id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2020-25260 | An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. It allows remote attackers to execute arbitrary code because of unsafe JSON deserialization. | [
"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-8507 | The Citytv Video application 4.08.0 for Android and 3.35 for iOS sends Unencrypted Analytics. | [
"cpe:2.3:a:rogersmedia:citytv_video:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:rogersmedia:citytv_video:*:*:*:*:*:android:*:*"
] |
|
GHSA-rxfc-qf5w-jx85 | PHP remote file inclusion vulnerability in admin_rebuild_search.php in phpbb_wordsearch allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [] |
|
CVE-2025-28936 | WordPress Lunar plugin <= 1.3.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sakurapixel Lunar allows Stored XSS. This issue affects Lunar: from n/a through 1.3.0. | [] |
CVE-2024-46054 | OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /upload route is accessible without authentication, allowing any user to upload files. | [
"cpe:2.3:a:openvidreview_project:openvidreview:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2013-3734 | The Embedded Jopr component in JBoss Application Server includes the cleartext datasource password in unspecified HTML responses, which might allow (1) man-in-the-middle attackers to obtain sensitive information by leveraging failure to use SSL or (2) attackers to obtain sensitive information by reading the HTML source code. NOTE: the vendor says that this does not cross a trust boundary and that it is recommended best-practice that SSL is configured for the administrative console | [
"cpe:2.3:a:redhat:jboss_application_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-62cf-28f6-qqmv | OSRAM SYLVANIA Osram Lightify Home through 2016-07-26 allows Zigbee replay. | [] |
|
GHSA-5jqp-885w-xj32 | pymatgen is vulnerable to Regular Expression Denial of Service (ReDoS) | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the pymatgen PyPI package, when an attacker is able to supply arbitrary input to the `GaussianInput.from_string` method. | [] |
GHSA-q4qv-28j2-p7m2 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | [] |
|
CVE-2022-46880 | A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.<br />*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR < 102.6, Firefox < 105, and Thunderbird < 102.6. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
CVE-2010-1518 | Array index error in the SetDLInfo method in the GIGABYTE Dldrv2 ActiveX control 1.4.206.11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via the item argument. | [
"cpe:2.3:a:gigabyte:dldrv2_activex_control:1.4.206.11:*:*:*:*:*:*:*"
] |
|
CVE-2024-57946 | virtio-blk: don't keep queue frozen during system suspend | In the Linux kernel, the following vulnerability has been resolved:
virtio-blk: don't keep queue frozen during system suspend
Commit 4ce6e2db00de ("virtio-blk: Ensure no requests in virtqueues before
deleting vqs.") replaces queue quiesce with queue freeze in virtio-blk's
PM callbacks. And the motivation is to drain inflight IOs before suspending.
block layer's queue freeze looks very handy, but it is also easy to cause
deadlock, such as, any attempt to call into bio_queue_enter() may run into
deadlock if the queue is frozen in current context. There are all kinds
of ->suspend() called in suspend context, so keeping queue frozen in the
whole suspend context isn't one good idea. And Marek reported lockdep
warning[1] caused by virtio-blk's freeze queue in virtblk_freeze().
[1] https://lore.kernel.org/linux-block/[email protected]/
Given the motivation is to drain in-flight IOs, it can be done by calling
freeze & unfreeze, meantime restore to previous behavior by keeping queue
quiesced during suspend. | [] |
CVE-2014-7952 | The backup mechanism in the adb tool in Android might allow attackers to inject additional applications (APKs) and execute arbitrary code by leveraging failure to filter application data streams. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-78v6-755w-hx23 | Safari in Mac OS X before 10.3.5, after sending form data using the POST method, may re-send the data to a GET method URL if that URL is redirected after the POST data and the user uses the forward or backward buttons, which may cause an information leak. | [] |
|
CVE-2012-5545 | Multiple cross-site scripting (XSS) vulnerabilities in the ShareThis module 7.x-2.x before 7.x-2.5 for Drupal allow remote authenticated users with the "administer sharethis" permission to inject arbitrary web script or HTML via unspecified vectors related to "JavaScript settings." | [
"cpe:2.3:a:rob_loach:sharethis:7.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_loach:sharethis:7.x-2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_loach:sharethis:7.x-2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_loach:sharethis:7.x-2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_loach:sharethis:7.x-2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_loach:sharethis:7.x-2.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] |
|
GHSA-q58w-h83p-f9h2 | SQL injection vulnerability in the files mod in index.php in BXCP 0.3.0.4 allows remote attackers to execute arbitrary SQL commands via the where parameter in a view action. | [] |
|
GHSA-q8fq-52x5-p228 | LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191. | [] |
|
GHSA-6qjm-39vh-729w | Pimcore Cross-site Scripting in Predefined Asset Metadata module in Settings | ImpactThis vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.PatchesUpdate to version 10.5.20 or apply this patch manually https://github.com/pimcore/pimcore/pull/14721.patchWorkaroundsApply patch manually https://github.com/pimcore/pimcore/pull/14721.patchReferenceshttps://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19 | [] |
GHSA-pj72-96mg-hvmq | Missing Authorization vulnerability in Shahjada Live Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Live Forms: from n/a through 4.8.4. | [] |
|
CVE-2006-1970 | Cross-site scripting (XSS) vulnerability in classifieds/viewcat.cgi in KCScripts Classifieds, distributed individually and as part of Portal Pack 6.0 and earlier, allows remote attackers to inject arbitrary web script or HTML via the cat_id parameter. | [
"cpe:2.3:a:kcscripts:portal_pack:*:*:*:*:*:*:*:*"
] |
|
GHSA-5xrf-9rc2-jr45 | Multiple PHP remote file inclusion vulnerabilities in FrontAccounting (FA) 1.13, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_to_root parameter to (1) access/login.php and (2) includes/lang/language.php, different vectors than CVE-2007-4279. | [] |
|
CVE-2025-27532 | A vulnerability in the “Backup & Restore” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to access secret information via multiple crafted HTTP requests. | [] |
|
GHSA-jvm5-r77x-76rj | Integer overflow in Microsoft Word 2000, 2002, 2003, 2004 for Mac, and v.X for Mac allows remote user-assisted attackers to execute arbitrary code via a crafted string in a Word document, which overflows a 16-bit integer length value, aka "Memmove Code Execution," a different vulnerability than CVE-2006-3651 and CVE-2006-4693. | [] |
|
GHSA-37q2-jfrf-gv36 | An incorrect size calculation in ldap_escape may lead to an integer overflow when overly long input is passed in, resulting in an out-of-bounds write. This issue affects HHVM prior to 4.56.2, all versions between 4.57.0 and 4.78.0, 4.79.0, 4.80.0, 4.81.0, 4.82.0, 4.83.0. | [] |
|
GHSA-xrf9-3q75-637f | In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731 | [] |
|
CVE-2023-41040 | GitPython blind local file inclusion | GitPython is a python library used to interact with Git repositories. In order to resolve some git references, GitPython reads files from the `.git` directory, in some places the name of the file being read is provided by the user, GitPython doesn't check if this file is located outside the `.git` directory. This allows an attacker to make GitPython read any file from the system. This vulnerability is present in https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/refs/symbolic.py#L174-L175. That code joins the base directory with a user given string without checking if the final path is located outside the base directory. This vulnerability cannot be used to read the contents of files but could in theory be used to trigger a denial of service for the program. This issue has been addressed in version 3.1.37. | [
"cpe:2.3:a:gitpython_project:gitpython:*:*:*:*:*:python:*:*"
] |
CVE-2020-35678 | Autobahn|Python before 20.12.3 allows redirect header injection. | [
"cpe:2.3:a:crossbar:autobahn:*:*:*:*:*:*:*:*"
] |
|
GHSA-495h-g8p3-vvq5 | An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function code_dump2() located in code.c. It allows an attacker to cause Denial of Service. | [] |
|
GHSA-w327-wq28-3vmf | CuteSoft CuteEditor Path Traversal vulnerability | Directory traversal vulnerability in `CuteSoft_Client/CuteEditor/Load.ashx` in CuteSoft Components Cute Editor for ASP.NET allows remote attackers to read arbitrary files via a `..` (dot dot) in the file parameter. | [] |
GHSA-2wc2-3qx9-3828 | SafeHTML before 1.3.5 does not properly filter script in UTF-7 and CSS comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks in vulnerable applications that use SafeHTML. | [] |
|
GHSA-2mxh-w2fv-g692 | In sam2p 0.49.3, a heap-based buffer overflow exists in the pcxLoadImage24 function of the file in_pcx.cpp. | [] |
|
CVE-2025-29477 | An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the function consume_event. | [] |
|
GHSA-qx79-7594-fqf9 | RealNetworks GameHouse RealArcade Installer (aka ActiveMARK Game Installer) 2.6.0.481 and 3.0.7 uses weak permissions (Create Files/Write Data) for the GameHouse Games directory tree, which allows local users to gain privileges via a Trojan horse DLL in an individual game's directory, as demonstrated by DDRAW.DLL in the Zuma Deluxe directory. | [] |
|
GHSA-chf6-5xvc-hh36 | XSS exists in WUZHI CMS 4.1.0 via index.php?m=message&f=message&v=add&username=[XSS] to coreframe/app/message/message.php. | [] |
|
CVE-2007-3251 | Multiple directory traversal vulnerabilities in e-Vision CMS 2.02 and earlier allow remote attackers to (1) include and execute arbitrary local files via a .. (dot dot) in the adminlang cookie to admin/functions.php or (2) read arbitrary local files via the img parameter to admin/show_img.php. | [
"cpe:2.3:a:e-vision:e-vision_cms:*:*:*:*:*:*:*:*"
] |
|
GHSA-75p5-jwx4-qw9h | PrestaShop boolean SQL injection | ImpactSQL injection possible in product search field, in BO's product pagePatches8.1.1Found byAleksey Solovev (Positive Technologies)WorkaroundsnoneReferencesnone | [] |
CVE-2014-5383 | SQL injection vulnerability in AlienVault OSSIM before 4.7.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-3:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:3.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:4.6:*:*:*:*:*:*:*"
] |
|
GHSA-qfp9-57pm-rg3f | fexsrv in F*EX (aka Frams' Fast File EXchange) before fex-20160919_2 allows eval injection (for unauthenticated remote code execution). | [] |
|
GHSA-6cf4-r7qc-3553 | Cross-site scripting (XSS) vulnerability in single_winner1.php in HUBScript 1.0 allows remote attackers to inject arbitrary web script or HTML via the bid_id parameter. | [] |
|
CVE-2017-1000131 | Mahara 15.04 before 15.04.8 and 15.10 before 15.10.4 and 16.04 before 16.04.2 are vulnerable to users staying logged in to their Mahara account even when they have been logged out of Moodle (when using MNet) as Mahara did not properly implement one of the MNet SSO API functions. | [
"cpe:2.3:a:mahara:mahara:15.04:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-31735 | OpenAM Consortium Edition version 14.0.0 provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601). When accessing an affected server through some specially crafted URL, the user may be redirected to an arbitrary website. | [
"cpe:2.3:a:osstech:openam:*:*:*:*:consortium:*:*:*"
] |
|
GHSA-m8r7-8362-fv6x | Format string vulnerability in the cherokee_logger_ncsa_write_string function in Cherokee 0.4.17 and earlier, when authenticating via auth_pam, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in the URL. | [] |
|
GHSA-4g3j-c4wg-6j7x | Snowflake JDBC vulnerable to command injection via SSO URL authentication | Snowflake JDBC driver is vulnerable to command injection vulnerability via SSO URL authentication. The vulnerability was patched on March 17, 2023 as part of Snowflake JDBC driver Version 3.13.29. An attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. | [] |
CVE-2022-25199 | A missing permission check in Jenkins SCP publisher Plugin 1.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials. | [
"cpe:2.3:a:jenkins:scp_publisher:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-qqm3-6f5j-2j3h | A local privilege escalation vulnerability in MA for Windows prior to 5.7.6 allows a local low privileged user to gain system privileges through running the repair functionality. Temporary file actions were performed on the local user's %TEMP% directory with System privileges through manipulation of symbolic links. | [] |
|
GHSA-59q4-wg74-fxmm | An improper access control vulnerability in synodsmnotify in Synology DiskStation Manager (DSM) before 6.1.4-15217 and before 6.0.3-8754-6 allows local users to inject arbitrary web script or HTML via the -fn option. | [] |
|
CVE-2015-2606 | Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2605, and CVE-2015-4745. | [
"cpe:2.3:a:oracle:fusion_middleware:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:3.1:*:*:*:*:*:*:*"
] |
|
GHSA-p56m-hx7c-pjv5 | Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. | [] |
|
GHSA-whjh-pf6x-5rxq | A memory corruption vulnerability exists in the httpd unescape functionality of FreshTomato 2022.1. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.The `freshtomato-mips` has a vulnerable URL-decoding feature that can lead to memory corruption. | [] |
|
GHSA-g3xh-6w9g-5xx8 | A stack-based buffer over-read was discovered in dct36 in layer3.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes an application crash, which leads to remote denial of service. | [] |
|
CVE-2021-45957 | Dnsmasq 2.86 has a heap-based buffer overflow in answer_request (called from FuzzAnswerTheRequest and fuzz_rfc1035.c). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge. | [
"cpe:2.3:a:thekelleys:dnsmasq:2.86:*:*:*:*:*:*:*"
] |
|
CVE-2016-1000155 | Reflected XSS in wordpress plugin wpsolr-search-engine v7.6 | [
"cpe:2.3:a:wpsolr:wpsolr-search-engine:7.6:*:*:*:*:wordpress:*:*"
] |
|
CVE-2020-9003 | A stored XSS vulnerability exists in the Modula Image Gallery plugin before 2.2.5 for WordPress. Successful exploitation of this vulnerability would allow an authenticated low-privileged user to inject arbitrary JavaScript code that is viewed by other users. | [
"cpe:2.3:a:machothemes:modula_image_gallery:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2023-51358 | WordPress Block IPs for Gravity Forms Plugin <= 1.0.1 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Bright Plugins Block IPs for Gravity Forms.This issue affects Block IPs for Gravity Forms: from n/a through 1.0.1.
| [
"cpe:2.3:a:brightplugins:block_ips_for_gravity_forms:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-31203 | A “CWE-121: Stack-based Buffer Overflow” in the wd210std.dll dynamic library packaged with the ThermoscanIP installer allows a local attacker to possibly trigger a Denial-of-Service (DoS) condition on the target component. | [
"cpe:2.3:a:proges:thermoscan_ip:20211103:*:*:*:*:*:*:*"
] |
|
CVE-2024-23878 | Cross-Site Scripting (XSS) vulnerability in Cups Easy | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grnprint.php, in the grnno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials. | [
"cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*"
] |
CVE-2009-0652 | The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233. NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*"
] |
|
CVE-2021-45851 | A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server. | [
"cpe:2.3:a:frangoteam:fuxa:1.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-28mp-5jqq-gwr6 | An elevation of privilege vulnerability exists when the "Public Account Pictures" folder improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. | [] |
|
GHSA-2f4q-74mc-vp6m | RainbowFish PacsOne Server 6.8.4 allows SQL injection on the username parameter in the signup page. | [] |
|
CVE-2009-0303 | Cross-site scripting (XSS) vulnerability in Web Help Desk before 9.1.18 allows remote attackers to inject arbitrary web script or HTML via vectors related to "encoded JavaScript" and Helpdesk.woa. | [
"cpe:2.3:a:webhelpdesk:web_help_desk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:8.4.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:webhelpdesk:web_help_desk:9.1.16:*:*:*:*:*:*:*"
] |
|
CVE-2014-2269 | modules/Users/ForgotPassword.php in vTiger 6.0 before Security Patch 2 allows remote attackers to reset the password for arbitrary users via a request containing the username, password, and confirmPassword parameters. | [
"cpe:2.3:a:vtiger:vtiger_crm:6.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-ffw7-89pg-vjx2 | Multiple format string vulnerabilities in the kavwebscan.CKAVWebScan ActiveX control (kavwebscan.dll) in Kaspersky Online Scanner before 5.0.98 allow remote attackers to execute arbitrary code via format string specifiers in "various string formatting functions," which trigger heap-based buffer overflows. | [] |
|
CVE-2019-5228 | Certain detection module of P30, P30 Pro, Honor V20 smartphone whith Versions earlier than ELLE-AL00B 9.1.0.193(C00E190R1P21), Versions earlier than VOGUE-AL00A 9.1.0.193(C00E190R1P12), Versions earlier than Princeton-AL10B 9.1.0.233(C00E233R4P3) have a race condition vulnerability. The system does not lock certain function properly, when the function is called by multiple processes could cause out of bound write. An attacker tricks the user into installing a malicious application, successful exploit could cause malicious code execution. | [
"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_v20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_v20:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-45650 | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RS400 before 1.5.1.80, R6400v2 before 1.0.4.102, R7000P before 1.3.2.126, R6700v3 before 1.0.4.102, and R6900P before 1.3.2.126. | [
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-2706 | Digiwin ERP UploadAjaxAPI.ashx unrestricted upload | A vulnerability classified as critical was found in Digiwin ERP 5.0.1. Affected by this vulnerability is an unknown functionality of the file /Api/TinyMce/UploadAjaxAPI.ashx. The manipulation of the argument File leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
CVE-2018-14710 | Cross-site scripting in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to execute JavaScript via the "hook" URL parameter. | [
"cpe:2.3:o:asus:rt-ac3200_firmware:3.0.0.4.382.50010:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*"
] |
|
GHSA-42g2-v9pm-6w57 | Cisco IOS XE does not properly manage memory for TFTP UDP flows, which allows remote attackers to cause a denial of service (memory consumption) via TFTP (1) client or (2) server traffic, aka Bug IDs CSCuh09324 and CSCty42686. | [] |
|
GHSA-m9cq-f73g-v83p | A vulnerability was found in Tongda OA 2017 up to 11.10. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file general/vote/manage/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-248245 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-96mx-v7cp-x9cq | An issue was discovered on Samsung mobile devices with P(9.0) software. The Motion photo player allows attackers to bypass the Secure Folder feature to view images. The Samsung ID is SVE-2019-14653 (August 2019). | [] |
|
GHSA-rc47-6667-2j5j | http-cache-semantics vulnerable to Regular Expression Denial of Service | http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. | [] |
GHSA-xq99-q5xg-8fq7 | A vulnerability, which was classified as problematic, has been found in CodeAstro Internet Banking System 1.0. This issue affects some unknown processing of the file pages_view_client.php. The manipulation of the argument acc_name with the input Johnnie Reyes'"()&%<zzz><ScRiPt >alert(5646)</ScRiPt> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243137 was assigned to this vulnerability. | [] |
|
CVE-2025-27307 | WordPress Quotes llama plugin <= 3.0.1 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in oooorgle Quotes llama allows Reflected XSS. This issue affects Quotes llama: from n/a through 3.0.1. | [] |
CVE-2019-18420 | An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] |
|
CVE-2024-2621 | Fujian Kelixin Communication Command and Dispatch Platform pwd_update.php sql injection | A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php. The manipulation of the argument uuid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257198 is the identifier assigned to this vulnerability. | [] |
GHSA-3r34-xx92-673h | The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing. | [] |
|
CVE-2012-0647 | WebKit in Apple Safari before 5.1.4 does not properly handle redirects in conjunction with HTTP authentication, which might allow remote web servers to capture credentials by logging the Authorization HTTP header. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*"
] |
|
GHSA-22mj-9hjg-cp82 | In the Linux kernel, the following vulnerability has been resolved:tap: add missing verification for short frameThe cited commit missed to check against the validity of the frame length
in the tap_get_user_xdp() path, which could cause a corrupted skb to be
sent downstack. Even before the skb is transmitted, the
tap_get_user_xdp()-->skb_set_network_header() may assume the size is more
than ETH_HLEN. Once transmitted, this could either cause out-of-bound
access beyond the actual length, or confuse the underlayer with incorrect
or inconsistent header length in the skb metadata.In the alternative path, tap_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted.This is to drop any frame shorter than the Ethernet header size just like
how tap_get_user() does.CVE: CVE-2024-41090 | [] |
|
GHSA-3f3v-j4pm-7283 | An out-of-bounds read vulnerability exists when reading a TIF file using Open Design Alliance Drawings SDK before 2022.12. The specific issue exists after loading TIF files. An unchecked input data from a crafted TIF file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process. | [] |
|
GHSA-9cqm-fm38-5fgm | The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997. | [] |
|
CVE-2005-2150 | Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote attackers to (1) list Windows services via svcctl or (2) read eventlogs via eventlog. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-1205 | Microsoft Word Remote Code Execution Vulnerability | A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user.
To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software.
Two possible email attack scenarios exist for this vulnerability:
With the first email attack scenario, an attacker could send a specially crafted email message to the user and wait for the user to click on the message. When the message renders via Microsoft Word in the Outlook Preview Pane, an attack could be triggered.
With the second scenario, an attacker could attach a specially crafted file to an email, send it to a user, and convince them to open it.
In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or other message, and then convince the user to open the specially crafted file.
The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory.
For users who view their emails in Outlook, the Preview Pane attack vector can be mitigated by disabling this feature. The following registry keys can be set to disable the Preview Pane in Outlook on Windows, either via manual editing of the registry or by modifying Group Policy.
Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys and Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe.
Outlook 2010:
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Options
DWORD: DisableReadingPane
Value: 1
Outlook 2013:
HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Options
DWORD: DisableReadingPane
Value: 1
Outlook 2016, Outlook 2019, and Office 365 ProPlus:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Options
DWORD: DisableReadingPane
Value: 1
| [
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*"
] |
GHSA-8gw3-ffc8-2v2v | CMS Made Simple 2.2.14 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Field Definition text field. | [] |
|
CVE-2024-56788 | net: ethernet: oa_tc6: fix tx skb race condition between reference pointers | In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: oa_tc6: fix tx skb race condition between reference pointers
There are two skb pointers to manage tx skb's enqueued from n/w stack.
waiting_tx_skb pointer points to the tx skb which needs to be processed
and ongoing_tx_skb pointer points to the tx skb which is being processed.
SPI thread prepares the tx data chunks from the tx skb pointed by the
ongoing_tx_skb pointer. When the tx skb pointed by the ongoing_tx_skb is
processed, the tx skb pointed by the waiting_tx_skb is assigned to
ongoing_tx_skb and the waiting_tx_skb pointer is assigned with NULL.
Whenever there is a new tx skb from n/w stack, it will be assigned to
waiting_tx_skb pointer if it is NULL. Enqueuing and processing of a tx skb
handled in two different threads.
Consider a scenario where the SPI thread processed an ongoing_tx_skb and
it moves next tx skb from waiting_tx_skb pointer to ongoing_tx_skb pointer
without doing any NULL check. At this time, if the waiting_tx_skb pointer
is NULL then ongoing_tx_skb pointer is also assigned with NULL. After
that, if a new tx skb is assigned to waiting_tx_skb pointer by the n/w
stack and there is a chance to overwrite the tx skb pointer with NULL in
the SPI thread. Finally one of the tx skb will be left as unhandled,
resulting packet missing and memory leak.
- Consider the below scenario where the TXC reported from the previous
transfer is 10 and ongoing_tx_skb holds an tx ethernet frame which can be
transported in 20 TXCs and waiting_tx_skb is still NULL.
tx_credits = 10; /* 21 are filled in the previous transfer */
ongoing_tx_skb = 20;
waiting_tx_skb = NULL; /* Still NULL */
- So, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) becomes true.
- After oa_tc6_prepare_spi_tx_buf_for_tx_skbs()
ongoing_tx_skb = 10;
waiting_tx_skb = NULL; /* Still NULL */
- Perform SPI transfer.
- Process SPI rx buffer to get the TXC from footers.
- Now let's assume previously filled 21 TXCs are freed so we are good to
transport the next remaining 10 tx chunks from ongoing_tx_skb.
tx_credits = 21;
ongoing_tx_skb = 10;
waiting_tx_skb = NULL;
- So, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) becomes true again.
- In the oa_tc6_prepare_spi_tx_buf_for_tx_skbs()
ongoing_tx_skb = NULL;
waiting_tx_skb = NULL;
- Now the below bad case might happen,
Thread1 (oa_tc6_start_xmit) Thread2 (oa_tc6_spi_thread_handler)
--------------------------- -----------------------------------
- if waiting_tx_skb is NULL
- if ongoing_tx_skb is NULL
- ongoing_tx_skb = waiting_tx_skb
- waiting_tx_skb = skb
- waiting_tx_skb = NULL
...
- ongoing_tx_skb = NULL
- if waiting_tx_skb is NULL
- waiting_tx_skb = skb
To overcome the above issue, protect the moving of tx skb reference from
waiting_tx_skb pointer to ongoing_tx_skb pointer and assigning new tx skb
to waiting_tx_skb pointer, so that the other thread can't access the
waiting_tx_skb pointer until the current thread completes moving the tx
skb reference safely. | [] |
GHSA-3jqw-vv45-mjhh | XSS/Script injection vulnerability in matestack | matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection.This vulnerability is patched in version 0.7.4. | [] |
CVE-2015-3203 | Unrestricted file upload vulnerability in h5ai before 0.25.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the directory specified by the href parameter. | [
"cpe:2.3:a:h5ai_project:h5ai:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-24550 | Bludit - Remote Code Execution (RCE) through File API | A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files. | [
"cpe:2.3:a:bludit:bludit:3.14.0:*:*:*:*:*:*:*"
] |
CVE-2023-44771 | A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout. | [
"cpe:2.3:a:tribalsystems:zenario:9.4.59197:*:*:*:*:*:*:*"
] |
|
GHSA-8vrm-g5r7-f2c7 | DHCP Server Service Information Disclosure Vulnerability | [] |
|
CVE-2021-28132 | LUCY Security Awareness Software through 4.7.x allows unauthenticated remote code execution because the Migration Tool (in the Support section) allows upload of .php files within a system.tar.gz file. The .php file becomes accessible with a public/system/static URI. | [
"cpe:2.3:a:lucysecurity:security_awareness:*:*:*:*:*:*:*:*"
] |
|
GHSA-28rm-36w9-mxrj | A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 versions prior to 11.0 SP1. | [] |
|
GHSA-gqw7-qw4r-9w8v | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . | [] |
|
GHSA-v9h6-gj8j-4c4v | Multiple untrusted search path vulnerabilities in Nuance PDF Reader 6.0 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) exceptiondumpdll.dll file in the current working directory, as demonstrated by a directory that contains a .pdf file. NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-m7h8-fcgh-885m | Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSphere Portal configuration, leading to improper construction of a response page by an application. | [] |
|
CVE-2015-8156 | Unquoted Windows search path vulnerability in EEDService in Symantec Endpoint Encryption (SEE) 11.x before 11.1.1 allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe. | [
"cpe:2.3:a:symantec:endpoint_encryption:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_encryption:11.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2017-8992 | HPE has identified a remote privilege escalation vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version. | [
"cpe:2.3:a:hp:centralview_fraud_risk_management:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-28792 | The unofficial Swift Development Environment extension before 2.12.1 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted sourcekit-lsp.serverPath, swift.languageServerPath, swift.path.sourcekite, swift.path.sourcekiteDockerMode, swift.path.swift_driver_bin, or swift.path.shell configuration value that triggers execution upon opening the workspace. | [
"cpe:2.3:a:swift_development_environment_project:swift_development_environment:*:*:*:*:*:visual_studio_code:*:*"
] |
|
GHSA-mjf8-xvj5-3g9h | Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). | [] |
|
GHSA-gg68-f5h7-f88v | In the Linux kernel, the following vulnerability has been resolved:scsi: core: Fix a use-after-freeThere are two .exit_cmd_priv implementations. Both implementations use
resources associated with the SCSI host. Make sure that these resources are
still available when .exit_cmd_priv is called by waiting inside
scsi_remove_host() until the tag set has been freed.This commit fixes the following use-after-free:==================================================================
BUG: KASAN: use-after-free in srp_exit_cmd_priv+0x27/0xd0 [ib_srp]
Read of size 8 at addr ffff888100337000 by task multipathd/16727
Call Trace:
<TASK>
dump_stack_lvl+0x34/0x44
print_report.cold+0x5e/0x5db
kasan_report+0xab/0x120
srp_exit_cmd_priv+0x27/0xd0 [ib_srp]
scsi_mq_exit_request+0x4d/0x70
blk_mq_free_rqs+0x143/0x410
__blk_mq_free_map_and_rqs+0x6e/0x100
blk_mq_free_tag_set+0x2b/0x160
scsi_host_dev_release+0xf3/0x1a0
device_release+0x54/0xe0
kobject_put+0xa5/0x120
device_release+0x54/0xe0
kobject_put+0xa5/0x120
scsi_device_dev_release_usercontext+0x4c1/0x4e0
execute_in_process_context+0x23/0x90
device_release+0x54/0xe0
kobject_put+0xa5/0x120
scsi_disk_release+0x3f/0x50
device_release+0x54/0xe0
kobject_put+0xa5/0x120
disk_release+0x17f/0x1b0
device_release+0x54/0xe0
kobject_put+0xa5/0x120
dm_put_table_device+0xa3/0x160 [dm_mod]
dm_put_device+0xd0/0x140 [dm_mod]
free_priority_group+0xd8/0x110 [dm_multipath]
free_multipath+0x94/0xe0 [dm_multipath]
dm_table_destroy+0xa2/0x1e0 [dm_mod]
__dm_destroy+0x196/0x350 [dm_mod]
dev_remove+0x10c/0x160 [dm_mod]
ctl_ioctl+0x2c2/0x590 [dm_mod]
dm_ctl_ioctl+0x5/0x10 [dm_mod]
__x64_sys_ioctl+0xb4/0xf0
dm_ctl_ioctl+0x5/0x10 [dm_mod]
__x64_sys_ioctl+0xb4/0xf0
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x46/0xb0 | [] |
|
GHSA-7jjx-3qw9-j6h6 | cggmp21-keygen has ambiguous challenge derivation | Challenge derivation in non-interactive ZK proofs was ambiguous and that could lead to security vulnerability (however, it's unknown if it could be exploited). | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.