id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-472r-85fw-28pc | The mintToken function of a smart contract implementation for NEXPARA, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
CVE-2001-1546 | Pathways Homecare 6.5 uses weak encryption for user names and passwords, which allows local users to gain privileges by recovering the passwords from the pwhc.ini file. | [
"cpe:2.3:a:mckesson:pathways_homecare:6.5:*:*:*:*:*:*:*"
] |
|
GHSA-54fp-2g66-5c89 | Remote Procedure Call Information Disclosure Vulnerability | [] |
|
CVE-2006-4207 | Multiple PHP remote file inclusion vulnerabilities in Bob Jewell Discloser 0.0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the fileloc parameter to (1) content/content.php or (2) /inc/indexhead.php. | [
"cpe:2.3:a:bob_jewell:discloser:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-46208 | WordPress Motors – Car Dealer & Classified Ads Plugin <= 1.4.6 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in StylemixThemes Motors – Car Dealer, Classifieds & Listing plugin <= 1.4.6 versions. | [
"cpe:2.3:a:stylemixthemes:motors_-_car_dealer\\,_classifieds_\\&_listing:*:*:*:*:*:wordpress:*:*"
] |
GHSA-f46w-cpqw-2pqr | In the Linux kernel, the following vulnerability has been resolved:rapidio: add check for rio_add_net() in rio_scan_alloc_net()The return value of rio_add_net() should be checked. If it fails,
put_device() should be called to free the memory and give up the reference
initialized in rio_add_net(). | [] |
|
CVE-2009-0297 | SQL injection vulnerability in login_check.asp in ClickAuction allows remote attackers to execute arbitrary SQL commands via the (1) txtEmail and (2) txtPassword parameters. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:clicktech:clickauction:_nil_:*:*:*:*:*:*:*"
] |
|
GHSA-x47q-mxmv-rxrj | MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 allows remote authenticated users to gain sensitive information via an HTTP request to (1) calendar_d.html, (2) calendar_m.html, (3) calendar_w.html, or (4) calendar_y.html, which reveal the installation path. | [] |
|
CVE-2018-6006 | SQL Injection exists in the JS Autoz 1.0.9 component for Joomla! via the vtype, pre, or prs parameter. | [
"cpe:2.3:a:joomsky:js_autoz:1.0.9:*:*:*:*:joomla\\!:*:*"
] |
|
CVE-2019-8291 | Online Store System v1.0 delete_file.php doesn't check to see if a user has administrative rights nor does it check for path traversal. | [
"cpe:2.3:a:online_store_system_project:online_store_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-10887 | NiceJob <= 3.6.5 - Authenticated (Contributor+) Stored Cross-Site Scripting | The NiceJob plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes (nicejob-lead, nicejob-review, nicejob-engage, nicejob-badge, nicejob-stories) in all versions up to, and including, 3.6.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2005-1011 | SQL injection vulnerability in content.asp in SiteEnable allows remote attackers to execute arbitrary SQL commands via the sortby parameter. | [
"cpe:2.3:a:iatek:siteenable:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-6513 | The WHMCS Reseller Module V2 2.0.2 in Softaculous Virtualizor before 2.9.1.0 does not verify the user correctly, which allows remote authenticated users to control other virtual machines managed by Virtualizor by accessing a modified URL. | [
"cpe:2.3:a:softaculous:whmcs_reseller_module:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:softaculous:virtualizor:*:*:*:*:*:*:*:*"
] |
|
GHSA-c3ch-5j34-5m4f | CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 has a hardcoded application password, which makes it easier for remote authenticated users to obtain application-file access via unspecified vectors. | [] |
|
CVE-2024-36448 | Apache IoTDB Workbench: SSRF Vulnerability (EOL) | ** UNSUPPORTED WHEN ASSIGNED ** Server-Side Request Forgery (SSRF) vulnerability in Apache IoTDB Workbench.
This issue affects Apache IoTDB Workbench: from 0.13.0.
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
"cpe:2.3:a:apache:iotdb_workbench:*:*:*:*:*:*:*:*"
] |
CVE-2017-10887 | Untrusted search path vulnerability in BOOK WALKER for Windows Ver.1.2.9 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:bookwalker:book_walker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-r9vf-85j7-c8f6 | An issue was discovered in Eventum 3.5.0. /htdocs/validate.php has XSS via the values parameter. | [] |
|
CVE-2024-40884 | Unauthorized disabling of invite URL | Mattermost versions 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 fail to properly enforce permissions which allows a team admin user without "Add Team Members" permission to disable the invite URL. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:9.10.0:*:*:*:*:*:*:*"
] |
GHSA-6f6x-3w45-x5jc | The login password of the web administrative dashboard in Arcadyan Wifi routers VRV9506JAC23 is sent in cleartext, allowing an attacker to sniff and intercept traffic to learn the administrative credentials to the router. | [] |
|
GHSA-7556-p52v-pp8q | DBHcms v1.2.0 has a stored xss vulnerability as there is no htmlspecialchars function for '$_POST['pageparam_insert_name']' variable in dbhcms\mod\mod.page.edit.php line 227, A remote authenticated with admin user can exploit this vulnerability to hijack other users. | [] |
|
CVE-2004-0851 | The (1) write_list and (2) dump_curr_list functions in Net-Acct before 0.71 allows local users to overwrite arbitrary files via a symlink attack on temporary files. | [
"cpe:2.3:a:ulrich_callmeier:net-acct:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrich_callmeier:net-acct:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrich_callmeier:net-acct:0.71:*:*:*:*:*:*:*"
] |
|
GHSA-4wcr-6rhv-9fh4 | The pluggable authentication module for mysql (pam_mysql) before 0.4.7 does not properly cleanse user input when constructing SQL statements, which allows attackers to obtain plaintext passwords or hashes. | [] |
|
CVE-2022-26528 | Realtek Linux/Android Bluetooth Mesh SDK - Buffer Overflow | Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service. | [
"cpe:2.3:a:realtek:bluetooth_mesh_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
CVE-2023-30665 | Improper input validation vulnerability in OnOemServiceMode in libsec-ril prior to SMR Jul-2023 Release 1 allows local attackers to cause an Out-Of-Bounds read. | [
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] |
|
GHSA-vxf8-wwpw-phxg | An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to access sensitive information via the EXE installer. | [] |
|
CVE-2023-6657 | SourceCodester Simple Student Attendance System student_form.php sql injection | A vulnerability classified as critical has been found in SourceCodester Simple Student Attendance System 1.0. This affects an unknown part of the file /modals/student_form.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-247365 was assigned to this vulnerability. | [
"cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2024-1629 | Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component | Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component | [] |
CVE-2006-2260 | Cross-site scripting (XSS) vulnerability in the project module (project.module) in Drupal 4.5 and 4.6 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors. | [
"cpe:2.3:a:drupal:drupal:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.6.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-29800 | A time-of-check-time-of-use (TOCTOU) race condition vulnerability was found in networkd-dispatcher. This flaw exists because there is a certain time between the scripts being discovered and them being run. An attacker can abuse this vulnerability to replace scripts that networkd-dispatcher believes to be owned by root with ones that are not. | [
"cpe:2.3:a:microsoft:windows_defender_for_endpoint:-:*:*:*:*:linux:*:*"
] |
|
CVE-2022-33939 | CENTUM VP / CS 3000 controller FCS (CP31, CP33, CP345, CP401, and CP451) contains an issue in processing communication packets, which may lead to resource consumption. If this vulnerability is exploited, an attacker may cause a denial of service (DoS) condition in ADL communication by sending a specially crafted packet to the affected product. | [
"cpe:2.3:o:yokogawa:centum_cs_3000_cp401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_cs_3000_cp401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_cs_3000_cp451_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_cs_3000_cp451:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_cs_3000_cp33_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_cs_3000_cp33:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_cs_3000_cp345_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_cs_3000_cp345:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_cs_3000_cp31_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_cs_3000_cp31:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_vp_3000_cp401_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_vp_3000_cp401:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_vp_3000_cp451_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_vp_3000_cp451:-:*:*:*:*:*:*:*"
] |
|
CVE-2011-0639 | Apple Mac OS X does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-5pr2-979m-r2r2 | The indieweb-post-kinds plugin before 1.3.1.1 for WordPress has XSS via the genericons/example.html anchor identifier. | [] |
|
CVE-2023-3741 | An OS Command injection vulnerability in NEC Platforms DT900 and DT900S Series all versions allows an attacker to execute any command on the device.
| [
"cpe:2.3:o:nec:itk-6dgs-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-6dgs-1\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32lcgs-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32lcgs-1\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32tcgs-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32tcgs-1\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-6d-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-6d-1\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-12d-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-12d-1\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-8lcx-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-8lcx-1\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-8tcgx-1\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-8tcgx-1\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-6dgs-1a\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-6dgs-1a\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32lcgs-1a\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32lcgs-1a\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32tcgs-1a\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32tcgs-1a\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-6dgs-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-6dgs-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32lcgs-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32lcgs-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32tcgs-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32tcgs-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-6d-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-6d-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-12d-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-12d-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-6dg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-6dg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-12dg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-12dg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-8lcx-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-8lcx-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-8lcg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-8lcg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32lcg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32lcg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-8tcgx-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-8tcgx-1p\\(bk\\)tel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:itk-32tcg-1p\\(bk\\)tel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:itk-32tcg-1p\\(bk\\)tel:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-6511 | Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter. | [
"cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:openfire:3.6.0:*:*:*:*:*:*:*"
] |
|
GHSA-g468-f3m4-727c | The EventPrime WordPress plugin before 3.2.0 does not have CSRF checks when creating bookings, which could allow attackers to make logged in users create unwanted bookings via CSRF attacks. | [] |
|
CVE-2022-49399 | tty: goldfish: Use tty_port_destroy() to destroy port | In the Linux kernel, the following vulnerability has been resolved:
tty: goldfish: Use tty_port_destroy() to destroy port
In goldfish_tty_probe(), the port initialized through tty_port_init()
should be destroyed in error paths.In goldfish_tty_remove(), qtty->port
also should be destroyed or else might leak resources.
Fix the above by calling tty_port_destroy(). | [] |
CVE-2016-9801 | In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c" source file when processing corrupted dump file. | [
"cpe:2.3:a:bluez:bluez:5.42:*:*:*:*:*:*:*"
] |
|
CVE-2023-49119 | Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | [
"cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-21555 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | [
"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"
] |
|
CVE-2019-14841 | A flaw was found in the RHDM, where an authenticated attacker can change their assigned role in the response header. This flaw allows an attacker to gain admin privileges in the Business Central Console. | [
"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-30370 | RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability | RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.
The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156. | [] |
CVE-2018-13691 | The mintToken function of a smart contract implementation for R Time Token v3 (RS) (Contract Name: RTokenMain), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:rtokenmain_project:rtokenmain:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-5358 | Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier might allow remote attackers to execute arbitrary code via a crafted GIF file that triggers memory corruption during display of the splash screen, possibly related to splashscreen.dll. | [
"cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*"
] |
|
GHSA-6mrr-gv8q-m9pv | uPortal before 4.0.13.1 does not properly check the CONFIG permission, which allows remote authenticated users to configure portlets by leveraging the SUBSCRIBE permission for a portlet. | [] |
|
CVE-2014-3040 | Cross-site request forgery (CSRF) vulnerability in IBM Emptoris Contract Management 9.5.x before 9.5.0.6 iFix 10, 10.0.0.x before 10.0.0.1 iFix 10, 10.0.1.x before 10.0.1.4, and 10.0.2.x before 10.0.2.2 iFix 2; Emptoris Sourcing Portfolio 9.5.x before 9.5.1.3, 10.0.0.x before 10.0.0.1, 10.0.1.x before 10.0.1.3, and 10.0.2.x before 10.0.2.4; and Emptoris Spend Analysis 9.5.x before 9.5.0.4, 10.0.1.x before 10.0.1.3, and 10.0.2.x before 10.0.2.4 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences. | [
"cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:9.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_spend_analysis:10.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:9.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing_portfolio:10.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:9.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_contract_management:10.0.2.2:*:*:*:*:*:*:*"
] |
|
GHSA-2x26-cf8j-qvpf | An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections. | [] |
|
CVE-2020-8913 | Local arbitrary code execution in splitinstall in Android's Play Core | A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later. | [
"cpe:2.3:a:android:play_core_library:*:*:*:*:*:*:*:*"
] |
GHSA-35v5-c7c4-jcvm | SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c. | [] |
|
GHSA-vgj8-9328-h497 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [] |
|
CVE-2001-0517 | Oracle listener in Oracle 8i on Solaris allows remote attackers to cause a denial of service via a malformed connection packet with a maximum transport data size that is set to 0. | [
"cpe:2.3:a:oracle:oracle8i:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:*"
] |
|
GHSA-4hxq-h6g9-89gx | A vulnerability in the web interface of Cisco Elastic Services Controllers could allow an authenticated, remote attacker to access sensitive system credentials that are stored in an affected system. More Information: CSCvd76339. Known Affected Releases: 2.2(9.76). | [] |
|
CVE-2022-32379 | itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_parents_profile.php?my_index=. | [
"cpe:2.3:a:advanced_school_management_system_project:advanced_school_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-25rq-9fcx-x8f3 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magic Hills Pty Ltd Wonder Slider Lite allows Reflected XSS.This issue affects Wonder Slider Lite: from n/a through 13.9. | [] |
|
CVE-2014-8967 | Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token sequence specifying the run-in value for the display property, leading to improper CElement reference counting. | [
"cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*"
] |
|
GHSA-x65g-79jp-p76h | In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | [] |
|
CVE-2023-43278 | A Cross-Site Request Forgery (CSRF) in admin_manager.php of Seacms up to v12.8 allows attackers to arbitrarily add an admin account. | [
"cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*"
] |
|
GHSA-8jc5-p2gp-jffv | Heap-based buffer overflow in the PoDoFo::PdfTokenizer::GetNextToken function in PdfTokenizer.cpp in PoDoFo 0.9.4 allows remote attackers to have unspecified impact via a crafted file. | [] |
|
CVE-2021-24135 | WP Customer Reviews < 3.4.3 - Multiple Unauthenticated and Low Priv Authenticated Stored XSS | Unvalidated input and lack of output encoding in the WP Customer Reviews WordPress plugin, versions before 3.4.3, lead to multiple Stored Cross-Site Scripting vulnerabilities allowing remote attackers to inject arbitrary JavaScript code or HTML. | [
"cpe:2.3:a:gowebsolutions:wp_customer_reviews:*:*:*:*:*:wordpress:*:*"
] |
GHSA-rx9r-2whj-rpjv | Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances. | [] |
|
GHSA-q9j8-g7vg-642q | The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the accent_color and background parameter in all versions up to, and including, 1.6.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
GHSA-c888-w76p-vhx3 | Investintech.com SlimPDF Reader does not prevent faulting-address data from affecting branch selection, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document. | [] |
|
CVE-2008-5906 | Eval injection vulnerability in the web interface plugin in KTorrent before 3.1.4 allows remote attackers to execute arbitrary PHP code via unspecified parameters to this interface's PHP scripts. | [
"cpe:2.3:a:ktorrent:ktorrent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ktorrent:ktorrent:3.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-41669 | A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load a malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior). | [
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:pro-face_blue:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:pro-face_blue:3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:pro-face_blue:3.3:hotfix1:*:*:*:*:*:*"
] |
|
CVE-2009-1730 | Multiple directory traversal vulnerabilities in NetMechanica NetDecision TFTP Server 4.2 allow remote attackers to read or modify arbitrary files via directory traversal sequences in the (1) GET or (2) PUT command. | [
"cpe:2.3:a:netmechanica:netdecision_tftp_server:4.2:*:*:*:*:*:*:*"
] |
|
GHSA-gpf5-7vrh-q24p | An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation. | [] |
|
CVE-2023-45751 | WordPress Nexter Extension Plugin <= 2.0.3 is vulnerable to Remote Code Execution (RCE) | Improper Control of Generation of Code ('Code Injection') vulnerability in POSIMYTH Nexter Extension.This issue affects Nexter Extension: from n/a through 2.0.3.
| [
"cpe:2.3:a:posimyth:nexter_extension:*:*:*:*:*:wordpress:*:*"
] |
GHSA-7372-q459-jxhr | pyxdg Arbitrary File Overwrite via Race Condition | Race condition in the `xdg.BaseDirectory.get_runtime_dir` function in pyxdg 0.25 allows local users to overwrite arbitrary files by pre-creating `/tmp/pyxdg-runtime-dir-fallback-victim` to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the `get_runtime_dir` function is called. | [] |
CVE-2000-0452 | Buffer overflow in the ESMTP service of Lotus Domino Server 5.0.1 allows remote attackers to cause a denial of service via a long MAIL FROM command. | [
"cpe:2.3:a:lotus:domino_enterprise_server:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lotus:domino_enterprise_server:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lotus:domino_enterprise_server:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lotus:domino_mail_server:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lotus:domino_mail_server:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lotus:domino_mail_server:5.0.3:*:*:*:*:*:*:*"
] |
|
CVE-1999-0355 | Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service. | [
"cpe:2.3:a:broadcom:controlit:4.5:*:*:*:*:*:*:*"
] |
|
CVE-2019-14976 | iCMS 7.0.15 allows admincp.php?app=apps XSS via the keywords parameter. | [
"cpe:2.3:a:icmsdev:icms:7.0.15:*:*:*:*:*:*:*"
] |
|
CVE-2024-51933 | WordPress Cookie Nonsense for YT plugin <= 1.2.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Christian Ladewig Cookie Nonsense for YT allows DOM-Based XSS.This issue affects Cookie Nonsense for YT: from n/a through 1.2.0. | [] |
GHSA-3pxx-76hx-4rw2 | Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411. | [] |
|
GHSA-4q7w-p44q-84m5 | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An application may be able to gain elevated privileges. | [] |
|
GHSA-9g7x-w32v-gmpx | Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array. | [] |
|
GHSA-g595-9cfg-4hxm | In the Linux kernel, the following vulnerability has been resolved:igc: Fix use-after-free error during resetCleans the next descriptor to watch (next_to_watch) when cleaning the
TX ring.Failure to do so can cause invalid memory accesses. If igc_poll() runs
while the controller is being reset this can lead to the driver try to
free a skb that was already freed.Log message:[ 101.525242] refcount_t: underflow; use-after-free.
[ 101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0
[ 101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E)
x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E)
ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E)
rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E)
soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E)
iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E)
soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E)
autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E)
i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E)
[ 101.525303] drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E)
e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E)
usbcore(E) drm(E) button(E) video(E)
[ 101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G E 5.10.30-rt37-tsn1-rt-ipipe #ipipe
[ 101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017
[ 101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0
[ 101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48
44 01 01 e8 d1 c6 42 00 <0f> 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3
[ 101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286
[ 101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001
[ 101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff
[ 101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50
[ 101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00
[ 101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40
[ 101.525337] FS: 0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000
[ 101.525339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0
[ 101.525343] Call Trace:
[ 101.525346] sock_wfree+0x9c/0xa0
[ 101.525353] unix_destruct_scm+0x7b/0xa0
[ 101.525358] skb_release_head_state+0x40/0x90
[ 101.525362] skb_release_all+0xe/0x30
[ 101.525364] napi_consume_skb+0x57/0x160
[ 101.525367] igc_poll+0xb7/0xc80 [igc]
[ 101.525376] ? sched_clock+0x5/0x10
[ 101.525381] ? sched_clock_cpu+0xe/0x100
[ 101.525385] net_rx_action+0x14c/0x410
[ 101.525388] __do_softirq+0xe9/0x2f4
[ 101.525391] __local_bh_enable_ip+0xe3/0x110
[ 101.525395] ? irq_finalize_oneshot.part.47+0xe0/0xe0
[ 101.525398] irq_forced_thread_fn+0x6a/0x80
[ 101.525401] irq_thread+0xe8/0x180
[ 101.525403] ? wake_threads_waitq+0x30/0x30
[ 101.525406] ? irq_thread_check_affinity+0xd0/0xd0
[ 101.525408] kthread+0x183/0x1a0
[ 101.525412] ? kthread_park+0x80/0x80
[ 101.525415] ret_from_fork+0x22/0x30 | [] |
|
CVE-2021-24450 | ProfilePress < 3.1.8 - Authenticated Stored XSS | The User Registration, User Profiles, Login & Membership – ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.8 did not sanitise or escape some of its settings before saving them and outputting them back in the page, allowing high privilege users such as admin to set JavaScript payloads in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue | [
"cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*"
] |
CVE-2023-43234 | DedeBIZ v6.2.11 was discovered to contain multiple remote code execution (RCE) vulnerabilities at /admin/file_manage_control.php via the $activepath and $filename parameters. | [
"cpe:2.3:a:dedebiz:dedebiz:6.2.11:*:*:*:*:*:*:*"
] |
|
CVE-2024-11455 | Include Mastodon Feed <= 1.9.5 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Include Mastodon Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'include-mastodon-feed' shortcode in all versions up to, and including, 1.9.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2018-6398 | SQL Injection exists in the CP Event Calendar 3.0.1 component for Joomla! via the id parameter in a task=load action. | [
"cpe:2.3:a:joomlacalendars:event_calendar:3.0.1:*:*:*:*:joomla\\!:*:*"
] |
|
GHSA-94c3-g97c-h69h | Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass. | [] |
|
GHSA-j7p2-m4ff-pw4r | In Blue Planet® products through 22.12, a misconfiguration in the SAML implementation allows for privilege escalation. Only products using SAML authentication are affected.Blue Planet® has released software updates that address this vulnerability for the affected products. Customers are advised to upgrade their Blue Planet products to the latest software version as soon as possible. The software updates can be downloaded from the Ciena Support Portal. | [] |
|
GHSA-rgrq-pg8h-w7h3 | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
CVE-2023-39401 | Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization. | [
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-v9q3-wwmw-45rq | The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to upload any file type to a candidate's profile picture folder via a crafted recruitment_online/personalData/act_personaltab.cfm multiple-part POST request with a predictable WRC01_USERID parameter. Moreover, the attacker can upload executable content (e.g., asp or aspx) for executing OS commands on the server. | [] |
|
GHSA-hfvg-pfv5-xv72 | A Cross-site Scripting (XSS) vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user provided input, aka 'Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability'. This CVE ID is unique from CVE-2019-0866, CVE-2019-0867, CVE-2019-0870, CVE-2019-0871. | [] |
|
GHSA-m47g-xpq3-cwh3 | TP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities. | [] |
|
GHSA-7xgw-66xc-q4x3 | Unspecified vulnerability in Atmail before 6.6.4, and 7.x before 7.1.2, has unknown impact and attack vectors, a different vulnerability than CVE-2013-5031, CVE-2013-5032, and CVE-2013-5033. | [] |
|
GHSA-qw2f-744w-3w38 | The (1) Upsell.htm, (2) Main.html, and (3) Custsupport.html components in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allow remote attackers to inject code into the RealOneActiveXObject process, and consequently bypass intended Local Machine Zone restrictions and load arbitrary ActiveX controls, via unspecified vectors. | [] |
|
GHSA-px85-vjfw-cm92 | In the Linux kernel, the following vulnerability has been resolved:tracing: Correct the length check which causes memory corruptionWe've suffered from severe kernel crashes due to memory corruption on
our production environment, like,Call Trace:
[1640542.554277] general protection fault: 0000 [#1] SMP PTI
[1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G
[1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190
[1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286
[1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX:
0000000006e931bf
[1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI:
ffff9a45ff004300
[1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09:
0000000000000000
[1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12:
ffffffff9a20608d
[1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15:
696c662f65636976
[1640542.563128] FS: 00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000)
knlGS:0000000000000000
[1640542.563937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4:
00000000003606e0
[1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[1640542.566742] Call Trace:
[1640542.567009] anon_vma_clone+0x5d/0x170
[1640542.567417] __split_vma+0x91/0x1a0
[1640542.567777] do_munmap+0x2c6/0x320
[1640542.568128] vm_munmap+0x54/0x70
[1640542.569990] __x64_sys_munmap+0x22/0x30
[1640542.572005] do_syscall_64+0x5b/0x1b0
[1640542.573724] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[1640542.575642] RIP: 0033:0x7f45d6e61e27James Wang has reproduced it stably on the latest 4.19 LTS.
After some debugging, we finally proved that it's due to ftrace
buffer out-of-bound access using a debug tool as follows:
[ 86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000
[ 86.780806] no_context+0xdf/0x3c0
[ 86.784327] __do_page_fault+0x252/0x470
[ 86.788367] do_page_fault+0x32/0x140
[ 86.792145] page_fault+0x1e/0x30
[ 86.795576] strncpy_from_unsafe+0x66/0xb0
[ 86.799789] fetch_memory_string+0x25/0x40
[ 86.804002] fetch_deref_string+0x51/0x60
[ 86.808134] kprobe_trace_func+0x32d/0x3a0
[ 86.812347] kprobe_dispatcher+0x45/0x50
[ 86.816385] kprobe_ftrace_handler+0x90/0xf0
[ 86.820779] ftrace_ops_assist_func+0xa1/0x140
[ 86.825340] 0xffffffffc00750bf
[ 86.828603] do_sys_open+0x5/0x1f0
[ 86.832124] do_syscall_64+0x5b/0x1b0
[ 86.835900] entry_SYSCALL_64_after_hwframe+0x44/0xa9commit b220c049d519 ("tracing: Check length before giving out
the filter buffer") adds length check to protect trace data
overflow introduced in 0fc1b09ff1ff, seems that this fix can't prevent
overflow entirely, the length check should also take the sizeof
entry->array[0] into account, since this array[0] is filled the
length of trace data and occupy addtional space and risk overflow. | [] |
|
CVE-2024-13710 | Estatebud – Properties & Listings <= 5.5.0 - Cross-Site Request Forgery to Settings Update | The Estatebud – Properties & Listings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.5.0. This is due to missing or incorrect nonce validation on the 'estatebud_settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
GHSA-qmqh-r82r-6q87 | In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit. | [] |
|
CVE-2021-32980 | Automation Direct CLICK PLC CPU Modules Authentication Bypass Using an Alternate Path or Channel | Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 does not protect against additional software programming connections. An attacker can connect to the PLC while an existing connection is already active. | [
"cpe:2.3:o:automationdirect:c0-10dd1e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10dd1e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-10dd2e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10dd2e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-10dre-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10dre-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-10are-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10are-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11dd1e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11dd1e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11dd2e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11dd2e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11dre-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11dre-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11are-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11are-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd1e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd1e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd2e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd2e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dre-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dre-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12are-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12are-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd1e-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd1e-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd2e-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd2e-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dre-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dre-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12are-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12are-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd1e-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd1e-2-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd2e-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd2e-2-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dre-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dre-2-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12are-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12are-2-d:-:*:*:*:*:*:*:*"
] |
GHSA-w886-qhqq-w433 | SQL injection vulnerabilities exist in the CheckDuplicateStudent.php page of OS4Ed openSIS 7.3. The byear parameter in the page CheckDuplicateStudent.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [] |
|
GHSA-75pw-vg89-wmq9 | The (1) Net.Commerce and (2) Net.Data components in IBM WebSphere Commerce Suite store sensitive information under the web root with insufficient access control, which allows remote attackers to discover passwords, and database and filesystem details, via direct requests for configuration files. | [] |
|
CVE-2000-0404 | The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability. | [
"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-fvg4-h7q3-6jvm | The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file. | [] |
|
GHSA-rx4w-347q-2m87 | Windows Network File System Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22029. | [] |
|
GHSA-hf6p-4rv2-9qrp | Path Traversal in bikshed | This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing include, include-code or include-raw block is processed. The contents of arbitrary files could be disclosed in the HTML output. | [] |
CVE-2024-32399 | Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component. | [
"cpe:2.3:a:raidenmaild:raidenmaild:-:*:*:*:*:*:*:*"
] |
|
GHSA-4cj4-8f6r-7v4g | WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.