sicam_sgu:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sicam_t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sicam_t:-:*:*:*:*:*:*:*" ]
GHSA-xchm-4wgc-jp23
Cross-site scripting (XSS) vulnerability in index.php in Pagetool 1.0.7 allows remote attackers to inject arbitrary web script or HTML via the search_term parameter in a pagetool_search action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
GHSA-g5ff-j87h-3cwg
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
[]
GHSA-3w2w-73h7-hq3v
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.
[]
CVE-2005-2329
MRV Communications In-Reach LX-8000S, LX-4000S, and LX-1000S 3.5.0, when using SSH public key authentication, does not properly restrict access to ports, which allows remote authenticated users to access the consoles of other users.
[ "cpe:2.3:h:mrv_communications:in_reach_lx_1000s:3.5:*:*:*:*:*:*:*", "cpe:2.3:h:mrv_communications:in_reach_lx_4000s:3.5:*:*:*:*:*:*:*", "cpe:2.3:h:mrv_communications:in_reach_lx_8000s:3.5:*:*:*:*:*:*:*" ]
GHSA-2cgp-h7jq-hhwj
A missing authentication for a critical function vulnerability in Fortinet FortiSOAR 6.4.0 - 6.4.4 and 7.0.0 - 7.0.3 and 7.2.0 allows an attacker to disclose information via logging into the database using a privileged account without a password.
[]
GHSA-589w-hccm-265x
Inline attribute values were not processed.
ImpactInline attributes have not been processed escape. If the data that came from users was not processed, then an XSS vulnerability is possiblePatchesFixed in 9.4.4
[]
GHSA-6q6m-j9j3-cpq4
Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the organization information of the information receiver that is set as "non-disclosure" in the information provision operation.
[]
GHSA-7v88-g335-x4p8
Cross-site request forgery (CSRF) vulnerability in the management console (openshift-console/app/controllers/application_controller.rb) in OpenShift 0.0.5 allows remote attackers to hijack the authentication of arbitrary users via unspecified vectors.
[]
CVE-2019-11759
An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" ]
CVE-2023-22790
Authenticated Remote Command Execution in Aruba InstantOS or ArubaOS 10 Command Line Interface
Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
[ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*" ]
CVE-2019-4323
"HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame."
[ "cpe:2.3:a:hcltech:appscan:*:*:*:*:enterprise:*:*:*" ]
CVE-2014-7746
The Fusion Flowers - Weddings (aka com.triactivemedia.fusionweddings) application @7F0801AA for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:pocketmags:fusion_flowers_-_weddings:\\@7f0801aa:*:*:*:*:android:*:*" ]
GHSA-772w-c7mm-w6x3
An uninitialized pointer information disclosure vulnerability in Trend Micro Mobile Security (Enterprise) versions 9.7 and below could allow an unauthenticated remote attacker to disclosure sensitive information on a vulnerable system.
[]
CVE-2022-40709
An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707 and 40708.
[ "cpe:2.3:a:trendmicro:deep_security_agent:20.0:-:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1337:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1559:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update158:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update167:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1681:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update173:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update180:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update182:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1822:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update183:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1876:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update190:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update198:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2009:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update208:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update213:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2204:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update223:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update224:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2419:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2593:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2740:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2921:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3165:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3288:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3445:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3530:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3771:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3964:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4185:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4416:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4726:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4959:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5137:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:20.0:update877:*:*:long_term_support:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-23rp-cxj2-cgcm
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is stored XSS on the issue details screen.
[]
CVE-2024-56497
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiMail versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.6 and 6.4.0 through 6.4.7, FortiRecorder versions 7.0.0 and 6.4.0 through 6.4.4 allows attacker to execute unauthorized code or commands via the CLI.
[ "cpe:2.3:a:fortinet:fortimail:7.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortirecorder:6.4.0:*:*:*:*:*:*:*" ]
CVE-2017-6695
A vulnerability in the ConfD server in Cisco Ultra Services Platform could allow an authenticated, local attacker to view sensitive information. More Information: CSCvd29398. Known Affected Releases: 21.0.v0.65839.
[ "cpe:2.3:a:cisco:ultra_services_platform:21.0.v0.65839:*:*:*:*:*:*:*" ]
GHSA-cm43-r3rm-9rjm
Cybozu Garoon 3.5.0 to 4.6.1 allows remote authenticated attackers to bypass access restriction to view the closed title of "Cabinet" via unspecified vectors.
[]
CVE-2013-4027
IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 through 7.1.1.12, and 7.5 before 7.5.0.5 allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*" ]
CVE-2015-4771
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to RBR.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
CVE-2023-23039
An issue was discovered in the Linux kernel through 6.2.0-rc2. drivers/tty/vcc.c has a race condition and resultant use-after-free if a physically proximate attacker removes a VCC device while calling open(), aka a race condition between vcc_open() and vcc_remove().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.2.0:rc2:*:*:*:*:*:*" ]
CVE-2014-3954
Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message.
[ "cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.1:p5:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:-:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:prerelease:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:rc2:*:*:*:*:*:*" ]
CVE-2024-29030
memos vulnerable to an SSRF in /api/resource
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.
[ "cpe:2.3:a:memos:memos:0.13.2:*:*:*:*:*:*:*" ]
GHSA-3xgx-r9j4-qw9w
Prototype Pollution in Dexie
Dexie is a minimalistic wrapper for IndexedDB. The package dexie before 3.2.2, from 4.0.0-alpha.1 and before 4.0.0-alpha.3 are vulnerable to Prototype Pollution in the Dexie.setByKeyPath(obj, keyPath, value) function which does not properly check the keys being set (like __proto__ or constructor). This can allow an attacker to add/modify properties of the Object.prototype leading to prototype pollution vulnerability. **Note:** This vulnerability can occur in multiple ways, for example when modifying a collection with untrusted user input.
[]
CVE-2024-13962
Link Following Local Privilege Escalation Vulnerability in Avast Cleanup Premium Version 24.2.16593.17810
Link Following Local Privilege Escalation Vulnerability in TuneupSvc in Gen Digital Inc. Avast Cleanup Premium Version 24.2.16593.17810 on Windows 10 Pro x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.
[]
GHSA-25vq-j8q6-c4xv
Improper component protection vulnerability in SmsViewerActivity of Samsung Message prior to SMR July-2021 Release 1 allows untrusted applications to access Message files.
[]
CVE-2024-43545
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
GHSA-83qw-p55q-p84m
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2024-41904
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application do not properly enforce restriction of excessive authentication attempts. This could allow an unauthenticated attacker to conduct brute force attacks against legitimate user credentials or keys.
[ "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*" ]
GHSA-9ccp-4gjg-264g
fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API.Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
[]
GHSA-4wg8-rfwp-7xcc
Cross-Site Request Forgery (CSRF) vulnerability in XootiX Side Cart Woocommerce (Ajax) < 2.1 versions.
[]
GHSA-wj3v-xf5x-h93w
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
GHSA-549h-r7g9-2qpf
n158 vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function
All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function.**Note:**To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
[]
CVE-2006-4980
Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.
[ "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*" ]
GHSA-g4f6-2gjc-8j6w
OSIsoft PI AF Server before 2016 2.8.0 allows remote authenticated users to cause a denial of service (service outage) via a message.
[]
GHSA-p7g7-h68c-47c2
This issue was addressed with improved checks. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to modify protected parts of the file system.
[]
GHSA-8x5v-8988-73v9
X-Pack Security versions 6.2.0, 6.2.1, and 6.2.2 are vulnerable to a user impersonation attack via incorrect XML canonicalization and DOM traversal. An attacker might have been able to impersonate a legitimate user if the SAML Identity Provider allows for self registration with arbitrary identifiers and the attacker can register an account which an identifier that shares a suffix with a legitimate account. Both of those conditions must be true in order to exploit this flaw.
[]
CVE-2019-1010008
OpenEnergyMonitor Project Emoncms 9.8.8 is affected by: Cross Site Scripting (XSS). The impact is: Theoretically low, but might potentially enable persistent XSS (user could embed mal. code). The component is: Javascript code execution in "Name", "Location", "Bio" and "Starting Page" fields in the "My Account" page. File: Lib/listjs/list.js, line 67. The attack vector is: unknown, victim must open profile page if persistent was possible.
[ "cpe:2.3:a:openenergymonitor:emoncms:9.8.8:*:*:*:*:*:*:*" ]
GHSA-h5f7-fgcg-w683
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.
[]
CVE-2004-0622
Apple Mac OS X 10.3.4, 10.4, 10.5, and possibly other versions does not properly clear memory for login (aka Loginwindow.app), Keychain, or FileVault passwords, which could allow the root user or an attacker with physical access to obtain sensitive information by reading memory.
[ "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*" ]
CVE-2023-25801
TensorFlow has double free in Fractional(Max/Avg)Pool
TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
CVE-2023-23718
WordPress Page Loading Effects Plugin <= 2.0.0 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Esstat17 Page Loading Effects plugin <= 2.0.0 versions.
[ "cpe:2.3:a:page_loading_effects_project:page_loading_effects:*:*:*:*:*:wordpress:*:*" ]
GHSA-xrx6-fmxq-rjj2
Timing attacks in python-rsa
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA
[]
CVE-2024-48224
Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile.
[ "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*" ]
CVE-2022-33744
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
CVE-2015-1670
The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, allows remote attackers to obtain sensitive information from process memory via a crafted OpenType font on a web site, aka "OpenType Font Parsing Vulnerability."
[ "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*" ]
CVE-2024-53672
Authenticated Remote Command Injection in HPE Aruba Networking ClearPass Policy Manager Web-Based Management Interface
A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system.
[]
GHSA-rgw7-5ch6-xw8x
Untrusted search path vulnerability in HYPER SBI Ver. 2.2 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[]
CVE-2016-3960
Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
[ "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*" ]
CVE-2019-12855
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
[ "cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:*" ]
GHSA-3mrr-cw9q-727m
Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.
[]
CVE-2017-12844
Cross-site scripting (XSS) vulnerability in the admin panel in IceWarp Mail Server 10.4.4 allows remote authenticated domain administrators to inject arbitrary web script or HTML via a crafted user name.
[ "cpe:2.3:a:icewarp:mail_server:10.4.4:*:*:*:*:*:*:*" ]
GHSA-8hc9-25rc-xh43
The Clever Fox – One Click Website Importer by Nayra Themes plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'clever-fox-activate-theme' function in all versions up to, and including, 25.2.0. This makes it possible for authenticated attackers, with subscriber access and above, to modify the active theme, including to an invalid value which can take down the site.
[]
CVE-2018-14443
get_first_owned_object in dwg.c in GNU LibreDWG 0.5.1036 allows remote attackers to cause a denial of service (SEGV).
[ "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*" ]
GHSA-cjwm-hvhx-qxpm
IBM DS8900F HMC 89.21.19.0, 89.21.31.0, 89.30.68.0, 89.32.40.0, and 89.33.48.0 could allow an authenticated user to arbitrarily delete a file. IBM X-Force ID: 269406.
[]
GHSA-24pg-vq4j-g2g2
D-Link Go-RT-AC750 GORTAC750_revA_v101b03 & GO-RT-AC750_revB_FWv200b02 is vulnerable to Buffer Overflow via authenticationcgi_main.
[]
CVE-2015-0543
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:emc:secure_remote_services:3.02:*:*:*:virtual:*:*:*", "cpe:2.3:a:emc:secure_remote_services:3.03:*:*:*:virtual:*:*:*", "cpe:2.3:a:emc:secure_remote_services:3.04:*:*:*:virtual:*:*:*" ]
GHSA-pcg2-4fqf-rwm2
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 federated server is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 283813.
[]
CVE-2020-3360
Cisco IP Phones Series 7800 and Series 8800 Call Log Information Disclosure Vulnerability
A vulnerability in the Web Access feature of Cisco IP Phones Series 7800 and Series 8800 could allow an unauthenticated, remote attacker to view sensitive information on an affected device. The vulnerability is due to improper access controls on the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending malicious requests to the device, which could allow the attacker to bypass access restrictions. A successful attack could allow the attacker to view sensitive information, including device call logs that contain names, usernames, and phone numbers of users of the device.
[ "cpe:2.3:o:cisco:unified_ip_phone_6901_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_6901:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_6961_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_6961:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_6945_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_6945:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_6941_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_6941:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_6921_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_6921:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_6911_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_6911:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7832_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7832:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7861_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7861:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7841_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7841:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7821_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7821:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7811_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7811:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7937g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7937g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7975g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7975g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7965g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7965g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7962g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7962g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7961g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7960g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7960g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7945g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7945g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7942g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7942g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7941g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7940g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7940g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7931g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7931g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7911g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_7906g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8811_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8811:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8841_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8841:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8845_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8845:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8851_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8851:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8851nr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8851nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8861_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8861:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8865_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8865:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8865nr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8865nr:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8961_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8961:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8945_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8945:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_8941_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_8941:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_9971_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_9971:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:unified_ip_phone_9951_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_ip_phone_9951:-:*:*:*:*:*:*:*" ]
CVE-2019-11825
Cross-site scripting (XSS) vulnerability in Event Editor in Synology Calendar before 2.3.0-0615 allows remote attackers to inject arbitrary web script or HTML via the title parameter.
[ "cpe:2.3:a:synology:calendar:*:*:*:*:*:*:*:*" ]
GHSA-c665-4pj5-3qjq
In the Linux kernel, the following vulnerability has been resolved:nvme: fix a possible use-after-free in controller reset during loadUnlike .queue_rq, in .submit_async_event drivers may not check the ctrl readiness for AER submission. This may lead to a use-after-free condition that was observed with nvme-tcp.The race condition may happen in the following scenario:driver executes its reset_ctrl_work-> nvme_stop_ctrl - flushes ctrl async_event_workctrl sends AEN which is received by the host, which in turn schedules AEN handlingteardown admin queue (which releases the queue socket)AEN processed, submits another AER, calling the driver to submitdriver attempts to send the cmd ==> use-after-freeIn order to fix that, add ctrl state check to validate the ctrl is actually able to accept the AER submission.This addresses the above race in controller resets because the driver during teardown should:change ctrl state to RESETTINGflush async_event_work (as well as other async work elements)So after 1,2, any other AER command will find the ctrl state to be RESETTING and bail out without submitting the AER.
[]
CVE-2022-43437
HWA JIUH DIGITAL TECHNOLOGY LTD. EasyTest - SQL Injection
The Download function’s parameter of EasyTest has insufficient validation for user input. A remote attacker authenticated as a general user can inject arbitrary SQL command to access, modify or delete database.
[ "cpe:2.3:a:easy_test_project:easy_test:17l18s:*:*:*:*:*:*:*" ]
CVE-2016-2296
Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited does not require authentication for "post-admin" login pages, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors.
[ "cpe:2.3:a:meteocontrol:web\\'log_basic_100:-:*:*:*:*:*:*:*", "cpe:2.3:a:meteocontrol:web\\'log_light:-:*:*:*:*:*:*:*", "cpe:2.3:a:meteocontrol:web\\'log_pro:-:*:*:*:*:*:*:*", "cpe:2.3:a:meteocontrol:web\\'log_pro_unlimited:-:*:*:*:*:*:*:*" ]
GHSA-4wjh-xmxc-5vrf
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMapDelDevice.
[]
CVE-2013-2352
LeftHand OS (aka SAN iQ) 10.5 and earlier on HP StoreVirtual Storage devices does not provide a mechanism for disabling the HP Support challenge-response root-login feature, which makes it easier for remote attackers to obtain administrative access by leveraging knowledge of an unused one-time password.
[ "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:10.0:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_2950:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:dl320s:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:lefthand_nsm2060:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:lefthand_nsm2060_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:lefthand_nsm2120_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:lefthand_vsa:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p4000_vsa:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p4300:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p4300_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p4500:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p4500_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:p4900_g2:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:storevirtual_4130:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:storevirtual_4330:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:storevirtual_4530:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:storevirtual_4630:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:storevirtual_4730:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:storevirtual_vsa:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:x3650:*:*:*:*:*:*:*:*" ]
CVE-2011-2939
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
[ "cpe:2.3:a:dan_kogai:encode_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.25:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.26:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.28:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.30:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.31:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.32:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.33:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.50:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.53:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.54:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.55:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.56:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.57:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.58:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.59:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.60:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.61:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.62:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.63:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.64:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.65:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.66:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.67:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.68:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.69:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.70:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.71:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.72:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.73:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.74:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.75:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.76:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.77:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.78:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.79:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.80:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.81:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.82:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.83:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.84:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.85:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.86:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.87:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.88:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.89:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.90:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.91:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.92:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.93:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.94:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.95:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.96:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.97:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.98:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:1.99:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.06:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.07:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.08:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.09:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.26:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.27:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.28:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.29:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.30:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.31:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.32:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.33:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.34:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.35:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.36:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.37:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.38:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.39:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.40:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.41:*:*:*:*:*:*:*", "cpe:2.3:a:dan_kogai:encode_module:2.42:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*" ]
CVE-2023-28668
Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.
[ "cpe:2.3:a:jenkins:role-based_authorization_strategy:*:*:*:*:*:jenkins:*:*" ]
CVE-2015-5063
Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe CMS & Framework 3.1.13 allow remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter to install.php.
[ "cpe:2.3:a:silverstripe:silverstripe:3.1.13:*:*:*:*:*:*:*" ]
CVE-2024-2432
GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race condition.
[ "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*" ]
GHSA-h8rj-9vpc-9rgc
An improper export vulnerability was reported in the Motorola Services Main application that could allow a local attacker to write to a local database.
[]
CVE-2011-4487
SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) with software 6.x and 7.x before 7.1(5b)su5, 8.0 before 8.0(3a)su3, and 8.5 and 8.6 before 8.6(2a)su1 and Cisco Business Edition 3000 with software before 8.6.3 and 5000 and 6000 with software before 8.6(2a)su1 allows remote attackers to execute arbitrary SQL commands via a crafted SCCP registration, aka Bug ID CSCtu73538.
[ "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4a\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_3000_software:8.6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_3000_software:8.6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_3000_software:8.6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_3000_software:8.6.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_edition_3000:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_5000_software:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_5000_software:8.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_5000_software:8.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_edition_5000:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1-2011o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_edition_6000:-:*:*:*:*:*:*:*" ]
GHSA-j89g-jw24-w7m8
An issue was discovered in Squiz Matrix before 5.3.6.1 and 5.4.x before 5.4.1.3. Authenticated users with permissions to edit design assets can cause Remote Code Execution (RCE) via a maliciously crafted time_format tag.
[]