Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-472r-85fw-28pc
The mintToken function of a smart contract implementation for NEXPARA, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
CVE-2001-1546
Pathways Homecare 6.5 uses weak encryption for user names and passwords, which allows local users to gain privileges by recovering the passwords from the pwhc.ini file.
[ "cpe:2.3:a:mckesson:pathways_homecare:6.5:*:*:*:*:*:*:*" ]
GHSA-54fp-2g66-5c89
Remote Procedure Call Information Disclosure Vulnerability
[]
CVE-2006-4207
Multiple PHP remote file inclusion vulnerabilities in Bob Jewell Discloser 0.0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the fileloc parameter to (1) content/content.php or (2) /inc/indexhead.php.
[ "cpe:2.3:a:bob_jewell:discloser:*:*:*:*:*:*:*:*" ]
CVE-2023-46208
WordPress Motors – Car Dealer & Classified Ads Plugin <= 1.4.6 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in StylemixThemes Motors – Car Dealer, Classifieds & Listing plugin <= 1.4.6 versions.
[ "cpe:2.3:a:stylemixthemes:motors_-_car_dealer\\,_classifieds_\\&_listing:*:*:*:*:*:wordpress:*:*" ]
GHSA-f46w-cpqw-2pqr
In the Linux kernel, the following vulnerability has been resolved:rapidio: add check for rio_add_net() in rio_scan_alloc_net()The return value of rio_add_net() should be checked. If it fails, put_device() should be called to free the memory and give up the reference initialized in rio_add_net().
[]
CVE-2009-0297
SQL injection vulnerability in login_check.asp in ClickAuction allows remote attackers to execute arbitrary SQL commands via the (1) txtEmail and (2) txtPassword parameters. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:clicktech:clickauction:_nil_:*:*:*:*:*:*:*" ]
GHSA-x47q-mxmv-rxrj
MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 allows remote authenticated users to gain sensitive information via an HTTP request to (1) calendar_d.html, (2) calendar_m.html, (3) calendar_w.html, or (4) calendar_y.html, which reveal the installation path.
[]
CVE-2018-6006
SQL Injection exists in the JS Autoz 1.0.9 component for Joomla! via the vtype, pre, or prs parameter.
[ "cpe:2.3:a:joomsky:js_autoz:1.0.9:*:*:*:*:joomla\\!:*:*" ]
CVE-2019-8291
Online Store System v1.0 delete_file.php doesn't check to see if a user has administrative rights nor does it check for path traversal.
[ "cpe:2.3:a:online_store_system_project:online_store_system:1.0:*:*:*:*:*:*:*" ]
CVE-2024-10887
NiceJob <= 3.6.5 - Authenticated (Contributor+) Stored Cross-Site Scripting
The NiceJob plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes (nicejob-lead, nicejob-review, nicejob-engage, nicejob-badge, nicejob-stories) in all versions up to, and including, 3.6.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2005-1011
SQL injection vulnerability in content.asp in SiteEnable allows remote attackers to execute arbitrary SQL commands via the sortby parameter.
[ "cpe:2.3:a:iatek:siteenable:*:*:*:*:*:*:*:*" ]
CVE-2017-6513
The WHMCS Reseller Module V2 2.0.2 in Softaculous Virtualizor before 2.9.1.0 does not verify the user correctly, which allows remote authenticated users to control other virtual machines managed by Virtualizor by accessing a modified URL.
[ "cpe:2.3:a:softaculous:whmcs_reseller_module:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:softaculous:virtualizor:*:*:*:*:*:*:*:*" ]
GHSA-c3ch-5j34-5m4f
CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 has a hardcoded application password, which makes it easier for remote authenticated users to obtain application-file access via unspecified vectors.
[]
CVE-2024-36448
Apache IoTDB Workbench: SSRF Vulnerability (EOL)
** UNSUPPORTED WHEN ASSIGNED ** Server-Side Request Forgery (SSRF) vulnerability in Apache IoTDB Workbench. This issue affects Apache IoTDB Workbench: from 0.13.0. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ "cpe:2.3:a:apache:iotdb_workbench:*:*:*:*:*:*:*:*" ]
CVE-2017-10887
Untrusted search path vulnerability in BOOK WALKER for Windows Ver.1.2.9 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:bookwalker:book_walker:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-r9vf-85j7-c8f6
An issue was discovered in Eventum 3.5.0. /htdocs/validate.php has XSS via the values parameter.
[]
CVE-2024-40884
Unauthorized disabling of invite URL
Mattermost versions 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 fail to properly enforce permissions which allows a team admin user without "Add Team Members" permission to disable the invite URL.
[ "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:mattermost:mattermost_server:9.10.0:*:*:*:*:*:*:*" ]
GHSA-6f6x-3w45-x5jc
The login password of the web administrative dashboard in Arcadyan Wifi routers VRV9506JAC23 is sent in cleartext, allowing an attacker to sniff and intercept traffic to learn the administrative credentials to the router.
[]
GHSA-7556-p52v-pp8q
DBHcms v1.2.0 has a stored xss vulnerability as there is no htmlspecialchars function for '$_POST['pageparam_insert_name']' variable in dbhcms\mod\mod.page.edit.php line 227, A remote authenticated with admin user can exploit this vulnerability to hijack other users.
[]
CVE-2004-0851
The (1) write_list and (2) dump_curr_list functions in Net-Acct before 0.71 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
[ "cpe:2.3:a:ulrich_callmeier:net-acct:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ulrich_callmeier:net-acct:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ulrich_callmeier:net-acct:0.71:*:*:*:*:*:*:*" ]
GHSA-4wcr-6rhv-9fh4
The pluggable authentication module for mysql (pam_mysql) before 0.4.7 does not properly cleanse user input when constructing SQL statements, which allows attackers to obtain plaintext passwords or hashes.
[]
CVE-2022-26528
Realtek Linux/Android Bluetooth Mesh SDK - Buffer Overflow
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.
[ "cpe:2.3:a:realtek:bluetooth_mesh_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
CVE-2023-30665
Improper input validation vulnerability in OnOemServiceMode in libsec-ril prior to SMR Jul-2023 Release 1 allows local attackers to cause an Out-Of-Bounds read.
[ "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*" ]
GHSA-vxf8-wwpw-phxg
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to access sensitive information via the EXE installer.
[]
CVE-2023-6657
SourceCodester Simple Student Attendance System student_form.php sql injection
A vulnerability classified as critical has been found in SourceCodester Simple Student Attendance System 1.0. This affects an unknown part of the file /modals/student_form.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-247365 was assigned to this vulnerability.
[ "cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*" ]
CVE-2024-1629
Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component
Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component
[]
CVE-2006-2260
Cross-site scripting (XSS) vulnerability in the project module (project.module) in Drupal 4.5 and 4.6 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
[ "cpe:2.3:a:drupal:drupal:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.6.3:*:*:*:*:*:*:*" ]
CVE-2022-29800
A time-of-check-time-of-use (TOCTOU) race condition vulnerability was found in networkd-dispatcher. This flaw exists because there is a certain time between the scripts being discovered and them being run. An attacker can abuse this vulnerability to replace scripts that networkd-dispatcher believes to be owned by root with ones that are not.
[ "cpe:2.3:a:microsoft:windows_defender_for_endpoint:-:*:*:*:*:linux:*:*" ]
CVE-2022-33939
CENTUM VP / CS 3000 controller FCS (CP31, CP33, CP345, CP401, and CP451) contains an issue in processing communication packets, which may lead to resource consumption. If this vulnerability is exploited, an attacker may cause a denial of service (DoS) condition in ADL communication by sending a specially crafted packet to the affected product.
[ "cpe:2.3:o:yokogawa:centum_cs_3000_cp401_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_cp401:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_cp451_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_cp451:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_cp33_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_cp33:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_cp345_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_cp345:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_cs_3000_cp31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_cs_3000_cp31:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_3000_cp401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp_3000_cp401:-:*:*:*:*:*:*:*", "cpe:2.3:o:yokogawa:centum_vp_3000_cp451_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:centum_vp_3000_cp451:-:*:*:*:*:*:*:*" ]
CVE-2011-0639
Apple Mac OS X does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-5pr2-979m-r2r2
The indieweb-post-kinds plugin before 1.3.1.1 for WordPress has XSS via the genericons/example.html anchor identifier.
[]
CVE-2023-3741
An OS Command injection vulnerability in NEC Platforms DT900 and DT900S Series all versions allows an attacker to execute any command on the device.
[ "cpe:2.3:o:nec:itk-6dgs-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-6dgs-1\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32lcgs-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32lcgs-1\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32tcgs-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32tcgs-1\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-6d-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-6d-1\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-12d-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-12d-1\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-8lcx-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-8lcx-1\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-8tcgx-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-8tcgx-1\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-6dgs-1a\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-6dgs-1a\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32lcgs-1a\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32lcgs-1a\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32tcgs-1a\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32tcgs-1a\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-6dgs-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-6dgs-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32lcgs-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32lcgs-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32tcgs-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32tcgs-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-6d-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-6d-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-12d-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-12d-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-6dg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-6dg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-12dg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-12dg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-8lcx-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-8lcx-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-8lcg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-8lcg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32lcg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32lcg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-8tcgx-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-8tcgx-1p\\(bk\\)tel:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:itk-32tcg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:nec:itk-32tcg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*" ]
CVE-2008-6511
Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
[ "cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*" ]
GHSA-g468-f3m4-727c
The EventPrime WordPress plugin before 3.2.0 does not have CSRF checks when creating bookings, which could allow attackers to make logged in users create unwanted bookings via CSRF attacks.
[]
CVE-2022-49399
tty: goldfish: Use tty_port_destroy() to destroy port
In the Linux kernel, the following vulnerability has been resolved: tty: goldfish: Use tty_port_destroy() to destroy port In goldfish_tty_probe(), the port initialized through tty_port_init() should be destroyed in error paths.In goldfish_tty_remove(), qtty->port also should be destroyed or else might leak resources. Fix the above by calling tty_port_destroy().
[]
CVE-2016-9801
In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c" source file when processing corrupted dump file.
[ "cpe:2.3:a:bluez:bluez:5.42:*:*:*:*:*:*:*" ]
CVE-2023-49119
Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
[ "cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*" ]
CVE-2025-21555
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
[ "cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*" ]
CVE-2019-14841
A flaw was found in the RHDM, where an authenticated attacker can change their assigned role in the response header. This flaw allows an attacker to gain admin privileges in the Business Central Console.
[ "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*" ]
CVE-2024-30370
RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability
RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page. The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.
[]
CVE-2018-13691
The mintToken function of a smart contract implementation for R Time Token v3 (RS) (Contract Name: RTokenMain), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:rtokenmain_project:rtokenmain:-:*:*:*:*:*:*:*" ]
CVE-2008-5358
Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier might allow remote attackers to execute arbitrary code via a crafted GIF file that triggers memory corruption during display of the splash screen, possibly related to splashscreen.dll.
[ "cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*" ]
GHSA-6mrr-gv8q-m9pv
uPortal before 4.0.13.1 does not properly check the CONFIG permission, which allows remote authenticated users to configure portlets by leveraging the SUBSCRIBE permission for a portlet.
[]
CVE-2014-3040
Cross-site request forgery (CSRF) vulnerability in IBM Emptoris Contract Management 9.5.x before 9.5.0.6 iFix 10, 10.0.0.x before 10.0.0.1 iFix 10, 10.0.1.x before 10.0.1.4, and 10.0.2.x before 10.0.2.2 iFix 2; Emptoris Sourcing Portfolio 9.5.x before 9.5.1.3, 10.0.0.x before 10.0.0.1, 10.0.1.x before 10.0.1.3, and 10.0.2.x before 10.0.2.4; and Emptoris Spend Analysis 9.5.x before 9.5.0.4, 10.0.1.x before 10.0.1.3, and 10.0.2.x before 10.0.2.4 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
[ "cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.2:*:*:*:*:*:*:*" ]
GHSA-2x26-cf8j-qvpf
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.
[]
CVE-2020-8913
Local arbitrary code execution in splitinstall in Android's Play Core
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.
[ "cpe:2.3:a:android:play_core_library:*:*:*:*:*:*:*:*" ]
GHSA-35v5-c7c4-jcvm
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.
[]
GHSA-vgj8-9328-h497
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
[]
CVE-2001-0517
Oracle listener in Oracle 8i on Solaris allows remote attackers to cause a denial of service via a malformed connection packet with a maximum transport data size that is set to 0.
[ "cpe:2.3:a:oracle:oracle8i:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*" ]
GHSA-4hxq-h6g9-89gx
A vulnerability in the web interface of Cisco Elastic Services Controllers could allow an authenticated, remote attacker to access sensitive system credentials that are stored in an affected system. More Information: CSCvd76339. Known Affected Releases: 2.2(9.76).
[]
CVE-2022-32379
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_parents_profile.php?my_index=.
[ "cpe:2.3:a:advanced_school_management_system_project:advanced_school_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-25rq-9fcx-x8f3
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magic Hills Pty Ltd Wonder Slider Lite allows Reflected XSS.This issue affects Wonder Slider Lite: from n/a through 13.9.
[]
CVE-2014-8967
Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token sequence specifying the run-in value for the display property, leading to improper CElement reference counting.
[ "cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*" ]
GHSA-x65g-79jp-p76h
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[]
CVE-2023-43278
A Cross-Site Request Forgery (CSRF) in admin_manager.php of Seacms up to v12.8 allows attackers to arbitrarily add an admin account.
[ "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*" ]
GHSA-8jc5-p2gp-jffv
Heap-based buffer overflow in the PoDoFo::PdfTokenizer::GetNextToken function in PdfTokenizer.cpp in PoDoFo 0.9.4 allows remote attackers to have unspecified impact via a crafted file.
[]
CVE-2021-24135
WP Customer Reviews < 3.4.3 - Multiple Unauthenticated and Low Priv Authenticated Stored XSS
Unvalidated input and lack of output encoding in the WP Customer Reviews WordPress plugin, versions before 3.4.3, lead to multiple Stored Cross-Site Scripting vulnerabilities allowing remote attackers to inject arbitrary JavaScript code or HTML.
[ "cpe:2.3:a:gowebsolutions:wp_customer_reviews:*:*:*:*:*:wordpress:*:*" ]
GHSA-rx9r-2whj-rpjv
Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
[]
GHSA-q9j8-g7vg-642q
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the accent_color and background parameter in all versions up to, and including, 1.6.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
GHSA-c888-w76p-vhx3
Investintech.com SlimPDF Reader does not prevent faulting-address data from affecting branch selection, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.
[]
CVE-2008-5906
Eval injection vulnerability in the web interface plugin in KTorrent before 3.1.4 allows remote attackers to execute arbitrary PHP code via unspecified parameters to this interface's PHP scripts.
[ "cpe:2.3:a:ktorrent:ktorrent:*:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:1.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:1.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ktorrent:ktorrent:3.1.2:*:*:*:*:*:*:*" ]
CVE-2022-41669
A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load a malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).
[ "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:-:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:hotfix1:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:pro-face_blue:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:pro-face_blue:3.3:-:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:pro-face_blue:3.3:hotfix1:*:*:*:*:*:*" ]
CVE-2009-1730
Multiple directory traversal vulnerabilities in NetMechanica NetDecision TFTP Server 4.2 allow remote attackers to read or modify arbitrary files via directory traversal sequences in the (1) GET or (2) PUT command.
[ "cpe:2.3:a:netmechanica:netdecision_tftp_server:4.2:*:*:*:*:*:*:*" ]
GHSA-gpf5-7vrh-q24p
An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.
[]
CVE-2023-45751
WordPress Nexter Extension Plugin <= 2.0.3 is vulnerable to Remote Code Execution (RCE)
Improper Control of Generation of Code ('Code Injection') vulnerability in POSIMYTH Nexter Extension.This issue affects Nexter Extension: from n/a through 2.0.3.
[ "cpe:2.3:a:posimyth:nexter_extension:*:*:*:*:*:wordpress:*:*" ]
GHSA-7372-q459-jxhr
pyxdg Arbitrary File Overwrite via Race Condition
Race condition in the `xdg.BaseDirectory.get_runtime_dir` function in pyxdg 0.25 allows local users to overwrite arbitrary files by pre-creating `/tmp/pyxdg-runtime-dir-fallback-victim` to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the `get_runtime_dir` function is called.
[]
CVE-2000-0452
Buffer overflow in the ESMTP service of Lotus Domino Server 5.0.1 allows remote attackers to cause a denial of service via a long MAIL FROM command.
[ "cpe:2.3:a:lotus:domino_enterprise_server:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:lotus:domino_enterprise_server:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:lotus:domino_enterprise_server:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:lotus:domino_mail_server:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:lotus:domino_mail_server:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:lotus:domino_mail_server:5.0.3:*:*:*:*:*:*:*" ]
CVE-1999-0355
Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service.
[ "cpe:2.3:a:broadcom:controlit:4.5:*:*:*:*:*:*:*" ]
CVE-2019-14976
iCMS 7.0.15 allows admincp.php?app=apps XSS via the keywords parameter.
[ "cpe:2.3:a:icmsdev:icms:7.0.15:*:*:*:*:*:*:*" ]
CVE-2024-51933
WordPress Cookie Nonsense for YT plugin <= 1.2.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Christian Ladewig Cookie Nonsense for YT allows DOM-Based XSS.This issue affects Cookie Nonsense for YT: from n/a through 1.2.0.
[]
GHSA-3pxx-76hx-4rw2
Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411.
[]
GHSA-4q7w-p44q-84m5
An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An application may be able to gain elevated privileges.
[]
GHSA-9g7x-w32v-gmpx
Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array.
[]
GHSA-g595-9cfg-4hxm
In the Linux kernel, the following vulnerability has been resolved:igc: Fix use-after-free error during resetCleans the next descriptor to watch (next_to_watch) when cleaning the TX ring.Failure to do so can cause invalid memory accesses. If igc_poll() runs while the controller is being reset this can lead to the driver try to free a skb that was already freed.Log message:[ 101.525242] refcount_t: underflow; use-after-free. [ 101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0 [ 101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E) ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E) rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E) soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E) iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E) soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E) i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E) [ 101.525303] drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E) e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E) usbcore(E) drm(E) button(E) video(E) [ 101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G E 5.10.30-rt37-tsn1-rt-ipipe #ipipe [ 101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017 [ 101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0 [ 101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48 44 01 01 e8 d1 c6 42 00 <0f> 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3 [ 101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286 [ 101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001 [ 101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff [ 101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50 [ 101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00 [ 101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40 [ 101.525337] FS: 0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000 [ 101.525339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0 [ 101.525343] Call Trace: [ 101.525346] sock_wfree+0x9c/0xa0 [ 101.525353] unix_destruct_scm+0x7b/0xa0 [ 101.525358] skb_release_head_state+0x40/0x90 [ 101.525362] skb_release_all+0xe/0x30 [ 101.525364] napi_consume_skb+0x57/0x160 [ 101.525367] igc_poll+0xb7/0xc80 [igc] [ 101.525376] ? sched_clock+0x5/0x10 [ 101.525381] ? sched_clock_cpu+0xe/0x100 [ 101.525385] net_rx_action+0x14c/0x410 [ 101.525388] __do_softirq+0xe9/0x2f4 [ 101.525391] __local_bh_enable_ip+0xe3/0x110 [ 101.525395] ? irq_finalize_oneshot.part.47+0xe0/0xe0 [ 101.525398] irq_forced_thread_fn+0x6a/0x80 [ 101.525401] irq_thread+0xe8/0x180 [ 101.525403] ? wake_threads_waitq+0x30/0x30 [ 101.525406] ? irq_thread_check_affinity+0xd0/0xd0 [ 101.525408] kthread+0x183/0x1a0 [ 101.525412] ? kthread_park+0x80/0x80 [ 101.525415] ret_from_fork+0x22/0x30
[]
CVE-2021-24450
ProfilePress < 3.1.8 - Authenticated Stored XSS
The User Registration, User Profiles, Login & Membership – ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.8 did not sanitise or escape some of its settings before saving them and outputting them back in the page, allowing high privilege users such as admin to set JavaScript payloads in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue
[ "cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*" ]
CVE-2023-43234
DedeBIZ v6.2.11 was discovered to contain multiple remote code execution (RCE) vulnerabilities at /admin/file_manage_control.php via the $activepath and $filename parameters.
[ "cpe:2.3:a:dedebiz:dedebiz:6.2.11:*:*:*:*:*:*:*" ]
CVE-2024-11455
Include Mastodon Feed <= 1.9.5 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Include Mastodon Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'include-mastodon-feed' shortcode in all versions up to, and including, 1.9.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2018-6398
SQL Injection exists in the CP Event Calendar 3.0.1 component for Joomla! via the id parameter in a task=load action.
[ "cpe:2.3:a:joomlacalendars:event_calendar:3.0.1:*:*:*:*:joomla\\!:*:*" ]
GHSA-94c3-g97c-h69h
Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
[]
GHSA-j7p2-m4ff-pw4r
In Blue Planet® products through 22.12, a misconfiguration in the SAML implementation allows for privilege escalation. Only products using SAML authentication are affected.Blue Planet® has released software updates that address this vulnerability for the affected products. Customers are advised to upgrade their Blue Planet products to the latest software version as soon as possible. The software updates can be downloaded from the Ciena Support Portal.
[]
GHSA-rgrq-pg8h-w7h3
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
CVE-2023-39401
Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ]
GHSA-v9q3-wwmw-45rq
The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to upload any file type to a candidate's profile picture folder via a crafted recruitment_online/personalData/act_personaltab.cfm multiple-part POST request with a predictable WRC01_USERID parameter. Moreover, the attacker can upload executable content (e.g., asp or aspx) for executing OS commands on the server.
[]
GHSA-hfvg-pfv5-xv72
A Cross-site Scripting (XSS) vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user provided input, aka 'Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability'. This CVE ID is unique from CVE-2019-0866, CVE-2019-0867, CVE-2019-0870, CVE-2019-0871.
[]
GHSA-m47g-xpq3-cwh3
TP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities.
[]
GHSA-7xgw-66xc-q4x3
Unspecified vulnerability in Atmail before 6.6.4, and 7.x before 7.1.2, has unknown impact and attack vectors, a different vulnerability than CVE-2013-5031, CVE-2013-5032, and CVE-2013-5033.
[]
GHSA-qw2f-744w-3w38
The (1) Upsell.htm, (2) Main.html, and (3) Custsupport.html components in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allow remote attackers to inject code into the RealOneActiveXObject process, and consequently bypass intended Local Machine Zone restrictions and load arbitrary ActiveX controls, via unspecified vectors.
[]
GHSA-px85-vjfw-cm92
In the Linux kernel, the following vulnerability has been resolved:tracing: Correct the length check which causes memory corruptionWe've suffered from severe kernel crashes due to memory corruption on our production environment, like,Call Trace: [1640542.554277] general protection fault: 0000 [#1] SMP PTI [1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G [1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190 [1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286 [1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX: 0000000006e931bf [1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI: ffff9a45ff004300 [1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09: 0000000000000000 [1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff9a20608d [1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15: 696c662f65636976 [1640542.563128] FS: 00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000) knlGS:0000000000000000 [1640542.563937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4: 00000000003606e0 [1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [1640542.566742] Call Trace: [1640542.567009] anon_vma_clone+0x5d/0x170 [1640542.567417] __split_vma+0x91/0x1a0 [1640542.567777] do_munmap+0x2c6/0x320 [1640542.568128] vm_munmap+0x54/0x70 [1640542.569990] __x64_sys_munmap+0x22/0x30 [1640542.572005] do_syscall_64+0x5b/0x1b0 [1640542.573724] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [1640542.575642] RIP: 0033:0x7f45d6e61e27James Wang has reproduced it stably on the latest 4.19 LTS. After some debugging, we finally proved that it's due to ftrace buffer out-of-bound access using a debug tool as follows: [ 86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000 [ 86.780806] no_context+0xdf/0x3c0 [ 86.784327] __do_page_fault+0x252/0x470 [ 86.788367] do_page_fault+0x32/0x140 [ 86.792145] page_fault+0x1e/0x30 [ 86.795576] strncpy_from_unsafe+0x66/0xb0 [ 86.799789] fetch_memory_string+0x25/0x40 [ 86.804002] fetch_deref_string+0x51/0x60 [ 86.808134] kprobe_trace_func+0x32d/0x3a0 [ 86.812347] kprobe_dispatcher+0x45/0x50 [ 86.816385] kprobe_ftrace_handler+0x90/0xf0 [ 86.820779] ftrace_ops_assist_func+0xa1/0x140 [ 86.825340] 0xffffffffc00750bf [ 86.828603] do_sys_open+0x5/0x1f0 [ 86.832124] do_syscall_64+0x5b/0x1b0 [ 86.835900] entry_SYSCALL_64_after_hwframe+0x44/0xa9commit b220c049d519 ("tracing: Check length before giving out the filter buffer") adds length check to protect trace data overflow introduced in 0fc1b09ff1ff, seems that this fix can't prevent overflow entirely, the length check should also take the sizeof entry->array[0] into account, since this array[0] is filled the length of trace data and occupy addtional space and risk overflow.
[]
CVE-2024-13710
Estatebud – Properties & Listings <= 5.5.0 - Cross-Site Request Forgery to Settings Update
The Estatebud – Properties & Listings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.0. This is due to missing or incorrect nonce validation on the 'estatebud_settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-qmqh-r82r-6q87
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit.
[]
CVE-2021-32980
Automation Direct CLICK PLC CPU Modules Authentication Bypass Using an Alternate Path or Channel
Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 does not protect against additional software programming connections. An attacker can connect to the PLC while an existing connection is already active.
[ "cpe:2.3:o:automationdirect:c0-10dd1e-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-10dd1e-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-10dd2e-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-10dd2e-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-10dre-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-10dre-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-10are-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-10are-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-11dd1e-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-11dd1e-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-11dd2e-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-11dd2e-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-11dre-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-11dre-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-11are-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-11are-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dd1e-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dd1e-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dd2e-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dd2e-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dre-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dre-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12are-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12are-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dd1e-1-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dd1e-1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dd2e-1-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dd2e-1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dre-1-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dre-1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12are-1-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12are-1-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dd1e-2-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dd1e-2-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dd2e-2-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dd2e-2-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12dre-2-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12dre-2-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:automationdirect:c0-12are-2-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:automationdirect:c0-12are-2-d:-:*:*:*:*:*:*:*" ]
GHSA-w886-qhqq-w433
SQL injection vulnerabilities exist in the CheckDuplicateStudent.php page of OS4Ed openSIS 7.3. The byear parameter in the page CheckDuplicateStudent.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[]
GHSA-75pw-vg89-wmq9
The (1) Net.Commerce and (2) Net.Data components in IBM WebSphere Commerce Suite store sensitive information under the web root with insufficient access control, which allows remote attackers to discover passwords, and database and filesystem details, via direct requests for configuration files.
[]
CVE-2000-0404
The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability.
[ "cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*" ]
GHSA-fvg4-h7q3-6jvm
The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
[]
GHSA-rx4w-347q-2m87
Windows Network File System Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22029.
[]
GHSA-hf6p-4rv2-9qrp
Path Traversal in bikshed
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing include, include-code or include-raw block is processed. The contents of arbitrary files could be disclosed in the HTML output.
[]
CVE-2024-32399
Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.
[ "cpe:2.3:a:raidenmaild:raidenmaild:-:*:*:*:*:*:*:*" ]
GHSA-4cj4-8f6r-7v4g
WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1.
[]