id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2021-21884 | An OS command injection vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:*",
"cpe:2.3:h:lantronix:premierwave_2050:-:*:*:*:*:*:*:*"
] |
|
CVE-2006-0141 | Qualcomm Eudora Internet Mail Server (EIMS) before 3.2.8 allows remote attackers to cause a denial of service (crash) via (1) malformed NTLM authentication requests, or a malformed (2) Incoming Mail X or (3) Temporary Mail file. | [
"cpe:2.3:a:eudora:internet_mail_server:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:eudora:internet_mail_server:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:eudora:internet_mail_server:3.2.8:*:*:*:*:*:*:*"
] |
|
CVE-2018-12438 | The Elliptic Curve Cryptography library (aka sunec or libsunec) allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. | [
"cpe:2.3:a:libsunec_project:libsunec:-:*:*:*:*:*:*:*"
] |
|
GHSA-f8g3-rm35-8w7f | The Sponsor Portal in Cisco Identity Services Engine (ISE) 1.2 and earlier does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCui82666. | [] |
|
CVE-2007-3880 | Format string vulnerability in srsexec in Sun Remote Services (SRS) Net Connect 3.2.3 and 3.2.4, as distributed in the SRS Proxy Core (SUNWsrspx) package, allows local users to gain privileges via format string specifiers in unspecified input that is logged through syslog. | [
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:net_connect_software:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:net_connect_software:3.2.4:*:*:*:*:*:*:*"
] |
|
GHSA-gcrj-wc48-gvjv | A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Restaurant Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | [] |
|
CVE-2020-1958 | When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user. | [
"cpe:2.3:a:apache:druid:0.17.0:*:*:*:*:*:*:*"
] |
|
GHSA-gxmq-45pc-rjq6 | A vulnerability was found in PHPList 3.2.6. It has been classified as critical. Affected is an unknown function of the file /lists/admin/ of the component Sending Campain. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component. | [] |
|
CVE-2016-5422 | The web console in Red Hat JBoss Operations Network (JON) before 3.3.7 does not properly authorize requests to add users with the super user role, which allows remote authenticated users to gain admin privileges via a crafted POST request. | [
"cpe:2.3:a:redhat:jboss_operations_network:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-48438 | In cp_dump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
GHSA-56mm-vmx4-jpm3 | The The Notibar – Notification Bar for WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via njt_nofi_text AJAX action in all versions up to, and including, 2.1.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes. | [] |
|
GHSA-8c66-9w2h-5cm9 | SQL injection vulnerability in the EXP Shop (com_expshop) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a show_payment action to index.php. | [] |
|
CVE-2019-5861 | Insufficient data validation in Blink in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to bypass anti-clickjacking policy via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-rc8c-8v29-wf9h | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in richteam Share Buttons – Social Media allows Blind SQL Injection.This issue affects Share Buttons – Social Media: from n/a through 1.0.2. | [] |
|
CVE-2016-3028 | IBM Security Access Manager for Web 7.0 before IF2 and 8.0 before 8.0.1.4 IF3 and Security Access Manager 9.0 before 9.0.1.0 IF5 allow remote authenticated users to execute arbitrary commands by leveraging LMI admin access. | [
"cpe:2.3:a:ibm:security_access_manager:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.4:*:*:*:*:*:*:*"
] |
|
GHSA-6xgx-xwqw-p67m | ftcms 2.1 poster.PHP has a XSS vulnerability. The attacker inserts malicious JavaScript code into the web page, causing the user / administrator to trigger malicious code when accessing. | [] |
|
CVE-2018-6756 | True Key (TK) Windows Client - Authentication Abuse vulnerability | Authentication Abuse vulnerability in Microsoft Windows client in McAfee True Key (TK) 5.1.230.7 and earlier allows local users to execute unauthorized commands via specially crafted malware. | [
"cpe:2.3:a:mcafee:true_key:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-q5h4-crfg-8c2v | A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information. | [] |
|
CVE-2016-7844 | GigaCC OFFICE ver.2.3 and earlier allows remote attackers to execute arbitrary OS commands via specially crafted mail template. | [
"cpe:2.3:a:gigaccsecure:gigacc_office:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-0242 | IBM Security Guardium 10.x through 10.1 before p100 allows remote authenticated users to obtain sensitive information by reading an Application Error message. | [
"cpe:2.3:a:ibm:security_guardium:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_guardium:10.01:*:*:*:*:*:*:*"
] |
|
GHSA-4jx4-8xx2-8r3h | Vulnerability in the PeopleSoft Enterprise PT PeopleTools component of Oracle PeopleSoft Products (subcomponent: Application Server). Supported versions that are affected are 8.55, 8.56 and 8.57. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PT PeopleTools accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise PT PeopleTools accessible data. CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N). | [] |
|
CVE-2006-6119 | mmgallery 1.55 allows remote attackers to obtain sensitive information via a direct request for thumbs.php, which reveals the installation path in various error messages. | [
"cpe:2.3:a:mmgallery:mmgallery:1.55:*:*:*:*:*:*:*"
] |
|
GHSA-j9m7-42pq-p58j | Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064. | [] |
|
GHSA-rrw6-j952-j99m | Multiple cross-site request forgery (CSRF) vulnerabilities in the Featured Comments plugin 1.2.1 for WordPress allow remote attackers to hijack the authentication of administrators for requests that change the (1) buried or (2) featured status of a comment via a request to wp-admin/admin-ajax.php. | [] |
|
GHSA-89xr-chqg-6pw6 | The Primer MyData for Woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'img_src' parameter in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
CVE-2021-2124 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] |
|
GHSA-f765-974j-wr7x | D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SubnetMask parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request. | [] |
|
CVE-2021-29554 | Division by 0 in `DenseCountSparseOutput` | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division. Since `data` is given by the `values` argument, `num_batch_elements` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] |
CVE-2019-8814 | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-hgjr-632x-qpp3 | Cross-site scripting vulnerability in file upload | There is a cross-site scripting vulnerability in file upload on the management system of baserCMS.This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.TargetbaserCMS 4.5.1 and earlier versionsVulnerabilityExecution of malicious JavaScript code may alter the display of the page or leak cookie information.CountermeasuresUpdate to the latest version of baserCMSPlease refer to the next page for details.
https://basercms.net/security/JVN_14134801 | [] |
CVE-2023-50469 | Shenzhen Libituo Technology Co., Ltd LBT-T300-T310 v2.2.2.6 was discovered to contain a buffer overflow via the ApCliEncrypType parameter at /apply.cgi. | [
"cpe:2.3:o:szlbt:lbt-t300-t310_firmware:2.2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:szlbt:lbt-t300-t310:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-3334 | Cross-site scripting (XSS) vulnerability in MyBB 1.2.x before 1.2.14 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving search.php. | [
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.04:*:*:*:*:*:*:*"
] |
|
CVE-2006-1474 | Cross-site scripting (XSS) vulnerability in the "failed" functionality in Raindance Web Conferencing Pro allows remote attackers to inject arbitrary web script or HTML via the browser parameter. | [
"cpe:2.3:a:raindance:web_conferencing_pro:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-0483 | Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect integrity via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-4q7c-7fj7-4vmq | The ftp_syslog function in ftpd in SGI IRIX 6.5.20 "doesn't work with anonymous FTP," which has an unknown impact, possibly preventing the actions of anonymous users from being logged. | [] |
|
CVE-2023-4094 | Weak authentication vulnerability in Fujitsu Arconte Áurea | ARCONTE Aurea's authentication system, in its 1.5.0.0 version, could allow an attacker to make incorrect access requests in order to block each legitimate account and cause a denial of service. In addition, a resource has been identified that could allow circumventing the attempt limit set in the login form. | [
"cpe:2.3:a:fujitsu:arconte_aurea:1.5.0.0:*:*:*:*:*:*:*"
] |
GHSA-x3j5-gf6q-9cm2 | A vulnerability has been identified in Parasolid V35.1 (All versions < V35.1.256), Parasolid V36.0 (All versions < V36.0.208), Parasolid V36.1 (All versions < V36.1.173). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition. | [] |
|
GHSA-f523-2f5j-gfcg | Regular Expression Denial of Service in timespan | Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates.The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds.RecommendationNo direct patch is available for this vulnerability.Currently, the best available solution is to use a functionally equivalent alternative package.It is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases. | [] |
GHSA-ccph-7gr8-cq6p | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing watermarks within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8801. | [] |
|
CVE-2014-3461 | hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks." | [
"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-20873 | Improper input validation vulnerability in caminfo driver prior to SMR Jun-2024 Release 1 allows local privileged attackers to write out-of-bounds memory. | [] |
|
CVE-2011-0146 | WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. | [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] |
|
GHSA-mq7p-rx5g-55hm | In permissions of AndroidManifest.xml, there is a possible way to grant signature permissions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244216503 | [] |
|
GHSA-r9wr-r7g9-9cx9 | Buffer overflow in pcdsvgaview in xpcd 2.08 allows local users to execute arbitrary code. | [] |
|
CVE-2024-42222 | Apache CloudStack: Unauthorised Network List Access | In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data.
Affected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1. | [
"cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*"
] |
GHSA-pxp2-fv6q-mfmr | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Computer Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06. | [] |
|
CVE-2016-11060 | Certain NETGEAR devices are affected by insecure renegotiation. This affects SRX5308 before 2017-02-10, FVS336Gv3 before 2017-02-10, FVS318N before 2017-02-10, and FVS318Gv2 before 2017-02-10. | [
"cpe:2.3:o:netgear:fvs318g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:fvs318g:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:fvs318n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:fvs318n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:fvs336g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:fvs336g:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:srx5308_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] |
|
GHSA-gwg2-8c92-5859 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bill Minozzi Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection plugin <= 7.31 versions. | [] |
|
CVE-2017-1544 | IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) caches usernames and passwords in browsers that could be used by a local attacker to obtain sensitive information. IBM X-Force ID: 130812. | [
"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-2196 | Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p4:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p5:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p10:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p4:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p5:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p6:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p7:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p8:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.0.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*"
] |
|
CVE-2003-0797 | Unknown vulnerability in rpc.mountd in SGI IRIX 6.5 through 6.5.22 allows remote attackers to cause a denial of service (process death) via unknown attack vectors. | [
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*"
] |
|
GHSA-fj7h-v25q-fvpr | An issue was discovered on D-Link DIR-850L 1.21WW devices. A partially completed WPA handshake is sufficient for obtaining full access to the wireless network. A client can access the network by sending packets on Data Frames to the AP without encryption. | [] |
|
GHSA-rhf2-x48g-5wr7 | Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option. | [] |
|
CVE-2019-10400 | A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts. | [
"cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2018-17460 | Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-11994 | Server-Side Template Injection and arbitrary file disclosure on Camel templating components | [
"cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:camel:2.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:camel:2.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_repository:11.1.1.7.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-47087 | tee: optee: Fix incorrect page free bug | In the Linux kernel, the following vulnerability has been resolved:
tee: optee: Fix incorrect page free bug
Pointer to the allocated pages (struct page *page) has already
progressed towards the end of allocation. It is incorrect to perform
__free_pages(page, order) using this pointer as we would free any
arbitrary pages. Fix this by stop modifying the page pointer. | [] |
CVE-2009-3152 | Multiple cross-site scripting (XSS) vulnerabilities in becommunity/community/index.php in NTSOFT BBS E-Market Professional allow remote attackers to inject arbitrary web script or HTML via the (1) page, (2) bt_code, and (3) b_no parameters in a board view action. | [
"cpe:2.3:a:nt:bbs_e-market:*:*:professional:*:*:*:*:*"
] |
|
GHSA-pchp-c5w8-47gc | Hash collision attack vulnerability in Jenkins | Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack." | [] |
CVE-2021-39791 | In WallpaperManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194112606 | [
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-4272 | studygolang topics.js cross site scripting | A vulnerability classified as problematic has been found in studygolang. This affects an unknown part of the file static/js/topics.js. The manipulation of the argument contentHtml leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 0fb30f9640bd5fa0cae58922eac6c00bb1a94391. It is recommended to apply a patch to fix this issue. The identifier VDB-216477 was assigned to this vulnerability. | [
"cpe:2.3:a:studygolang:studygolang:-:*:*:*:*:*:*:*"
] |
GHSA-ghwh-356h-wcgq | RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell. | [] |
|
CVE-2024-6741 | Openfind Mail2000 - HttpOnly flag bypass | Openfind's Mail2000 has a vulnerability that allows the HttpOnly flag to be bypassed. Unauthenticated remote attackers can exploit this vulnerability using specific JavaScript code to obtain the session cookie with the HttpOnly flag enabled. | [
"cpe:2.3:a:openfind:mail2000:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openfind:mail2000:8.0:*:*:*:*:*:*:*"
] |
GHSA-jgwr-cv67-x929 | NETGEAR R7800 devices before 1.0.2.62 are affected by command injection by an authenticated user. | [] |
|
CVE-2014-8943 | Lexiglot through 2014-11-20 allows SSRF via the admin.php?page=projects svn_url parameter. | [
"cpe:2.3:a:piwigo:lexiglot:*:*:*:*:*:*:*:*"
] |
|
GHSA-vhcf-5c7x-fg63 | Unspecified vulnerability in IBM Rational Service Tester 8.3.x and 8.5.x before 8.5.1 and Rational Performance Tester 8.3.x and 8.5.x before 8.5.1 allows remote attackers to read arbitrary files via unknown vectors. | [] |
|
GHSA-jvcx-g8c3-q6w7 | Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter. | [] |
|
CVE-2008-5064 | SQL injection vulnerability in liga.php in H&H WebSoccer 2.80 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:h\\&h:websoccer:2.80:*:*:*:*:*:*:*"
] |
|
CVE-2021-23364 | Regular Expression Denial of Service (ReDoS) | The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries. | [
"cpe:2.3:a:browserslist_project:browserslist:*:*:*:*:*:node.js:*:*"
] |
CVE-2020-6302 | SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application. | [
"cpe:2.3:a:sap:commerce:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:1808:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:1811:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*"
] |
|
GHSA-4q23-g7mf-xp98 | Cross-site Scripting in Apache DeltaSpike | The Apache DeltaSpike-JSF 1.8.0 module has a XSS injection leak in the windowId handling. The default size of the windowId get's cut off after 10 characters (by default), so the impact might be limited. A fix got applied and released in Apache deltaspike-1.8.1. | [] |
CVE-2010-2246 | feh before 1.8, when the --wget-timestamp option is enabled, might allow remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [
"cpe:2.3:a:feh_project:feh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feh_project:feh:1.6.1:*:*:*:*:*:*:*"
] |
|
GHSA-jj5v-2f8v-5cg8 | app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored XSS in the sharing groups view. | [] |
|
CVE-2024-36881 | mm/userfaultfd: reset ptes when close() for wr-protected ones | In the Linux kernel, the following vulnerability has been resolved:
mm/userfaultfd: reset ptes when close() for wr-protected ones
Userfaultfd unregister includes a step to remove wr-protect bits from all
the relevant pgtable entries, but that only covered an explicit
UFFDIO_UNREGISTER ioctl, not a close() on the userfaultfd itself. Cover
that too. This fixes a WARN trace.
The only user visible side effect is the user can observe leftover
wr-protect bits even if the user close()ed on an userfaultfd when
releasing the last reference of it. However hopefully that should be
harmless, and nothing bad should happen even if so.
This change is now more important after the recent page-table-check
patch we merged in mm-unstable (446dd9ad37d0 ("mm/page_table_check:
support userfault wr-protect entries")), as we'll do sanity check on
uffd-wp bits without vma context. So it's better if we can 100%
guarantee no uffd-wp bit leftovers, to make sure each report will be
valid. | [] |
CVE-2025-0973 | CmsEasy index.php backAll_action path traversal | A vulnerability classified as critical was found in CmsEasy 7.7.7.9. This vulnerability affects the function backAll_action in the library lib/admin/database_admin.php of the file /index.php?case=database&act=backAll&admin_dir=admin&site=default. The manipulation of the argument select[] leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
CVE-2020-9292 | An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges via the AoWinAgt executable service path. | [
"cpe:2.3:a:fortinet:fortisiem_windows_agent:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-0176 | Cross-site scripting (XSS) vulnerability in search/advanced_search.php in GForge 4.5.11 allows remote attackers to inject arbitrary web script or HTML via the words parameter. | [
"cpe:2.3:a:gforge:gforge:4.5.11:*:*:*:*:*:*:*"
] |
|
GHSA-88f9-p426-68xj | Cross-site scripting (XSS) vulnerability in Apple Safari before 6.0 allows remote attackers to inject arbitrary web script or HTML via a feed:// URL. | [] |
|
CVE-2022-39274 | Buffer Overflow in `ProcessRadioRxDone` in LoRaMac-node | LoRaMac-node is a reference implementation and documentation of a LoRa network node. Versions of LoRaMac-node prior to 4.7.0 are vulnerable to a buffer overflow. Improper size validation of the incoming radio frames can lead to an 65280-byte out-of-bounds write. The function `ProcessRadioRxDone` implicitly expects incoming radio frames to have at least a payload of one byte or more. An empty payload leads to a 1-byte out-of-bounds read of user controlled content when the payload buffer is reused. This allows an attacker to craft a FRAME_TYPE_PROPRIETARY frame with size -1 which results in an 65280-byte out-of-bounds memcopy likely with partially controlled attacker data. Corrupting a large part if the data section is likely to cause a DoS. If the large out-of-bounds write does not immediately crash the attacker may gain control over the execution due to now controlling large parts of the data section. Users are advised to upgrade either by updating their package or by manually applying the patch commit `e851b079`. | [
"cpe:2.3:a:semtech:loramac-node:*:*:*:*:*:*:*:*"
] |
GHSA-5j86-82cw-7ff8 | Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
GHSA-c2pc-4ww4-m54p | In the Linux kernel, the following vulnerability has been resolved:dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_initIf the function sdma_load_context() fails, the sdma_desc will be
freed, but the allocated desc->bd is forgot to be freed.We already met the sdma_load_context() failure case and the log as
below:
[ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready
...In this case, the desc->bd will not be freed without this change. | [] |
|
CVE-2007-6376 | Directory traversal vulnerability in autohtml.php in Francisco Burzi PHP-Nuke 8.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the filename parameter, a different vector than CVE-2006-4190. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:francisco_burzi:php-nuke:8.0_final:*:*:*:*:*:*:*"
] |
|
GHSA-79qj-m27m-8wj2 | Vulnerability in the Oracle Field Service product of Oracle E-Business Suite (component: Wireless). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Field Service. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Field Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Field Service accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [] |
|
CVE-2002-1695 | Norton Internet Security 2001 opens log files with FILE_SHARE_READ and FILE_SHARE_WRITE permissions, which could allow remote attackers to modify the log file contents while Norton Internet Security is running. | [
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2001:*:*:*:*:*:*:*"
] |
|
CVE-2017-9257 | The mp4ff_read_ctts function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mp4 file. | [
"cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.7:*:*:*:*:*:*:*"
] |
|
CVE-2024-36154 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
GHSA-32qr-rh8p-qfq7 | A race condition was found in vdsm. Functionality to obfuscate sensitive values in log files that may lead to values being stored in clear text. | [] |
|
GHSA-m8hp-vh5f-j47f | Path traversal vulnerability in AtBroadcastReceiver in FactoryCamera prior to version 3.5.51 allows attackers to write arbitrary file as FactoryCamera privilege. | [] |
|
CVE-2011-2599 | Google Chrome 11 does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader. | [
"cpe:2.3:a:google:chrome:11:*:*:*:*:*:*:*"
] |
|
GHSA-mwc9-x4cr-fwcw | handler/upload_handler.jsp in DEXT5 Editor through 3.5.1402961 allows an attacker to download arbitrary files via the savefilepath field. | [] |
|
CVE-2023-23498 | A logic issue was addressed with improved state management. This issue is fixed in iOS 15.7.3 and iPadOS 15.7.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. The quoted original message may be selected from the wrong email when forwarding an email from an Exchange account. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-cjrf-54m6-fq57 | Direct static code injection vulnerability in index.php in Limesoft Guestbook (LS Simple Guestbook) 1.0 allows remote attackers to inject arbitrary PHP code into posts.txt via the message parameter. | [] |
|
GHSA-4p9j-hxp9-vjc8 | GGZ Gaming Zone 0.0.12 allows remote attackers to cause a denial of service (client disconnect) via inputs that produce malformed XML, including (1) trailing ' (apostrophe) character on the ID attribute in a PLAYER XML tag, (2) joining with a long ID attribute or non-trailing ' characters, which causes a <none> name to be assigned, and then disconnecting, or (3) a long CDATA message attribute, which prevents closing tags from being added to the string. | [] |
|
CVE-2021-40350 | webctrl.cgi.elf on Christie Digital DWU850-GS V06.46 devices allows attackers to perform any desired action via a crafted query containing an unspecified Cookie header. Authentication bypass can be achieved by including an administrative cookie that the device does not validate. | [
"cpe:2.3:o:christiedigital:dwu850-gs_firmware:06.46:*:*:*:*:*:*:*",
"cpe:2.3:h:christiedigital:dwu850-gs:-:*:*:*:*:*:*:*"
] |
|
GHSA-g54m-6fph-847q | In Cloud Foundry Foundation cf-deployment v0.35.0, a misconfiguration with Loggregator and syslog-drain causes logs to be drained to unintended locations. | [] |
|
CVE-2006-2568 | PHP remote file inclusion vulnerability in addpost_newpoll.php in UBB.threads 6.4 through 6.5.2 and 6.5.1.1 (trial) allows remote attackers to execute arbitrary PHP code via a URL in the thispath parameter. | [
"cpe:2.3:a:ubbcentral:ubb.threads:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.5.2:*:*:*:*:*:*:*"
] |
|
CVE-2008-0136 | Snitz Forums 2000 3.4.05 allows remote attackers to obtain sensitive information via a direct request to forum/whereami.asp, which reveals the database path. | [
"cpe:2.3:a:snitz_communications:snitz_forums_2000:3.4.05:*:*:*:*:*:*:*"
] |
|
GHSA-frg3-7rqg-45f3 | Stack-based buffer overflow in VUPlayer 2.49 allows remote attackers to execute arbitrary code via a long .asf URI in the HREF attribute of a REF element in a .asx file. | [] |
|
CVE-2014-6640 | The DNB Trade (aka lt.dnb.mobiletrade) application 1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:dnb:dnb_trade:1.0:*:*:*:*:android:*:*"
] |
|
CVE-2024-49792 | IBM ApplinX Cross-Site Scripting | IBM ApplinX 11.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.