id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2021-22147 | Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. | [
"cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*"
] |
|
GHSA-m5jm-xq2c-v8cc | GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board title contents" parameter, aka the adm/board_form_update.php bo_subject parameter. | [] |
|
GHSA-jq8j-c4c7-g7gx | Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX command containing a large UBX payload length field. | [] |
|
GHSA-x59v-xv2m-jgxp | Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/?page=sales/view_details&id. | [] |
|
CVE-2018-6374 | The GUI component (aka PulseUI) in Pulse Secure Desktop Linux clients before PULSE5.2R9.2 and 5.3.x before PULSE5.3R4.2 does not perform strict SSL Certificate Validation. This can lead to the manipulation of the Pulse Connection set. | [
"cpe:2.3:a:pulsesecure:desktop_linux_client:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-0987 | In getNeighboringCellInfo of PhoneInterfaceManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-190619791 | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2016-3346 | Microsoft Windows 10 Gold, 1511, and 1607 does not properly enforce permissions, which allows local users to obtain Administrator access via a crafted DLL, aka "Windows Permissions Enforcement Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
] |
|
CVE-2011-3386 | Unspecified vulnerability in Medtronic Paradigm wireless insulin pump 512, 522, 712, and 722 allows remote attackers to modify the delivery of an insulin bolus dose and cause a denial of service (adverse human health effects) via unspecified vectors involving wireless communications and knowledge of the device's serial number, as demonstrated by Jerome Radcliffe at the Black Hat USA conference in August 2011. NOTE: the vendor has disputed the severity of this issue, saying "we believe the risk of deliberate, malicious, or unauthorized manipulation of medical devices is extremely low... we strongly believe it would be extremely difficult for a third-party to wirelessly tamper with your insulin pump... you would be able to detect tones on the insulin pump that weren't intentionally programmed and could intervene accordingly." | [
"cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:512:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:522:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:712:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:paradigm_wireless_insulin_pump:722:*:*:*:*:*:*:*"
] |
|
GHSA-f39p-623w-5v5j | An HTML injection vulnerability previously discovered in Trend Vision One could have allowed a malicious user to execute arbitrary code.Please note: this issue has already been addressed on the backend service and is no longer considered an active vulnerability. | [] |
|
CVE-2007-3496 | Cross-site scripting (XSS) vulnerability in SAP Web Dynpro Java (BC-WD-JAV) in SAP NetWeaver Nw04 SP15 through SP19 and Nw04s SP7 through SP11, aka SAP Java Technology Services 640 before SP20 and SAP Web Dynpro Runtime Core Components 700 before SP12, allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header. | [
"cpe:2.3:a:sap:netweaver_nw04:sp15:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp16:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp17:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp18:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp19:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp8:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp9:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp11:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_basis_component_640:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_basis_component_700:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-2305 | Unspecified vulnerability in Oracle VM VirtualBox 4.0 allows local users to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:vm_virtualbox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-38872 | An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1 allows any unauthenticated attacker to access cash book entry attachments of any other user, if they know the Id of the attachment. | [
"cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*",
"cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*"
] |
|
CVE-2019-18683 | An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-83cg-29pr-h246 | Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe. | [] |
|
CVE-2020-11486 | NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which software allows an attacker to upload or transfer files that can be automatically processed within the product's environment, which may lead to remote code execution. | [
"cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:dgx-1:-:*:*:*:*:*:*:*"
] |
|
GHSA-xq2f-h2vw-352p | Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/classes/Master.php?f=delete_sub_category. | [] |
|
CVE-2023-23712 | WordPress User Meta Manager Plugin <= 3.4.9 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in User Meta Manager plugin <= 3.4.9 versions. | [
"cpe:2.3:a:user-meta:user_meta_manager:*:*:*:*:*:wordpress:*:*"
] |
CVE-2010-5069 | The Cascading Style Sheets (CSS) implementation in Google Chrome 4 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document. NOTE: this may overlap CVE-2010-2264. | [
"cpe:2.3:a:google:chrome:4.0.212.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.212.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.221.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.222.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.223.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.224.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.229.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.235.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.236.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.237.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.237.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.239.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.240.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.241.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.242.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.243.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.245.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.245.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.247.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.248.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.250.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.250.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.251.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.252.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.254.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.255.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.256.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.257.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.258.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.259.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.261.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.263.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.264.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.265.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.266.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.267.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.268.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.269.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.271.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.275.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.302.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1035:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1036:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1037:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1038:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1039:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1040:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1041:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1042:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1043:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1044:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1045:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1046:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1047:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1048:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1049:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1050:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1051:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1052:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1053:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1054:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1055:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1056:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1057:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1058:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1059:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1060:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1061:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1062:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1063:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1064:*:*:*:*:*:*:*"
] |
|
CVE-2018-20878 | cPanel before 74.0.8 allows stored XSS in WHM "File and Directory Restoration" interface (SEC-441). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-0774 | Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine. | [
"cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*"
] |
|
GHSA-jwwm-vp58-xwv6 | Cross-site scripting (XSS) vulnerability in haut.php in ForumJBC 4 allows remote attackers to inject arbitrary web script or HTML via the nb_connecte parameter. | [] |
|
GHSA-2x67-wqw2-r8c8 | In the Linux kernel, the following vulnerability has been resolved:mptcp: fix data races on remote_idSimilar to the previous patch, address the data race on
remote_id, adding the suitable ONCE annotations. | [] |
|
CVE-2024-12500 | Philantro – Donations and Donor Management <= 5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Philantro – Donations and Donor Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes like 'donate' in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
GHSA-hxq6-qv9r-2gqc | A code execution vulnerability exists in Epignosis eFront LMS v5.2.12. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability. | [] |
|
CVE-2023-2047 | Campcodes Advanced Online Voting System login.php sql injection | A vulnerability was found in Campcodes Advanced Online Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument voter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225932. | [
"cpe:2.3:a:advanced_online_voting_system_project:advanced_online_voting_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:campcodes_advanced_online_voting_system_project:campcodes_advanced_online_voting_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-j4vj-8r2p-crwq | Cross-site scripting (XSS) vulnerability in the filemanager in b2evolution before 5.2.1 allows remote attackers to inject arbitrary web script or HTML via the fm_filter parameter to blogs/admin.php. | [] |
|
GHSA-rmxm-6j87-8r3p | The web interface on Supermicro X10DRH-iT motherboards with BIOS 2.0a and IPMI firmware 03.40 allows remote attackers to exploit a cgi/config_user.cgi CSRF issue to add new admin users. The fixed versions are BIOS 3.2 and firmware 03.88. | [] |
|
CVE-2010-3374 | Qt Creator before 2.0.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | [
"cpe:2.3:a:nokia:qt_creator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:0.9.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:0.9.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.3.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:2.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:2.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:nokia:qt_creator:2.0.0:rc1:*:*:*:*:*:*"
] |
|
GHSA-fph3-2wh6-46fv | A SQL Injection vulnerability was discovered in the normal-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the todate parameter in a POST request. | [] |
|
CVE-2017-0475 | An elevation of privilege vulnerability in the recovery verifier could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-31914369. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-q5pv-qhpq-3f39 | The Document Embedder WordPress plugin before 1.7.5 contains a REST endpoint, which could allow unauthenticated users to enumerate the title of arbitrary private and draft posts. | [] |
|
CVE-2013-5659 | Wiz 5.0.3 has a user mode write access violation | [
"cpe:2.3:a:info-zip:wiz:5.0.3:*:*:*:*:*:*:*"
] |
|
CVE-2016-1340 | Heap-based buffer overflow in Cisco Unified Computing System (UCS) Platform Emulator 2.5(2)TS4, 3.0(2c)A, and 3.0(2c)TS9 allows local users to gain privileges via crafted libclimeta.so filename arguments, aka Bug ID CSCux68837. | [
"cpe:2.3:a:cisco:unified_computing_system_platform_emulator:2.5\\(2\\)ts4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system_platform_emulator:3.0\\(2c\\)a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system_platform_emulator:3.0\\(2c\\)ts9:*:*:*:*:*:*:*"
] |
|
GHSA-4xj8-gc87-984x | Directory traversal vulnerability in component/flashupload/download.jsp in the FlashUpload component in Korean GHBoard allows remote attackers to read arbitrary files via a .. (dot dot) in the name parameter. | [] |
|
CVE-2019-15340 | The Xiaomi Redmi 6 Pro Android device with a build fingerprint of xiaomi/sakura_india/sakura_india:8.1.0/OPM1.171019.019/V9.6.4.0.ODMMIFD:user/release-keys contains a pre-installed app with a package name of com.huaqin.factory app (versionCode=1, versionName=QL1715_201805292006) that allows any app co-located on the device to programmatically disable and enable Wi-Fi, Bluetooth, and GPS without the corresponding access permission through an exported interface. | [
"cpe:2.3:o:mi:redmi_6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mi:redmi_6:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-49732 | In multiple functions of CompanionDeviceManagerService.java, there is a possible way to grant permissions without user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
GHSA-jqgq-vf46-2wc2 | Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service. | [] |
|
CVE-2023-46509 | An issue in Contec SolarView Compact v.6.0 and before allows an attacker to execute arbitrary code via the texteditor.php component. | [
"cpe:2.3:h:contec:solarview_compact:-:*:*:*:*:*:*:*",
"cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-r23x-gq8q-5637 | The File Download API in Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read arbitrary files via absolute path traversal in the SearchString JSON field in /home/download POST data. | [] |
|
CVE-2023-5134 | The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive user meta. | [
"cpe:2.3:a:easyregistrationforms:easy_registration_forms:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-849w-6cw8-9p7m | There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow. | [] |
|
CVE-2006-6889 | FreeStyle Wiki (fswiki) 3.6.2 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request for config/user.dat. | [
"cpe:2.3:a:freestyle:freestyle_wiki:*:*:*:*:*:*:*:*"
] |
|
GHSA-gpv8-rwm7-v9hg | client_side_request.cc in Squid 3.2.x before 3.2.13 and 3.3.x before 3.3.8 allows remote attackers to cause a denial of service via a crafted port number in a HTTP Host header. | [] |
|
GHSA-w35m-rg68-x8h6 | An arbitrary file upload vulnerability in /fileupload.php of hdcms 5.7 allows attackers to execute arbitrary code via a crafted file. | [] |
|
GHSA-h56m-2v87-fv2w | Buffer overflow in CuteFTP 5.0 allows remote attackers to execute arbitrary code via a long response to a LIST command. | [] |
|
CVE-2018-18862 | BMC Remedy Mid-Tier 7.1.00 and 9.1.02.003 for BMC Remedy AR System has Incorrect Access Control in ITAM forms, as demonstrated by TLS%3APLR-Configuration+Details/Default+Admin+View/, AST%3AARServerConnection/Default+Admin+View/, and AR+System+Administration%3A+Server+Information/Default+Admin+View/. | [
"cpe:2.3:a:bmc:remedy_action_request_system:9.1.02.003:*:*:*:*:*:*:*",
"cpe:2.3:a:bmc:remedy_mid-tier:7.1.00:*:*:*:*:*:*:*"
] |
|
CVE-2022-40088 | Simple College Website v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /college_website/index.php?page=. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the page parameter. | [
"cpe:2.3:a:simple_college_website_project:simple_college_website:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-h3pc-p5gc-rxc4 | A vulnerability, which was classified as critical, has been found in SourceCodester Insurance Management System 1.0. This issue affects some unknown processing. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255503. | [] |
|
GHSA-gm74-c2f7-gq8m | Unspecified vulnerability in Unix File System (UFS) on Solaris 8 and 9, when logging is enabled, allows local users to cause a denial of service ("soft hang") via certain write operations to UFS. | [] |
|
GHSA-3ghf-f72w-2g9p | AultWare pwStore 2010.8.30.0 has DoS via an empty HTTP request | [] |
|
GHSA-rmwg-qccm-r36q | An issue in Timo v.2.0.3 allows a remote attacker to execute arbitrary code via the filetype restrictions in the UploadController.java component. | [] |
|
CVE-2008-4323 | Windows Explorer in Microsoft Windows XP SP3 allows user-assisted attackers to cause a denial of service (application crash) via a crafted .ZIP file. | [
"cpe:2.3:o:microsoft:windows_xp:sp3:unknown:english:*:*:*:*:*"
] |
|
GHSA-f8j8-g2f7-722j | Incorrect access control in the component /index.php?mod=system&op=orgtree of dzzoffice 2.02.1_SC_UTF8 allows unauthenticated attackers to browse departments and usernames. | [] |
|
CVE-2021-40773 | Adobe Prelude NULL Pointer Dereference Application Denial of Service | Adobe Prelude version 10.1 (and earlier) is affected by a null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:prelude:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-27hw-76jw-48hx | The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers. | [] |
|
CVE-2018-0054 | QFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames | On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. The following log message may also be displayed: fpc0 dcbcm_check_stuck_buffers: Buffers are stuck on queue 7 of port 45 This issue only affects the QFX5000 Series products (QFX5100, QFX5110, QFX5200, QFX5210) and the EX4600 switch. No other platforms are affected by this issue. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D47 on QFX5000 Series and EX4600; 15.1 versions prior to 15.1R7, 15.1R8 on QFX5000 Series and EX4600; 15.1X53 versions prior to 15.1X53-D233 on QFX5000 Series and EX4600; 16.1 versions prior to 16.1R7 on QFX5000 Series and EX4600; 16.2 versions prior to 16.2R3 on QFX5000 Series and EX4600; 17.1 versions prior to 17.1R2-S9, 17.1R3 on QFX5000 Series and EX4600; 17.2 versions prior to 17.2R2-S6, 17.2R3 on QFX5000 Series and EX4600; 17.2X75 versions prior to 17.2X75-D42 on QFX5000 Series and EX4600; 17.3 versions prior to 17.3R3 on QFX5000 Series and EX4600; 17.4 versions prior to 17.4R2 on QFX5000 Series and EX4600; 18.1 versions prior to 18.1R2 on QFX5000 Series and EX4600. | [
"cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d46:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2x75:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2x75:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*"
] |
CVE-2023-23994 | WordPress Auto Hide Admin Bar Plugin <= 1.6.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marcel Bootsman Auto Hide Admin Bar plugin <= 1.6.1 versions. | [
"cpe:2.3:a:auto_hide_admin_bar_project:auto_hide_admin_bar:*:*:*:*:*:wordpress:*:*"
] |
GHSA-q6wf-wh6m-ch8f | PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement. | [] |
|
GHSA-fw5q-j9p4-3vxg | Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).Impact: XSS via Arbitrary script execution.
Components are: Blog comment posting
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by yama | [] |
CVE-2018-10184 | An issue was discovered in HAProxy before 1.8.8. The incoming H2 frame length was checked against the max_frame_size setting instead of being checked against the bufsize. The max_frame_size only applies to outgoing traffic and not to incoming, so if a large enough frame size is advertised in the SETTINGS frame, a wrapped frame will be defragmented into a temporary allocated buffer where the second fragment may overflow the heap by up to 16 kB. It is very unlikely that this can be exploited for code execution given that buffers are very short lived and their addresses not realistically predictable in production, but the likelihood of an immediate crash is absolutely certain. | [
"cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*"
] |
|
CVE-2020-7836 | VOICEYE WSActiveBridgeES versions prior to 2.1.0.3 contains a stack-based buffer overflow vulnerability caused by improper bound checking parameter given by attack. It finally leads to a stack-based buffer overflow via access to crafted web page. | [
"cpe:2.3:a:voiceye_wsactivebridgees_project:voiceye_wsactivebridges:*:*:*:*:*:*:*:*"
] |
|
GHSA-4j6g-qggc-p4h2 | SQL injection vulnerability in topic.php in DirectTopics 2.1 and 2.2 allows remote attackers to execute arbitrary SQL commands via the topic parameter. | [] |
|
GHSA-2p62-w27q-9g83 | A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. All permissions being granted would properly be shown during the first authorization, but in certain circumstances, if the user revisits the authorization flow after the GitHub App has configured additional user-level permissions, those additional permissions may not be shown, leading to more permissions being granted than the user potentially intended. This vulnerability affected GitHub Enterprise Server 3.0.x prior to 3.0.7 and 2.22.x prior to 2.22.13. It was fixed in versions 3.0.7 and 2.22.13. This vulnerability was reported via the GitHub Bug Bounty program. | [] |
|
GHSA-9fx2-j4mx-3hcg | A vulnerability classified as critical has been found in CodeAstro Real Estate Management System up to 1.0. This affects an unknown part of the file propertydetail.php. The manipulation of the argument pid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250713 was assigned to this vulnerability. | [] |
|
CVE-2019-1454 | An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-99px-7724-484v | Remote Code Execution in Any23 | A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities. | [] |
GHSA-jvvx-hmmr-rhgg | Stored XSS vulnerability in Jenkins Dynamic Extended Choice Parameter plugin | Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [] |
GHSA-hfx8-3wrm-cvm8 | Buffer overflow in the SDO_CODE_SIZE procedure of the MD2 package (MDSYS.MD2.SDO_CODE_SIZE) in Oracle 10g before 10.1.0.2 Patch 2 allows local users to execute arbitrary code via a long LAYER parameter. | [] |
|
CVE-2005-3936 | PHP file include vulnerability in SocketKB 1.1.0 and earlier allows remote attackers to include arbitrary local files via the __f parameter. | [
"cpe:2.3:a:socketkb:socketkb:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-26044 | ReactPHP's HTTP server continues parsing unused multipart parts after reaching limits | react/http is an event-driven, streaming HTTP client and server implementation for ReactPHP. Previous versions of ReactPHP's HTTP server component contain a potential DoS vulnerability that can cause high CPU load when processing large HTTP request bodies. This vulnerability has little to no impact on the default configuration, but can be exploited when explicitly using the RequestBodyBufferMiddleware with very large settings. This might lead to consuming large amounts of CPU time for processing requests and significantly delay or slow down the processing of legitimate user requests. This issue has been addressed in release 1.9.0. Users are advised to upgrade. Users unable to upgrade may keep the request body limited using RequestBodyBufferMiddleware with a sensible value which should mitigate the issue. An infrastructure or DevOps workaround could be to place a reverse proxy in front of the ReactPHP HTTP server to filter out any excessive HTTP request bodies.
| [
"cpe:2.3:a:reactphp:http:*:*:*:*:*:*:*:*"
] |
GHSA-8c96-xx6x-rr2w | The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack. | [] |
|
CVE-2004-0623 | Format string vulnerability in misc.c in GNU GNATS 4.00 may allow remote attackers to execute arbitrary code via format string specifiers in a string that gets logged by syslog. | [
"cpe:2.3:a:gnu:gnats:3.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnats:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnats:3.14b:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnats:3.113:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnats:3.113.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnats:3.113.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnats:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-52264 | The beesblog (aka Bees Blog) component before 1.6.2 for thirty bees allows Reflected XSS because controllers/front/post.php sharing_url is mishandled. | [
"cpe:2.3:a:thirtybees:bees_blog:*:*:*:*:*:thirty_bees:*:*"
] |
|
CVE-2023-5792 | SourceCodester Sticky Notes App delete-note.php sql injection | A vulnerability has been found in SourceCodester Sticky Notes App 1.0 and classified as critical. This vulnerability affects unknown code of the file endpoint/delete-note.php. The manipulation of the argument note leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243598 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:remyandrade:sticky_notes_app:1.0:*:*:*:*:*:*:*"
] |
GHSA-p69q-m87v-6q9x | In the Linux kernel, the following vulnerability has been resolved:ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()devm_kasprintf() returns NULL when memory allocation fails. Currently,
avs_component_probe() does not check for this case, which results in a
NULL pointer dereference. | [] |
|
CVE-2023-23919 | A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1, <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service. | [
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"
] |
|
GHSA-6v85-wr92-q4p7 | Denial of Service (DoS) Vulnerability Due to Unsafe Array Modification in Multi-threaded Environment | SummaryAn attacker can exploit a critical flaw in the application to initiate a Denial of Service (DoS) attack, rendering the application inoperable and affecting all users. The issue arises from unsafe manipulation of an array in a multi-threaded environment.DetailsThe vulnerability is rooted in the application's code, where an array is being modified while it is being iterated over. This is a classic programming error but becomes critically unsafe when executed in a multi-threaded environment. When two threads interact with the same array simultaneously, the application crashes.The core issue is located in [expireOldFailedAttempts](https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311) function:The function modifies the array while iterating it which means the code will cause an error and crash the application pod, inspecting the logs just before the crash we can confirm:PoCTo reproduce the vulnerability, you can use the following steps:Launch the application.Trigger the code path that results in the `expireOldFailedAttempts()` function being called in multiple threads.In the attached PoC script we are restarting the server in a while loop, causing the application to be unresponsive at all.ImpactThis is a Denial of Service (DoS) vulnerability. Any attacker can crash the application continuously, making it impossible for legitimate users to access the service. The issue is exacerbated because it does not require authentication, widening the pool of potential attackers. | [] |
GHSA-qh2q-v7cv-8g72 | A vulnerability has been identified in SENTRON 3KC ATC6 Expansion Module Ethernet (3KC9000-8TL75) (All versions). Affected devices expose an unused, unstable http service at port 80/tcp on the Modbus-TCP Ethernet. This could allow an attacker on the same Modbus network to create a denial of service condition that forces the device to reboot. | [] |
|
GHSA-45w3-v3g4-54pm | Chrono has potential segfault issue in SPIFFE authenticator | ImpactSeveral vulnerabilities have been reported in the `time` and `chrono` crates related to handling of calls to `localtime_r`. You can follow some of the discussions [here](https://github.com/chronotope/chrono/issues/602) and [here](https://github.com/time-rs/time/issues/293), and the associated CVE [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235). In our case, the issue with the dependency was flagged by our nightly CI build running [`cargo-audit`](https://github.com/parallaxsecond/parsec/issues/544).The vulnerability leads to a segfault in specific circumstances - namely, when one of a number of functions in the `time` crate is called while any other thread is setting an environment variable. Given that in the case of the Parsec service this affects the SPIFFE authenticator, Parsec service users can encounter the issue only when the JWT SVID authenticator is enabled and being used. We have not undergone any manual tracing to understand if the vulnerable methods are called anywhere in our stack, however it seems reasonable to expect that if that were to be the case, the issue would lie in JWT validation (i.e. when handling the dates found within a Json Web Token). JWT validation could thus fail, bringing down the thread in which the request happens. The rest of the threads continue to work. Since the threadpool implementation that we use [continues replenishing the pool](https://docs.rs/threadpool/latest/threadpool/) when one thread panics, the impact on the service should be minimal.PatchesNo current patches exist as the problems lie in a number of dependencies that are not under our control (see more details [here](https://github.com/parallaxsecond/parsec/issues/544#issuecomment-1024185688)).The issue tracking the required change in the `rust-spiffe` crate (through which the vulnerable dependencies are imported in Parsec) can be seen [here](https://github.com/maxlambrecht/rust-spiffe/issues/17). Once updates happen in our dependency chain that allow us to update beyond the vulnerable versions of `time` and `chrono`, a new version of the Parsec service will be tagged and released with the appropriate notifications.WorkaroundsThe only complete workaround is to use a different type of authenticator with the Parsec service.ReferencesAs quoted in the initial paragraph, you can find out more information:in the `chrono` repo issue [here](https://github.com/chronotope/chrono/issues/602)in the `time` repo issue [here](https://github.com/time-rs/time/issues/293)in the official CVE report [here](https://nvd.nist.gov/vuln/detail/CVE-2020-26235)in our tracking issue [here](https://github.com/parallaxsecond/parsec/issues/544)For more information:If you have any questions or comments about this advisory:Open an issue in [the Parsec service repo](https://github.com/parallaxsecond/parsec)Email us at [[email protected]](mailto:[email protected]) | [] |
GHSA-fxr3-fx97-4wpc | IBM Cognos Analytics 11.0 and 11.1 DQM API allows submitting of all control requests in unauthenticated sessions. This allows a remote attacker who can access a valid CA endpoint to read and write files to the Cognos Analytics system. IBM X-Force ID: 183903. | [] |
|
GHSA-5xq5-qj43-5w8x | An issue was discovered in Pluck 4.7.9-dev1. There is a CSRF vulnerability that can delete articles via a /admin.php?action=deletepage&var1= URI. | [] |
|
CVE-2024-10570 | Security & Malware scan by CleanTalk <= 2.145 - Authorization Bypass via Reverse DNS Spoofing to Unauthenticated SQL Injection | The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized SQL Injection due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 2.145, as well as insufficient input sanitization and validation. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:cleantalk:antispam:*:*:*:*:*:wordpress:*:*"
] |
GHSA-5p6r-jp46-m2mc | Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function. | [] |
|
GHSA-qv9j-8f7x-vcfj | A vulnerability has been reported in Voovi Social Networking Script version 1.0 that allows a XSS viasignup2.php in the emailadd parameter, the exploitation of which could allow a remote attacker to send a specially crafted JavaScript payload and partially take over the browser session of an authenticated user. | [] |
|
CVE-2008-5201 | Directory traversal vulnerability in index.php in OTManager CMS 24a allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conteudo parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL. | [
"cpe:2.3:a:otmanager:otmanager_cms:24a:*:*:*:*:*:*:*"
] |
|
GHSA-764j-f3m9-c8mh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hccoder – Sándor Fodor Better User Shortcodes allows Reflected XSS.This issue affects Better User Shortcodes: from n/a through 1.0. | [] |
|
CVE-2008-3413 | SQL injection vulnerability in category.php in Greatclone GC Auction Platinum allows remote attackers to execute arbitrary SQL commands via the cate_id parameter. | [
"cpe:2.3:a:greatclone:auction_platinum:*:*:*:*:*:*:*:*"
] |
|
GHSA-59wr-6f48-r269 | Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the page parameter to service-monitoring/src/index.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget. | [] |
|
CVE-2024-41091 | tun: add missing verification for short frame | In the Linux kernel, the following vulnerability has been resolved:
tun: add missing verification for short frame
The cited commit missed to check against the validity of the frame length
in the tun_xdp_one() path, which could cause a corrupted skb to be sent
downstack. Even before the skb is transmitted, the
tun_xdp_one-->eth_type_trans() may access the Ethernet header although it
can be less than ETH_HLEN. Once transmitted, this could either cause
out-of-bound access beyond the actual length, or confuse the underlayer
with incorrect or inconsistent header length in the skb metadata.
In the alternative path, tun_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted for
IFF_TAP.
This is to drop any frame shorter than the Ethernet header size just like
how tun_get_user() does.
CVE: CVE-2024-41091 | [] |
GHSA-f2r3-9369-56wc | SQL injection vulnerability in type.asp in JobPost 1.0 allows remote attackers to execute arbitrary SQL commands via the iType parameter. NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-gp9m-gvxj-6q3h | A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via perfil.php in the id and user parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. | [] |
|
CVE-2024-8052 | Review Ratings <= 1.6 - Stored XSS via CSRF | The Review Ratings WordPress plugin through 1.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | [
"cpe:2.3:a:joen:review_ratings:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moc:review_ratings:*:*:*:*:*:wordpress:*:*"
] |
GHSA-g4gg-mp54-wh67 | Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors. | [] |
|
CVE-2024-13637 | Demo Awesome <= 1.0.3 - Missing Authorization to Authenticated (Subscriber+) Plugin Activation | The Demo Awesome plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the install_plugin function in all versions up to, and including, 1.0.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins.. | [] |
CVE-2023-27337 | PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18494. | [
"cpe:2.3:a:pdf_xchange:pdf_xchange_editor:9.4.362.0:*:*:*:*:*:*:*"
] |
CVE-2018-11552 | There is a reflected XSS vulnerability in AXON PBX 2.02 via the "AXON->Auto-Dialer->Agents->Name" field. The vulnerability exists due to insufficient filtration of user-supplied data. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable application. | [
"cpe:2.3:a:nch:axon_pbx:2.02:*:*:*:*:*:*:*"
] |
|
GHSA-q2r3-58jv-x99w | Missing Authorization vulnerability in Brainstorm Force Convert Pro.This issue affects Convert Pro: from n/a through 1.7.5. | [] |
|
CVE-2021-41836 | Fathom Analytics <= 3.0.4 Authenticated Stored Cross-Site Scripting | The Fathom Analytics WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the $site_id parameter found in the ~/fathom-analytics.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 3.0.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | [
"cpe:2.3:a:conva:fathom_analytics:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-8794 | An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because a regular expression (intended to match local https URLs) lacks an initial ^ character, courier/web/1000@/wmProgressval.html allows SSRF attacks with a file:///etc/passwd#https:// URL pattern. | [
"cpe:2.3:a:accellion:file_transfer_appliance:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-4939 | Heap-based buffer overflow in mplayerc.exe in Media Player Classic (MPC) 6.4.9.0 and earlier, as used standalone and in mympc (aka CD-Storm) 1.0.0.1, StormPlayer 1.0.4, and possibly other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with an "indx truck size" of 0xffffffff, and certain wLongsPerEntry and nEntriesInuse values. | [
"cpe:2.3:a:guliverkli:media_player_classic:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mympc:cd-storm:1.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:verycd:stormplayer:1.0.4:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.