Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2021-22147
Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
[ "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*" ]
GHSA-m5jm-xq2c-v8cc
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board title contents" parameter, aka the adm/board_form_update.php bo_subject parameter.
[]
GHSA-jq8j-c4c7-g7gx
Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX command containing a large UBX payload length field.
[]
GHSA-x59v-xv2m-jgxp
Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/?page=sales/view_details&id.
[]
CVE-2018-6374
The GUI component (aka PulseUI) in Pulse Secure Desktop Linux clients before PULSE5.2R9.2 and 5.3.x before PULSE5.3R4.2 does not perform strict SSL Certificate Validation. This can lead to the manipulation of the Pulse Connection set.
[ "cpe:2.3:a:pulsesecure:desktop_linux_client:*:*:*:*:*:*:*:*" ]
CVE-2021-0987
In getNeighboringCellInfo of PhoneInterfaceManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-190619791
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
CVE-2016-3346
Microsoft Windows 10 Gold, 1511, and 1607 does not properly enforce permissions, which allows local users to obtain Administrator access via a crafted DLL, aka "Windows Permissions Enforcement Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*" ]
CVE-2011-3386
Unspecified vulnerability in Medtronic Paradigm wireless insulin pump 512, 522, 712, and 722 allows remote attackers to modify the delivery of an insulin bolus dose and cause a denial of service (adverse human health effects) via unspecified vectors involving wireless communications and knowledge of the device's serial number, as demonstrated by Jerome Radcliffe at the Black Hat USA conference in August 2011. NOTE: the vendor has disputed the severity of this issue, saying "we believe the risk of deliberate, malicious, or unauthorized manipulation of medical devices is extremely low... we strongly believe it would be extremely difficult for a third-party to wirelessly tamper with your insulin pump... you would be able to detect tones on the insulin pump that weren't intentionally programmed and could intervene accordingly."
[ "cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:512:*:*:*:*:*:*:*", "cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:522:*:*:*:*:*:*:*", "cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:712:*:*:*:*:*:*:*", "cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:722:*:*:*:*:*:*:*" ]
GHSA-f39p-623w-5v5j
An HTML injection vulnerability previously discovered in Trend Vision One could have allowed a malicious user to execute arbitrary code.Please note: this issue has already been addressed on the backend service and is no longer considered an active vulnerability.
[]
CVE-2007-3496
Cross-site scripting (XSS) vulnerability in SAP Web Dynpro Java (BC-WD-JAV) in SAP NetWeaver Nw04 SP15 through SP19 and Nw04s SP7 through SP11, aka SAP Java Technology Services 640 before SP20 and SAP Web Dynpro Runtime Core Components 700 before SP12, allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header.
[ "cpe:2.3:a:sap:netweaver_nw04:sp15:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp16:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp17:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp18:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04:sp19:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp7:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp8:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp9:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp10:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_nw04s:sp11:*:*:*:*:*:*:*", "cpe:2.3:a:sap:sap_basis_component_640:*:*:*:*:*:*:*:*", "cpe:2.3:a:sap:sap_basis_component_700:*:*:*:*:*:*:*:*" ]
CVE-2011-2305
Unspecified vulnerability in Oracle VM VirtualBox 4.0 allows local users to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:vm_virtualbox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*" ]
CVE-2023-38872
An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1 allows any unauthenticated attacker to access cash book entry attachments of any other user, if they know the Id of the attachment.
[ "cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*", "cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*" ]
CVE-2019-18683
An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-83cg-29pr-h246
Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe.
[]
CVE-2020-11486
NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which software allows an attacker to upload or transfer files that can be automatically processed within the product's environment, which may lead to remote code execution.
[ "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:dgx-1:-:*:*:*:*:*:*:*" ]
GHSA-xq2f-h2vw-352p
Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/classes/Master.php?f=delete_sub_category.
[]
CVE-2023-23712
WordPress User Meta Manager Plugin <= 3.4.9 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in User Meta Manager plugin <= 3.4.9 versions.
[ "cpe:2.3:a:user-meta:user_meta_manager:*:*:*:*:*:wordpress:*:*" ]
CVE-2010-5069
The Cascading Style Sheets (CSS) implementation in Google Chrome 4 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document. NOTE: this may overlap CVE-2010-2264.
[ "cpe:2.3:a:google:chrome:4.0.212.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.212.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.221.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.224.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.229.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.235.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.236.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.237.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.237.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.239.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.240.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.241.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.242.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.243.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.245.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.245.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.247.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.248.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.250.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.250.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.251.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.252.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.254.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.255.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.256.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.257.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.258.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.259.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.261.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.263.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.264.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.265.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.266.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.267.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.268.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.269.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.271.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.272.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.275.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.275.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.276.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.277.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.278.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.286.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.287.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.288.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.288.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.289.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.290.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.292.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.294.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.295.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.296.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.299.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.300.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.301.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.303.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.304.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.305.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1:beta:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1035:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1036:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1037:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1038:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1039:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1040:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1041:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1042:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1043:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1044:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1045:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1046:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1047:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1048:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1049:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1050:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1051:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1052:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1053:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1054:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1055:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1056:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1057:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1058:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1059:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1060:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1061:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1062:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1063:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1064:*:*:*:*:*:*:*" ]
CVE-2018-20878
cPanel before 74.0.8 allows stored XSS in WHM "File and Directory Restoration" interface (SEC-441).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
CVE-2007-0774
Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
[ "cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*" ]
GHSA-jwwm-vp58-xwv6
Cross-site scripting (XSS) vulnerability in haut.php in ForumJBC 4 allows remote attackers to inject arbitrary web script or HTML via the nb_connecte parameter.
[]
GHSA-2x67-wqw2-r8c8
In the Linux kernel, the following vulnerability has been resolved:mptcp: fix data races on remote_idSimilar to the previous patch, address the data race on remote_id, adding the suitable ONCE annotations.
[]
CVE-2024-12500
Philantro – Donations and Donor Management <= 5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Philantro – Donations and Donor Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes like 'donate' in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-hxq6-qv9r-2gqc
A code execution vulnerability exists in Epignosis eFront LMS v5.2.12. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability.
[]
CVE-2023-2047
Campcodes Advanced Online Voting System login.php sql injection
A vulnerability was found in Campcodes Advanced Online Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument voter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225932.
[ "cpe:2.3:a:advanced_online_voting_system_project:advanced_online_voting_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:campcodes_advanced_online_voting_system_project:campcodes_advanced_online_voting_system:1.0:*:*:*:*:*:*:*" ]
GHSA-j4vj-8r2p-crwq
Cross-site scripting (XSS) vulnerability in the filemanager in b2evolution before 5.2.1 allows remote attackers to inject arbitrary web script or HTML via the fm_filter parameter to blogs/admin.php.
[]
GHSA-rmxm-6j87-8r3p
The web interface on Supermicro X10DRH-iT motherboards with BIOS 2.0a and IPMI firmware 03.40 allows remote attackers to exploit a cgi/config_user.cgi CSRF issue to add new admin users. The fixed versions are BIOS 3.2 and firmware 03.88.
[]
CVE-2010-3374
Qt Creator before 2.0.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
[ "cpe:2.3:a:nokia:qt_creator:*:*:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:0.9.1:beta:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:0.9.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.2.90:*:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.3.0:beta:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:2.0.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:2.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:nokia:qt_creator:2.0.0:rc1:*:*:*:*:*:*" ]
GHSA-fph3-2wh6-46fv
A SQL Injection vulnerability was discovered in the normal-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the todate parameter in a POST request.
[]
CVE-2017-0475
An elevation of privilege vulnerability in the recovery verifier could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-31914369.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*" ]
GHSA-q5pv-qhpq-3f39
The Document Embedder WordPress plugin before 1.7.5 contains a REST endpoint, which could allow unauthenticated users to enumerate the title of arbitrary private and draft posts.
[]
CVE-2013-5659
Wiz 5.0.3 has a user mode write access violation
[ "cpe:2.3:a:info-zip:wiz:5.0.3:*:*:*:*:*:*:*" ]
CVE-2016-1340
Heap-based buffer overflow in Cisco Unified Computing System (UCS) Platform Emulator 2.5(2)TS4, 3.0(2c)A, and 3.0(2c)TS9 allows local users to gain privileges via crafted libclimeta.so filename arguments, aka Bug ID CSCux68837.
[ "cpe:2.3:a:cisco:unified_computing_system_platform_emulator:2.5\\(2\\)ts4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system_platform_emulator:3.0\\(2c\\)a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system_platform_emulator:3.0\\(2c\\)ts9:*:*:*:*:*:*:*" ]
GHSA-4xj8-gc87-984x
Directory traversal vulnerability in component/flashupload/download.jsp in the FlashUpload component in Korean GHBoard allows remote attackers to read arbitrary files via a .. (dot dot) in the name parameter.
[]
CVE-2019-15340
The Xiaomi Redmi 6 Pro Android device with a build fingerprint of xiaomi/sakura_india/sakura_india:8.1.0/OPM1.171019.019/V9.6.4.0.ODMMIFD:user/release-keys contains a pre-installed app with a package name of com.huaqin.factory app (versionCode=1, versionName=QL1715_201805292006) that allows any app co-located on the device to programmatically disable and enable Wi-Fi, Bluetooth, and GPS without the corresponding access permission through an exported interface.
[ "cpe:2.3:o:mi:redmi_6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mi:redmi_6:-:*:*:*:*:*:*:*" ]
CVE-2024-49732
In multiple functions of CompanionDeviceManagerService.java, there is a possible way to grant permissions without user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
GHSA-jqgq-vf46-2wc2
Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service.
[]
CVE-2023-46509
An issue in Contec SolarView Compact v.6.0 and before allows an attacker to execute arbitrary code via the texteditor.php component.
[ "cpe:2.3:h:contec:solarview_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:*" ]
GHSA-r23x-gq8q-5637
The File Download API in Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read arbitrary files via absolute path traversal in the SearchString JSON field in /home/download POST data.
[]
CVE-2023-5134
The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive user meta.
[ "cpe:2.3:a:easyregistrationforms:easy_registration_forms:*:*:*:*:*:wordpress:*:*" ]
GHSA-849w-6cw8-9p7m
There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
[]
CVE-2006-6889
FreeStyle Wiki (fswiki) 3.6.2 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request for config/user.dat.
[ "cpe:2.3:a:freestyle:freestyle_wiki:*:*:*:*:*:*:*:*" ]
GHSA-gpv8-rwm7-v9hg
client_side_request.cc in Squid 3.2.x before 3.2.13 and 3.3.x before 3.3.8 allows remote attackers to cause a denial of service via a crafted port number in a HTTP Host header.
[]
GHSA-w35m-rg68-x8h6
An arbitrary file upload vulnerability in /fileupload.php of hdcms 5.7 allows attackers to execute arbitrary code via a crafted file.
[]
GHSA-h56m-2v87-fv2w
Buffer overflow in CuteFTP 5.0 allows remote attackers to execute arbitrary code via a long response to a LIST command.
[]
CVE-2018-18862
BMC Remedy Mid-Tier 7.1.00 and 9.1.02.003 for BMC Remedy AR System has Incorrect Access Control in ITAM forms, as demonstrated by TLS%3APLR-Configuration+Details/Default+Admin+View/, AST%3AARServerConnection/Default+Admin+View/, and AR+System+Administration%3A+Server+Information/Default+Admin+View/.
[ "cpe:2.3:a:bmc:remedy_action_request_system:9.1.02.003:*:*:*:*:*:*:*", "cpe:2.3:a:bmc:remedy_mid-tier:7.1.00:*:*:*:*:*:*:*" ]
CVE-2022-40088
Simple College Website v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /college_website/index.php?page=. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the page parameter.
[ "cpe:2.3:a:simple_college_website_project:simple_college_website:1.0:*:*:*:*:*:*:*" ]
GHSA-h3pc-p5gc-rxc4
A vulnerability, which was classified as critical, has been found in SourceCodester Insurance Management System 1.0. This issue affects some unknown processing. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255503.
[]
GHSA-gm74-c2f7-gq8m
Unspecified vulnerability in Unix File System (UFS) on Solaris 8 and 9, when logging is enabled, allows local users to cause a denial of service ("soft hang") via certain write operations to UFS.
[]
GHSA-3ghf-f72w-2g9p
AultWare pwStore 2010.8.30.0 has DoS via an empty HTTP request
[]
GHSA-rmwg-qccm-r36q
An issue in Timo v.2.0.3 allows a remote attacker to execute arbitrary code via the filetype restrictions in the UploadController.java component.
[]
CVE-2008-4323
Windows Explorer in Microsoft Windows XP SP3 allows user-assisted attackers to cause a denial of service (application crash) via a crafted .ZIP file.
[ "cpe:2.3:o:microsoft:windows_xp:sp3:unknown:english:*:*:*:*:*" ]
GHSA-f8j8-g2f7-722j
Incorrect access control in the component /index.php?mod=system&op=orgtree of dzzoffice 2.02.1_SC_UTF8 allows unauthenticated attackers to browse departments and usernames.
[]
CVE-2021-40773
Adobe Prelude NULL Pointer Dereference Application Denial of Service
Adobe Prelude version 10.1 (and earlier) is affected by a null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:prelude:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-27hw-76jw-48hx
The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers.
[]
CVE-2018-0054
QFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames
On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. The following log message may also be displayed: fpc0 dcbcm_check_stuck_buffers: Buffers are stuck on queue 7 of port 45 This issue only affects the QFX5000 Series products (QFX5100, QFX5110, QFX5200, QFX5210) and the EX4600 switch. No other platforms are affected by this issue. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D47 on QFX5000 Series and EX4600; 15.1 versions prior to 15.1R7, 15.1R8 on QFX5000 Series and EX4600; 15.1X53 versions prior to 15.1X53-D233 on QFX5000 Series and EX4600; 16.1 versions prior to 16.1R7 on QFX5000 Series and EX4600; 16.2 versions prior to 16.2R3 on QFX5000 Series and EX4600; 17.1 versions prior to 17.1R2-S9, 17.1R3 on QFX5000 Series and EX4600; 17.2 versions prior to 17.2R2-S6, 17.2R3 on QFX5000 Series and EX4600; 17.2X75 versions prior to 17.2X75-D42 on QFX5000 Series and EX4600; 17.3 versions prior to 17.3R3 on QFX5000 Series and EX4600; 17.4 versions prior to 17.4R2 on QFX5000 Series and EX4600; 18.1 versions prior to 18.1R2 on QFX5000 Series and EX4600.
[ "cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:d46:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*", "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2x75:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2x75:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*" ]
CVE-2023-23994
WordPress Auto Hide Admin Bar Plugin <= 1.6.1 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marcel Bootsman Auto Hide Admin Bar plugin <= 1.6.1 versions.
[ "cpe:2.3:a:auto_hide_admin_bar_project:auto_hide_admin_bar:*:*:*:*:*:wordpress:*:*" ]
GHSA-q6wf-wh6m-ch8f
PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement.
[]
GHSA-fw5q-j9p4-3vxg
Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).Impact: XSS via Arbitrary script execution. Components are: Blog comment posting Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by yama
[]
CVE-2018-10184
An issue was discovered in HAProxy before 1.8.8. The incoming H2 frame length was checked against the max_frame_size setting instead of being checked against the bufsize. The max_frame_size only applies to outgoing traffic and not to incoming, so if a large enough frame size is advertised in the SETTINGS frame, a wrapped frame will be defragmented into a temporary allocated buffer where the second fragment may overflow the heap by up to 16 kB. It is very unlikely that this can be exploited for code execution given that buffers are very short lived and their addresses not realistically predictable in production, but the likelihood of an immediate crash is absolutely certain.
[ "cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*" ]
CVE-2020-7836
VOICEYE WSActiveBridgeES versions prior to 2.1.0.3 contains a stack-based buffer overflow vulnerability caused by improper bound checking parameter given by attack. It finally leads to a stack-based buffer overflow via access to crafted web page.
[ "cpe:2.3:a:voiceye_wsactivebridgees_project:voiceye_wsactivebridges:*:*:*:*:*:*:*:*" ]
GHSA-4j6g-qggc-p4h2
SQL injection vulnerability in topic.php in DirectTopics 2.1 and 2.2 allows remote attackers to execute arbitrary SQL commands via the topic parameter.
[]
GHSA-2p62-w27q-9g83
A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. All permissions being granted would properly be shown during the first authorization, but in certain circumstances, if the user revisits the authorization flow after the GitHub App has configured additional user-level permissions, those additional permissions may not be shown, leading to more permissions being granted than the user potentially intended. This vulnerability affected GitHub Enterprise Server 3.0.x prior to 3.0.7 and 2.22.x prior to 2.22.13. It was fixed in versions 3.0.7 and 2.22.13. This vulnerability was reported via the GitHub Bug Bounty program.
[]
GHSA-9fx2-j4mx-3hcg
A vulnerability classified as critical has been found in CodeAstro Real Estate Management System up to 1.0. This affects an unknown part of the file propertydetail.php. The manipulation of the argument pid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250713 was assigned to this vulnerability.
[]
CVE-2019-1454
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-99px-7724-484v
Remote Code Execution in Any23
A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities.
[]
GHSA-jvvx-hmmr-rhgg
Stored XSS vulnerability in Jenkins Dynamic Extended Choice Parameter plugin
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[]
GHSA-hfx8-3wrm-cvm8
Buffer overflow in the SDO_CODE_SIZE procedure of the MD2 package (MDSYS.MD2.SDO_CODE_SIZE) in Oracle 10g before 10.1.0.2 Patch 2 allows local users to execute arbitrary code via a long LAYER parameter.
[]
CVE-2005-3936
PHP file include vulnerability in SocketKB 1.1.0 and earlier allows remote attackers to include arbitrary local files via the __f parameter.
[ "cpe:2.3:a:socketkb:socketkb:*:*:*:*:*:*:*:*" ]
CVE-2023-26044
ReactPHP's HTTP server continues parsing unused multipart parts after reaching limits
react/http is an event-driven, streaming HTTP client and server implementation for ReactPHP. Previous versions of ReactPHP's HTTP server component contain a potential DoS vulnerability that can cause high CPU load when processing large HTTP request bodies. This vulnerability has little to no impact on the default configuration, but can be exploited when explicitly using the RequestBodyBufferMiddleware with very large settings. This might lead to consuming large amounts of CPU time for processing requests and significantly delay or slow down the processing of legitimate user requests. This issue has been addressed in release 1.9.0. Users are advised to upgrade. Users unable to upgrade may keep the request body limited using RequestBodyBufferMiddleware with a sensible value which should mitigate the issue. An infrastructure or DevOps workaround could be to place a reverse proxy in front of the ReactPHP HTTP server to filter out any excessive HTTP request bodies.
[ "cpe:2.3:a:reactphp:http:*:*:*:*:*:*:*:*" ]
GHSA-8c96-xx6x-rr2w
The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.
[]
CVE-2004-0623
Format string vulnerability in misc.c in GNU GNATS 4.00 may allow remote attackers to execute arbitrary code via format string specifiers in a string that gets logged by syslog.
[ "cpe:2.3:a:gnu:gnats:3.0_02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnats:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnats:3.14b:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnats:3.113:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnats:3.113.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnats:3.113.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gnats:4.0:*:*:*:*:*:*:*" ]
CVE-2023-52264
The beesblog (aka Bees Blog) component before 1.6.2 for thirty bees allows Reflected XSS because controllers/front/post.php sharing_url is mishandled.
[ "cpe:2.3:a:thirtybees:bees_blog:*:*:*:*:*:thirty_bees:*:*" ]
CVE-2023-5792
SourceCodester Sticky Notes App delete-note.php sql injection
A vulnerability has been found in SourceCodester Sticky Notes App 1.0 and classified as critical. This vulnerability affects unknown code of the file endpoint/delete-note.php. The manipulation of the argument note leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243598 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:remyandrade:sticky_notes_app:1.0:*:*:*:*:*:*:*" ]
GHSA-p69q-m87v-6q9x
In the Linux kernel, the following vulnerability has been resolved:ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()devm_kasprintf() returns NULL when memory allocation fails. Currently, avs_component_probe() does not check for this case, which results in a NULL pointer dereference.
[]
CVE-2023-23919
A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1, <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.
[ "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" ]
GHSA-6v85-wr92-q4p7
Denial of Service (DoS) Vulnerability Due to Unsafe Array Modification in Multi-threaded Environment
SummaryAn attacker can exploit a critical flaw in the application to initiate a Denial of Service (DoS) attack, rendering the application inoperable and affecting all users. The issue arises from unsafe manipulation of an array in a multi-threaded environment.DetailsThe vulnerability is rooted in the application's code, where an array is being modified while it is being iterated over. This is a classic programming error but becomes critically unsafe when executed in a multi-threaded environment. When two threads interact with the same array simultaneously, the application crashes.The core issue is located in [expireOldFailedAttempts](https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311) function:The function modifies the array while iterating it which means the code will cause an error and crash the application pod, inspecting the logs just before the crash we can confirm:PoCTo reproduce the vulnerability, you can use the following steps:Launch the application.Trigger the code path that results in the `expireOldFailedAttempts()` function being called in multiple threads.In the attached PoC script we are restarting the server in a while loop, causing the application to be unresponsive at all.ImpactThis is a Denial of Service (DoS) vulnerability. Any attacker can crash the application continuously, making it impossible for legitimate users to access the service. The issue is exacerbated because it does not require authentication, widening the pool of potential attackers.
[]
GHSA-qh2q-v7cv-8g72
A vulnerability has been identified in SENTRON 3KC ATC6 Expansion Module Ethernet (3KC9000-8TL75) (All versions). Affected devices expose an unused, unstable http service at port 80/tcp on the Modbus-TCP Ethernet. This could allow an attacker on the same Modbus network to create a denial of service condition that forces the device to reboot.
[]
GHSA-45w3-v3g4-54pm
Chrono has potential segfault issue in SPIFFE authenticator
ImpactSeveral vulnerabilities have been reported in the `time` and `chrono` crates related to handling of calls to `localtime_r`. You can follow some of the discussions [here](https://github.com/chronotope/chrono/issues/602) and [here](https://github.com/time-rs/time/issues/293), and the associated CVE [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235). In our case, the issue with the dependency was flagged by our nightly CI build running [`cargo-audit`](https://github.com/parallaxsecond/parsec/issues/544).The vulnerability leads to a segfault in specific circumstances - namely, when one of a number of functions in the `time` crate is called while any other thread is setting an environment variable. Given that in the case of the Parsec service this affects the SPIFFE authenticator, Parsec service users can encounter the issue only when the JWT SVID authenticator is enabled and being used. We have not undergone any manual tracing to understand if the vulnerable methods are called anywhere in our stack, however it seems reasonable to expect that if that were to be the case, the issue would lie in JWT validation (i.e. when handling the dates found within a Json Web Token). JWT validation could thus fail, bringing down the thread in which the request happens. The rest of the threads continue to work. Since the threadpool implementation that we use [continues replenishing the pool](https://docs.rs/threadpool/latest/threadpool/) when one thread panics, the impact on the service should be minimal.PatchesNo current patches exist as the problems lie in a number of dependencies that are not under our control (see more details [here](https://github.com/parallaxsecond/parsec/issues/544#issuecomment-1024185688)).The issue tracking the required change in the `rust-spiffe` crate (through which the vulnerable dependencies are imported in Parsec) can be seen [here](https://github.com/maxlambrecht/rust-spiffe/issues/17). Once updates happen in our dependency chain that allow us to update beyond the vulnerable versions of `time` and `chrono`, a new version of the Parsec service will be tagged and released with the appropriate notifications.WorkaroundsThe only complete workaround is to use a different type of authenticator with the Parsec service.ReferencesAs quoted in the initial paragraph, you can find out more information:in the `chrono` repo issue [here](https://github.com/chronotope/chrono/issues/602)in the `time` repo issue [here](https://github.com/time-rs/time/issues/293)in the official CVE report [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235)in our tracking issue [here](https://github.com/parallaxsecond/parsec/issues/544)For more information:If you have any questions or comments about this advisory:Open an issue in [the Parsec service repo](https://github.com/parallaxsecond/parsec)Email us at [[email protected]](mailto:[email protected])
[]
GHSA-fxr3-fx97-4wpc
IBM Cognos Analytics 11.0 and 11.1 DQM API allows submitting of all control requests in unauthenticated sessions. This allows a remote attacker who can access a valid CA endpoint to read and write files to the Cognos Analytics system. IBM X-Force ID: 183903.
[]
GHSA-5xq5-qj43-5w8x
An issue was discovered in Pluck 4.7.9-dev1. There is a CSRF vulnerability that can delete articles via a /admin.php?action=deletepage&var1= URI.
[]
CVE-2024-10570
Security & Malware scan by CleanTalk <= 2.145 - Authorization Bypass via Reverse DNS Spoofing to Unauthenticated SQL Injection
The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized SQL Injection due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 2.145, as well as insufficient input sanitization and validation. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:cleantalk:antispam:*:*:*:*:*:wordpress:*:*" ]
GHSA-5p6r-jp46-m2mc
Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.
[]
GHSA-qv9j-8f7x-vcfj
A vulnerability has been reported in Voovi Social Networking Script version 1.0 that allows a XSS viasignup2.php in the emailadd parameter, the exploitation of which could allow a remote attacker to send a specially crafted JavaScript payload and partially take over the browser session of an authenticated user.
[]
CVE-2008-5201
Directory traversal vulnerability in index.php in OTManager CMS 24a allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conteudo parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
[ "cpe:2.3:a:otmanager:otmanager_cms:24a:*:*:*:*:*:*:*" ]
GHSA-764j-f3m9-c8mh
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hccoder – Sándor Fodor Better User Shortcodes allows Reflected XSS.This issue affects Better User Shortcodes: from n/a through 1.0.
[]
CVE-2008-3413
SQL injection vulnerability in category.php in Greatclone GC Auction Platinum allows remote attackers to execute arbitrary SQL commands via the cate_id parameter.
[ "cpe:2.3:a:greatclone:auction_platinum:*:*:*:*:*:*:*:*" ]
GHSA-59wr-6f48-r269
Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the page parameter to service-monitoring/src/index.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget.
[]
CVE-2024-41091
tun: add missing verification for short frame
In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091
[]
GHSA-f2r3-9369-56wc
SQL injection vulnerability in type.asp in JobPost 1.0 allows remote attackers to execute arbitrary SQL commands via the iType parameter. NOTE: some of these details are obtained from third party information.
[]
GHSA-gp9m-gvxj-6q3h
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via perfil.php in the id and user parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
[]
CVE-2024-8052
Review Ratings <= 1.6 - Stored XSS via CSRF
The Review Ratings WordPress plugin through 1.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
[ "cpe:2.3:a:joen:review_ratings:*:*:*:*:*:*:*:*", "cpe:2.3:a:moc:review_ratings:*:*:*:*:*:wordpress:*:*" ]
GHSA-g4gg-mp54-wh67
Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
[]
CVE-2024-13637
Demo Awesome <= 1.0.3 - Missing Authorization to Authenticated (Subscriber+) Plugin Activation
The Demo Awesome plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the install_plugin function in all versions up to, and including, 1.0.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins..
[]
CVE-2023-27337
PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18494.
[ "cpe:2.3:a:pdf_xchange:pdf_xchange_editor:9.4.362.0:*:*:*:*:*:*:*" ]
CVE-2018-11552
There is a reflected XSS vulnerability in AXON PBX 2.02 via the "AXON->Auto-Dialer->Agents->Name" field. The vulnerability exists due to insufficient filtration of user-supplied data. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable application.
[ "cpe:2.3:a:nch:axon_pbx:2.02:*:*:*:*:*:*:*" ]
GHSA-q2r3-58jv-x99w
Missing Authorization vulnerability in Brainstorm Force Convert Pro.This issue affects Convert Pro: from n/a through 1.7.5.
[]
CVE-2021-41836
Fathom Analytics <= 3.0.4 Authenticated Stored Cross-Site Scripting
The Fathom Analytics WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the $site_id parameter found in the ~/fathom-analytics.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 3.0.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
[ "cpe:2.3:a:conva:fathom_analytics:*:*:*:*:*:wordpress:*:*" ]
CVE-2017-8794
An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because a regular expression (intended to match local https URLs) lacks an initial ^ character, courier/web/1000@/wmProgressval.html allows SSRF attacks with a file:///etc/passwd#https:// URL pattern.
[ "cpe:2.3:a:accellion:file_transfer_appliance:*:*:*:*:*:*:*:*" ]
CVE-2007-4939
Heap-based buffer overflow in mplayerc.exe in Media Player Classic (MPC) 6.4.9.0 and earlier, as used standalone and in mympc (aka CD-Storm) 1.0.0.1, StormPlayer 1.0.4, and possibly other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with an "indx truck size" of 0xffffffff, and certain wLongsPerEntry and nEntriesInuse values.
[ "cpe:2.3:a:guliverkli:media_player_classic:*:*:*:*:*:*:*:*", "cpe:2.3:a:mympc:cd-storm:1.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:verycd:stormplayer:1.0.4:*:*:*:*:*:*:*" ]