id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-8g6x-mrx6-77x2 | Microsoft Message Queuing Information Disclosure Vulnerability | [] |
|
GHSA-2xvp-rr3g-fp69 | IBM Cloud Pak for Multicloud Management prior to 2.3 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 188902. | [] |
|
CVE-2022-45435 | SailPoint IdentityIQ Access Control Bypass | IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p2, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p5, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6, and all prior versions allow authenticated users assigned the Identity Administrator capability or any custom capability that contains the SetIdentityForwarding right to modify the work item forwarding configuration for identities other than the ones that should be allowed by Lifecycle Manager Quicklink Population configuration. | [
"cpe:2.3:a:sailpoint:identityiq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch3:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch4:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch5:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch6:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*"
] |
CVE-2018-7408 | An issue was discovered in an npm 5.7.0 2018-02-21 pre-release (marked as "next: 5.7.0" and therefore automatically installed by an "npm upgrade -g npm" command, and also announced in the vendor's blog without mention of pre-release status). It might allow local users to bypass intended filesystem access restrictions because ownerships of /etc and /usr directories are being changed unexpectedly, related to a "correctMkdir" issue. | [
"cpe:2.3:a:npmjs:npm:5.7.0:*:*:*:*:*:*:*"
] |
|
GHSA-4f4g-m6h2-8q23 | In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813. | [] |
|
GHSA-m5jw-hjp2-vr52 | An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared region with the hypervisor. The region will be mapped into Xen address space so it can be directly accessed. On Arm, the region is accessed with instructions that require a specific alignment. Unfortunately, there is no check that the address provided by the guest will be correctly aligned. As a result, a malicious guest could cause a hypervisor crash by passing a misaligned address. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). All Xen versions are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected. | [] |
|
GHSA-2249-cm45-wqc4 | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formSetWanL2TP of the file /goform/formSetWanL2TP. The manipulation of the argument webpage leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2020-27941 | A validation issue was addressed with improved logic. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-fgm6-7jjf-rmqm | In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service. | [] |
|
CVE-2023-0903 | SourceCodester Employee Task Management System edit-task.php sql injection | A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452. | [
"cpe:2.3:a:employee_task_management_system_project:employee_task_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2024-27878 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.6. An app with root privileges may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-2327 | Unspecified vulnerability in the environmental monitoring subsystem in Solaris 8 running on Sun Fire 280R, V480 and V880 allows local users to cause a denial of service by setting volatile properties. | [
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sun_fire:280r:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sun_fire:v480:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sun_fire:v880:*:*:*:*:*:*:*"
] |
|
GHSA-j74g-h82x-vgj7 | FrontAccounting 2.4.3 suffers from a CSRF flaw, which leads to adding a user account via admin/users.php (aka the "add user" feature of the User Permissions page). | [] |
|
GHSA-2h7p-xm3f-96jx | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993. | [] |
|
GHSA-r329-wqv5-772f | SQL injection vulnerability in print.php in the Articles 1.02 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] |
|
GHSA-444w-xm89-r2p5 | In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code. | [] |
|
GHSA-9c6h-v7gx-w647 | The Pago por Redsys plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'Ds_MerchantParameters' parameter in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
GHSA-jhcr-hph9-g7wm | Deserialization vulnerability in Helix workflow and REST | An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. This unbounded deserialization can likely lead to remote code execution. The code can be run in Helix REST start and Workflow creation.Affect all the versions lower and include 1.2.0.Affected products: helix-core, helix-restMitigation: Short term, stop using any YAML based configuration and workflow creation.
Long term, all Helix version bumping up to 1.3.0 | [] |
GHSA-3j7c-gxhc-gfrg | Adobe Document Server for Reader Extensions 6.0 allows remote authenticated users to inject arbitrary web script via a leading (1) ftp or (2) http URI in the ReaderURL variable in the "Update Download Site" section of ads-readerext. NOTE: it is not clear whether the vendor advisory addresses this issue. In addition, since the issue requires administrative privileges to exploit, it is not clear whether this crosses security boundaries. | [] |
|
CVE-2010-3594 | Unspecified vulnerability in the Real User Experience Insight component in Oracle Enterprise Manager Grid Control 6.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Processing. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this is SQL injection in rsynclogdird involving improper escaping of UTF-8 characters while processing log files. | [
"cpe:2.3:a:oracle:enterprise_manager_grid_control:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-rwhv-hvj2-qrqm | Liferay Portal Frontend JS module's portlet.js and Liferay DXP vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in the Frontend JS module's portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL. | [] |
CVE-2024-22159 | WordPress WOLF Plugin <= 1.0.8 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional allows Reflected XSS.This issue affects WOLF – WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.
| [
"cpe:2.3:a:pluginus:wolf_-_wordpress_posts_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-0963 | Unrestricted XML Files Leads to Stored XSS in microweber/microweber | Unrestricted XML Files Leads to Stored XSS in GitHub repository microweber/microweber prior to 1.2.12. | [
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] |
CVE-2016-10155 | Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2009-2995 | Integer overflow in Adobe Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service via unspecified vectors. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*"
] |
|
GHSA-wjrx-825m-6vc9 | Cross-site scripting (XSS) vulnerability in CodeIgniter 1.5.3 before 20070626 allows remote attackers to inject arbitrary web script or HTML via (1) String.fromCharCode and (2) malformed nested tag manipulations in an unspecified component, related to insufficient sanitization by the xss_clean function. | [] |
|
GHSA-7hfg-gh8m-8f4x | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ydesignservices YDS Support Ticket System allows SQL Injection.This issue affects YDS Support Ticket System: from n/a through 1.0. | [] |
|
GHSA-wxp5-9w64-pp68 | A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device. | [] |
|
GHSA-w6mr-mj53-x258 | Duplicate Advisory: Zip Exploit Crashes Picklescan But Not PyTorch | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-7q5r-7gvp-wc82. This link is maintained to preserve external references.Original Descriptionpicklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection. | [] |
CVE-2009-0173 | Unspecified vulnerability in the server in IBM DB2 8 before FP17a, 9.1 before FP6a, and 9.5 before FP3a allows remote authenticated users to cause a denial of service (trap) via a crafted data stream. | [
"cpe:2.3:a:ibm:db2_universal_database:9.1:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.1:ga:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:windows:*:*:*:*:*"
] |
|
CVE-2023-3029 | Guangdong Pythagorean OA Office System delete cross-site request forgery | A vulnerability has been found in Guangdong Pythagorean OA Office System up to 4.50.31 and classified as problematic. This vulnerability affects unknown code of the file /note/index/delete. The manipulation of the argument id leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230458 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:pythagorean_oa_office_system_project:pythagorean_oa_office_system:*:*:*:*:*:*:*:*"
] |
CVE-2024-31278 | WordPress Premium Addons for Elementor plugin <= 4.10.22 - Sensitive Data Exposure vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Leap13 Premium Addons for Elementor.This issue affects Premium Addons for Elementor: from n/a through 4.10.22.
| [
"cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
] |
CVE-2021-40965 | A Cross-Site Request Forgery (CSRF) vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload files and run OS commands by inducing the Administrator user to browse a URL controlled by an attacker. | [
"cpe:2.3:a:tinyfilemanager_project:tinyfilemanager:*:*:*:*:*:*:*:*"
] |
|
GHSA-5mfr-qw98-pxjr | The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.8.3 via hardcoded API Keys. This makes it possible for unauthenticated attackers to extract sensitive data including PII. | [] |
|
GHSA-9574-p2wg-j9cw | The embed-comment-images plugin before 0.6 for WordPress has XSS. | [] |
|
GHSA-prxh-8g89-x88j | IBM Security Access Manager 9.0.1 through 9.0.6 is affected by a security vulnerability that could allow authenticated users to impersonate other users. IBM X-Force ID: 158331. | [] |
|
CVE-2015-1909 | The XML parser in the Reference Data Management component in the server in IBM InfoSphere Master Data Management (MDM) 10.1 before IF1, 11.0 before FP3, 11.3, and 11.4 before FP2 allows remote attackers to read arbitrary files, and consequently obtain administrative access, via an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [
"cpe:2.3:a:ibm:infosphere_master_data_management_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server:11.4:*:*:*:*:*:*:*"
] |
|
GHSA-cxqv-ww34-rc46 | An internal product security audit of LXCO, prior to version 1.2.2, discovered that optional passwords, if specified, for the Syslog and SMTP forwarders are written to an internal LXCO log file in clear text. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file. | [] |
|
CVE-2023-27622 | WordPress GuruWalk Affiliates Plugin <= 1.0.0 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Abel Ruiz GuruWalk Affiliates plugin <= 1.0.0 versions. | [
"cpe:2.3:a:guruwalk:guruwalk_affiliates:*:*:*:*:*:wordpress:*:*"
] |
GHSA-pf22-5278-8mrp | iDrive RemotePC before 4.0.1 on Linux allows denial of service. A remote and unauthenticated attacker can disconnect a valid user session by connecting to an ephemeral port. | [] |
|
GHSA-gvj3-g3g4-cwmm | SQL injection vulnerability in listmembers.php in EQdkp 1.3.2 and earlier allows remote attackers to execute arbitrary SQL commands via the rank parameter. | [] |
|
GHSA-gw5v-pjxv-pj3h | Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML. | [] |
|
GHSA-wxxr-rfhp-3pg5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imFORZA WP Listings Pro allows Stored XSS.This issue affects WP Listings Pro: from n/a through 3.0.14. | [] |
|
CVE-2018-12823 | Adobe Digital Editions versions 4.5.8 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-41947 | A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials. | [
"cpe:2.3:a:jenkins:frugal_testing:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2018-20468 | An issue was discovered in Tyto Sahi Pro through 7.x.x and 8.0.0. A web reports module has "export to excel features" that are vulnerable to CSV injection. An attacker can embed Excel formulas inside an automation script that, when exported after execution, results in code execution. | [
"cpe:2.3:a:sahipro:sahi_pro:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-35590 | A cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the "end_date" Parameter | [
"cpe:2.3:a:fork-cms:fork_cms:5.9.3:*:*:*:*:*:*:*"
] |
|
GHSA-fm4g-p248-j5wj | [This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.CVE-2023-34327 - An HVM vCPU can end up operating in the context of
a previous vCPUs debug mask state.CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
up the CPU entirely. | [] |
|
GHSA-3x58-92jg-qfcg | Vulnerability in HP MPE/iX 6.0 through 7.0 allows attackers to cause a denial of service (system failure with "SA1457 out of i_port_timeout.fix_up_message_frame") via malformed IP packets. | [] |
|
GHSA-38pr-c838-mh5j | Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22011, CVE-2022-29112. | [] |
|
GHSA-hqq7-9p4f-x9pj | Citrix Secure Mail for Android before 20.11.0 suffers from Improper Control of Generation of Code ('Code Injection') by allowing unauthenticated access to read data stored within Secure Mail. Note that a malicious app would need to be installed on the Android device or a threat actor would need to execute arbitrary code on the Android device. | [] |
|
CVE-2024-47320 | WordPress WS Form LITE plugin <= 1.9.238 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WS Form WS Form LITE allows Stored XSS.This issue affects WS Form LITE: from n/a through 1.9.238. | [] |
GHSA-wxv5-fj7c-mj9g | Multiple eval injection vulnerabilities in PlainBlack Software WebGUI before 6.7.3 allow remote attackers to execute arbitrary Perl code via (1) Help.pm, (2) International.pm, or (3) WebGUI.pm. | [] |
|
GHSA-54v8-5r88-9g69 | An issue was discovered in Schneider Electric Conext ComBox, model 865-1058, all firmware versions prior to V3.03 BN 830. A series of rapid requests to the device may cause it to reboot. | [] |
|
GHSA-4r7v-vq9j-hv62 | A vulnerability in the web-based management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to improper input validation of log file content stored on the affected device. An attacker could exploit this vulnerability by modifying a log file with malicious code and getting a user to view the modified log file. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information. | [] |
|
GHSA-5cgv-pmc9-c3v3 | The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions. | [] |
|
CVE-2023-48800 | In TOTOLINK X6000R_Firmware V9.4.0cu.852_B20230719, the shttpd file sub_417338 function obtains fields from the front-end, connects them through the snprintf function, and passes them to the CsteSystem function, resulting in a command execution vulnerability. | [
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] |
|
GHSA-47jh-phv8-4gm6 | A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Menu Name field at /login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn. | [] |
|
CVE-2019-5615 | Rapid7 InsightVM Stored Credential Exposure | Users with Site-level permissions can access files containing the username-encrypted passwords of Security Console Global Administrators and clear-text passwords for restoring backups, as well as the salt for those passwords. Valid credentials are required to access these files and malicious users would still need to perform additional work to decrypt the credentials and escalate privileges. This issue affects: Rapid7 InsightVM versions 6.5.11 through 6.5.49. | [
"cpe:2.3:a:rapid7:insightvm:*:*:*:*:*:*:*:*"
] |
CVE-2000-0116 | Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. | [
"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-2470 | Integer underflow in Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office for Mac 2011, and Word Viewer allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Integer Underflow Vulnerability." | [
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2011:*:*:*:mac:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*"
] |
|
GHSA-qx8w-qf9q-g5vp | By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84. | [] |
|
GHSA-xmph-r8h2-5h79 | In the Linux kernel, the following vulnerability has been resolved:drm/radeon: possible buffer overflowBuffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is
checked after access. | [] |
|
CVE-2017-12294 | A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf85562. | [
"cpe:2.3:a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-27694 | Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service. | [] |
|
GHSA-cgj5-28gf-v5vw | The Control Panel applet in WFTPD and WFTPD Pro 3.21 R1 and R2 allows remote authenticated users to cause a denial of service (crash) via a long FTP command. | [] |
|
CVE-2024-10566 | Slider by 10Web < 1.2.62 - Contributor+ Stored XSS | The Slider by 10Web WordPress plugin before 1.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] |
CVE-2020-0527 | Insufficient control flow management in firmware for some Intel(R) Data Center SSDs may allow a privileged user to potentially enable information disclosure via local access. | [
"cpe:2.3:o:intel:ssd_d3-s4510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ssd_d3-s4510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ssd_dc_p4510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ssd_dc_p4510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ssd_dc_p4610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ssd_dc_p4610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ssd_dc_p4618_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ssd_dc_p4618:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ssd_dc_p4511_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ssd_dc_p4511:-:*:*:*:*:*:*:*"
] |
|
GHSA-xr2p-42gc-m46q | ** DISPUTED ** On ShapeShift KeepKey devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover secret data shown on the display. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is "insignificant risk." | [] |
|
CVE-2022-45439 | A pair of spare WiFi credentials is stored in the configuration file of the Zyxel AX7501-B0 firmware prior to V5.17(ABPC.3)C0 in cleartext. An unauthenticated attacker could use the credentials to access the WLAN service if the configuration file has been retrieved from the device by leveraging another known vulnerability. | [
"cpe:2.3:o:zyxel:ax7501-b0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*"
] |
|
GHSA-59hj-pg8f-pgxq | Cross-Site Request Forgery (CSRF) vulnerability in Dennis Koot wpSOL allows Stored XSS.This issue affects wpSOL: from n/a through 1.2.0. | [] |
|
GHSA-6mjh-qj4v-3982 | Cross-site scripting (XSS) vulnerability in index.php in Warcraft III Replay Parser for PHP 1.8c allows remote attackers to inject arbitrary web script or HTML via the page parameter. NOTE: post-disclosure analysis by CVE suggests that the "page" parameter is not used in this product, and "id" might be the affected parameter. | [] |
|
CVE-2025-32594 | WordPress Simple WP Events plugin <= 1.8.17 - Sensitive Data Exposure vulnerability | Insertion of Sensitive Information Into Sent Data vulnerability in WPMinds Simple WP Events allows Retrieve Embedded Sensitive Data. This issue affects Simple WP Events: from n/a through 1.8.17. | [] |
CVE-2024-11323 | AI Quiz | Quiz Maker <= 1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update | The AI Quiz | Quiz Maker plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ai_quiz_update_style() function in all versions up to, and including, 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | [
"cpe:2.3:a:autoquiz:ai_quiz:*:*:*:*:*:*:*:*"
] |
GHSA-gf37-7jp8-4qpf | Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody. | [] |
|
GHSA-v7m8-x7qg-v835 | Multiple cross-site scripting (XSS) vulnerabilities in index/siteforge-bugs-action/proj.siteforge in SiteForge Collaborative Development Platform 1.0.4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) _status, (2) _extra1, (3) _extra2, or (4) _extra3 parameters. | [] |
|
CVE-2021-3739 | A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*"
] |
|
GHSA-jq52-rw89-pc3g | Alps Alpine Touchpad Driver 10.3201.101.215 is vulnerable to DLL Injection. | [] |
|
CVE-2022-28173 | The web server of some Hikvision wireless bridge products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices. | [
"cpe:2.3:o:hikvision:ds-3wf0ac-2nt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-3wf0ac-2nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-3wf01c-2n\\/o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-3wf01c-2n\\/o:-:*:*:*:*:*:*:*"
] |
|
GHSA-6399-486w-r6qv | Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a disclosure of sensitive data vulnerability. Successful exploitation could lead to memory leak. | [] |
|
CVE-2020-26144 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. | [
"cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:o-105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:w-118_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w700_ieee_802.11ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w700_ieee_802.11ax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w700_ieee_802.11n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w700_ieee_802.11n:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-26709 | py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | [
"cpe:2.3:a:py-xml_project:py-xml:1.0:*:*:*:*:python:*:*"
] |
|
GHSA-m34r-f7h6-c3j2 | Jenkins AWS CloudWatch Logs Publisher Plugin stores credentials in plain text | Jenkins AWS CloudWatch Logs Publisher Plugin stores credentials unencrypted in its global configuration file `jenkins.plugins.awslogspublisher.AWSLogsConfig.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system. | [] |
CVE-2023-41850 | WordPress Outbound Link Manager Plugin <= 1.2 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Morris Bryant, Ruben Sargsyan Outbound Link Manager plugin <= 1.2 versions. | [
"cpe:2.3:a:sparro:outbound_link_manager:*:*:*:*:*:wordpress:*:*"
] |
GHSA-j4jj-c644-q3fc | In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input. | [] |
|
GHSA-h6v8-7qf5-22h6 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPKube Authors List plugin <= 2.0.2 versions. | [] |
|
GHSA-hf8x-r682-pxjh | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core Components). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L). | [] |
|
CVE-2023-47508 | WordPress Master Slider Pro Plugin <= 3.6.5 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Averta Master Slider Pro plugin <= 3.6.5 versions. | [
"cpe:2.3:a:averta:master_slider:*:*:*:*:*:wordpress:*:*"
] |
GHSA-mq5h-r3rg-j9hg | Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free. | [] |
|
CVE-2018-7907 | Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak. | [
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c100b257custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c170b253custc170d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c199b251custc199d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c229b003custc229d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:agassi-l09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c100b257custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c128b252custc128d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c170b252custc170d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c229b251custc229d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c331b003custc331d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c794b001custc794d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:agassi-w09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c100b160custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c170b160custc170d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c199b162custc199d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c209b160custc209d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c333b160custc333d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:baggio2-u01a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-al00c_firmware:bond-al00cc00b201:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-al00c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-al10b_firmware:bond-al10bc00b201:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-al10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-tl10b_firmware:bond-tl10bc01b201:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-tl10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bond-tl10c_firmware:bond-tl10cc01b131:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bond-tl10c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:haydn-l1jb_firmware:hdn-l1jc137b068:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:haydn-l1jb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c100b252custc100d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c209b002custc209d001:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c362b001custc362d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:kobe-l09a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-l09ahn_firmware:kob-l09c233b226:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:kobe-l09ahn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:kobe-w09c_firmware:kob-w09c128b251custc128d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:kobe-w09c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:lelandp-l22c_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:lelandp-l22d_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:lelandp-l22d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rhone-al00_firmware:rhone-al00c00b186:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:selina-l02_firmware:selina-l02c432b153:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:selina-l02:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:stanford-l09s_firmware:stanford-l09sc432b183:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:toronto-al00_firmware:toronto-al00c00b223:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:toronto-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:toronto-al00a_firmware:toronto-al00ac00b223:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:toronto-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:toronto-tl10_firmware:toronto-tl10c01b223:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:toronto-tl10:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-6014 | itsourcecode Document Management System edithis.php sql injection | A vulnerability classified as critical has been found in itsourcecode Document Management System 1.0. Affected is an unknown function of the file edithis.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268722 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:itsourcecode:document_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*"
] |
GHSA-vxxj-cjwx-9587 | Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the endDate parameter at getOrderReport.php. | [] |
|
GHSA-v3v3-c8p6-cr4p | Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 12.0.6 and 11i10CU2 allows remote attackers to affect integrity via unknown vectors. | [] |
|
GHSA-wr22-9f7m-p835 | skins/classic/views/controlcap.php in ZoneMinder before 1.32.3 has XSS via the newControl array, as demonstrated by the newControl[MinTiltRange] parameter. | [] |
|
CVE-2024-22461 | Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. A low privileged remote attacker could potentially exploit this vulnerability by running any command as root, leading to gaining of root-level access and compromise of complete system. | [] |
|
GHSA-p7jw-j345-r9xp | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | [] |
|
CVE-2019-7736 | D-Link DIR-600M C1 3.04 devices allow authentication bypass via a direct request to the wan.htm page. NOTE: this may overlap CVE-2019-13101. | [
"cpe:2.3:o:dlink:dir-600m_firmware:3.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-600m:-:*:*:*:*:*:*:*"
] |
|
GHSA-r46j-88x4-7j3f | GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_Decompress(). Parsing malicious input can result in a crash. | [] |
|
GHSA-fcv2-47vf-j6hq | An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. A specially crafted URL request sent to the SoftCMS ASP Webserver can cause a double free condition on the server allowing an attacker to modify memory locations and possibly cause a denial of service or the execution of arbitrary code. | [] |
|
GHSA-2xjc-5rq3-qqgw | Open redirect vulnerability in typecho 1.1-17.10.30-release via the referer parameter to Login.php. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.