Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2020-10587
antiX and MX Linux allow local users to achieve root access via "persist-config --command /bin/sh" because of the Sudo configuration.
[ "cpe:2.3:o:antixlinux:antix_linux:-:*:*:*:*:*:*:*", "cpe:2.3:o:mxlinux:mx_linux:-:*:*:*:*:*:*:*" ]
GHSA-mjwm-xp4r-6444
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
[]
CVE-2023-32050
Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*" ]
GHSA-whgj-6m78-2gg9
Arbitrary file read vulnerability in Jenkins AWS CodeCommit Trigger Plugin
Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.
[]
GHSA-wvc9-6xq9-f3hx
Technicolor Router TD5130 with firmware 2.05.C29GV allows remote attackers to execute arbitrary commands via shell metacharacters in the ping field (setobject_ip parameter).
[]
CVE-2022-35815
Azure Site Recovery Elevation of Privilege Vulnerability
Azure Site Recovery Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_site_recovery:*:*:*:*:vmware_to_azure:*:*:*" ]
CVE-2005-4075
Multiple cross-site scripting (XSS) vulnerabilities in index.cfm in CF_Nuke 4.6 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) topic and (2) newsid parameter in the news sector, and (3) cat parameter in the links sector.
[ "cpe:2.3:a:mycfnuke:cf_nuke:*:*:*:*:*:*:*:*", "cpe:2.3:a:mycfnuke:cf_nuke:3.0a:*:*:*:*:*:*:*", "cpe:2.3:a:mycfnuke:cf_nuke:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mycfnuke:cf_nuke:4.5:*:*:*:*:*:*:*" ]
GHSA-57hv-vqrf-h67f
Avaya IX Workforce Engagement v15.2.7.1195 - CWE-522: Insufficiently Protected Credentials
[]
GHSA-wxpv-97w2-ch7x
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the openList method of XFAScriptObject objects. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this to execute code in the context of the current process. Was ZDI-CAN-5021.
[]
CVE-2018-12461
Certificate Revocation Check failure
Fixed issues with NetIQ eDirectory prior to 9.1.1 when checking certificate revocation.
[ "cpe:2.3:a:netiq:edirectory:9.1.1:*:*:*:*:*:*:*" ]
GHSA-wpv3-j7wc-292j
user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code.
[]
GHSA-4223-r78w-6q8p
The Relevanssi – A Better Search plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the relevanssi_export_log_check() function in all versions up to, and including, 4.22.0. This makes it possible for unauthenticated attackers to export the query log data. The vendor has indicated that they may look into adding a capability check for proper authorization control, however, this vulnerability is theoretically patched as is.
[]
GHSA-4hgr-p9xw-mqhc
Exploitation of Privilege/Trust vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.R18 allows local users to bypass product self-protection, tamper with policies and product files, and uninstall McAfee software without permission via specially crafted malware.
[]
CVE-2018-21155
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.52, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.4.2, R9000 before 1.0.3.16, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64.
[ "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*" ]
GHSA-xg25-46f7-mw38
Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.
[]
CVE-2009-2983
Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*" ]
GHSA-8cr8-fvmm-h4p4
An insecure modification flaw in the /etc/passwd file was found in the redhat-sso-7 container. An attacker with access to the container can use this flaw to modify the /etc/passwd and escalate their privileges.
[]
CVE-2025-3676
xxyopen Novel-Plus books sql injection
A vulnerability classified as critical has been found in xxyopen Novel-Plus 3.5.0. This affects an unknown part of the file /api/front/search/books. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2015-0253
The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.
[ "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ]
CVE-2011-4286
Multiple cross-site scripting (XSS) vulnerabilities in the media-filter implementation in filter/mediaplugin/filter.php in Moodle 1.9.x before 1.9.11 and 2.0.x before 2.0.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) Flash Video (aka FLV) files and (2) YouTube videos.
[ "cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*" ]
GHSA-fr2x-v6g7-3mwv
An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required. This leads to a limited impact of confidentiality and integrity but no impact of availability.
[]
CVE-2017-8808
MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has XSS when the $wgShowExceptionDetails setting is false and the browser sends non-standard URL escaping.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.28.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.29.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.29.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2023-1924
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_toolbar_save_settings_callback function. This makes it possible for unauthenticated attackers to change cache settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*" ]
GHSA-pj2p-7pr2-rhx8
In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601.
[]
CVE-2015-0994
Inductive Automation Ignition 7.7.2 allows remote authenticated users to bypass a brute-force protection mechanism by using different session ID values in a series of HTTP requests.
[ "cpe:2.3:a:inductiveautomation:ignition:7.7.2:*:*:*:*:*:*:*" ]
CVE-2010-3106
The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.
[ "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*" ]
CVE-2010-1117
Heap-based buffer overflow in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to discover the base address of a Windows .dll file, and possibly have unspecified other impact, via unknown vectors, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
[ "cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*" ]
CVE-2018-5670
An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php sale_conditions[count][] parameter.
[ "cpe:2.3:a:booking_calendar_project:booking_calendar:2.1.7:*:*:*:*:wordpress:*:*" ]
GHSA-fq48-3wjh-9wgm
Multiple stack-based buffer overflows in tm1admsd.exe in the Admin Server in IBM Cognos TM1 9.4.x and 9.5.x before 9.5.2 FP2 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted data.
[]
GHSA-977v-29j9-9rxc
MoinMoin improper sanitizes user profiles
MoinMoin before 1.8.7 and 1.9.x before 1.9.2 does not properly sanitize user profiles, which has unspecified impact and attack vectors.
[]
GHSA-r56w-2cpm-vq4p
SQL injection vulnerability in index.php in Diesel Pay allows remote attackers to execute arbitrary SQL commands via the area parameter in a browse action.
[]
CVE-2021-39345
HAL <= 2.1.1 Authenticated Stored Cross-Site Scripting
The HAL WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/wp-hal.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.1.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
[ "cpe:2.3:a:cnrs:hal:*:*:*:*:*:wordpress:*:*" ]
CVE-2006-3266
Multiple PHP remote file inclusion vulnerabilities in Bee-hive Lite 1.2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) header parameter to (a) conad/include/rootGui.inc.php and (b) include/rootGui.inc.php; (2) mysqlCall parameter to (c) conad/changeEmail.inc.php, (d) conad/changeUserDetails.inc.php, (e) conad/checkPasswd.inc.php, (f) conad/login.inc.php and (g) conad/logout.inc.php; (3) mysqlcall parameter to (h) include/listall.inc.php; (4) prefix parameter to (i) show/index.php; and (5) config parameter to (j) conad/include/mysqlCall.inc.php.
[ "cpe:2.3:a:magnet:bee-hive_lite:*:*:*:*:*:*:*:*" ]
CVE-2001-0408
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
[ "cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*" ]
CVE-2022-27127
zbzcms v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php/ajax.php.
[ "cpe:2.3:a:zbzcms:zbzcms:1.0:*:*:*:*:*:*:*" ]
GHSA-mpv7-gcx8-hrh4
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 allow any user to obtain the presentation passcode via the iso.3.6.1.4.1.3212.100.3.2.7.4 OIDs. A remote, unauthenticated attacker can use this vulnerability to access a restricted presentation or to become the presenter.
[]
CVE-2025-27567
Cross-site scripting vulnerability exists in the NickName registration screen of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the configuration page or functions accessible only from the LAN side of the product.
[]
GHSA-8g2v-3pc7-fxw6
QuickTime in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Photoshop document.
[]
GHSA-38f8-6mx5-p5qh
Use after free in Sharing in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.
[]
CVE-2020-20692
GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.
[ "cpe:2.3:a:gilacms:gila_cms:1.11.4:*:*:*:*:*:*:*" ]
CVE-2009-4002
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file.
[ "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*" ]
GHSA-c4c3-j73v-634r
silverstripe/framework has Cross-site Scripting vulnerability in page history comparison
Authenticated user with page edit permission can craft HTML, which when rendered in a page history comparison can execute client scripts.
[]
CVE-2024-39775
Net Manager has an out-of-bounds read permission bypass vulnerability
in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read.
[ "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*" ]
GHSA-w8cr-mf7c-gx8m
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the feed.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
[]
GHSA-4c35-9qwv-fj5v
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.
[]
CVE-2009-0002
Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a QTVR movie file with crafted THKD atoms.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
CVE-2019-1006
An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys, aka 'WCF/WIF SAML Token Authentication Bypass Vulnerability'.
[ "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:identitymodel:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*" ]
CVE-2023-22085
Vulnerability in the Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Opera). The supported version that is affected is 5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in takeover of Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.6:*:*:*:*:*:*:*" ]
CVE-2024-57682
An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to access sensitive information via a crafted POST request.
[]
GHSA-whmg-cwg5-87xp
In the Linux kernel, the following vulnerability has been resolved:net: bridge: mst: pass vlan group directly to br_mst_vlan_set_statePass the already obtained vlan group pointer to br_mst_vlan_set_state() instead of dereferencing it again. Each caller has already correctly dereferenced it for their context. This change is required for the following suspicious RCU dereference fix. No functional changes intended.
[]
GHSA-v5qv-p4x6-222f
The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0, 2.0 SP1, 2.0 SP2, 3.5, and 3.5 SP1, and Silverlight 2, does not properly handle interfaces, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted Silverlight application, (3) a crafted ASP.NET application, or (4) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Vulnerability."
[]
GHSA-hrw4-vr8h-245c
The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.6, tvOS 17.6, Safari 17.6, macOS Sonoma 14.6, visionOS 1.3, iOS 17.6 and iPadOS 17.6. Processing web content may lead to a denial-of-service.
[]
CVE-2021-44925
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_svg_get_attribute_name function, which causes a segmentation fault and application crash.
[ "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*" ]
GHSA-hgm9-g82q-236j
In the Linux kernel, the following vulnerability has been resolved:misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handlingResolve kernel panic caused by improper handling of IRQs while accessing GPIO values. This is done by replacing generic_handle_irq with handle_nested_irq.
[]
CVE-2024-48783
An issue in Ruijie NBR3000D-E Gateway allows a remote attacker to obtain sensitive information via the /tool/shell/postgresql.conf component.
[ "cpe:2.3:o:ruijie:nbr3000d-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruijie:nbr3000d-e:-:*:*:*:*:*:*:*" ]
GHSA-5hh3-9v9q-52h9
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘surname_filter’ parameter with the administrative account or through cross-site request forgery.
[]
GHSA-hqp7-5m3w-m539
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marty Thornley Photographer Connections allows Stored XSS.This issue affects Photographer Connections: from n/a through 1.3.1.
[]
CVE-2004-2509
Cross-site scripting (XSS) vulnerabilities in (1) calendar.php, (2) login.php, and (3) online.php in Infopop UBB.Threads 6.2.3 and 6.5 allow remote attackers to inject arbitrary web script or HTML via the Cat parameter.
[ "cpe:2.3:a:ubbcentral:ubb.threads:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ubbcentral:ubb.threads:6.5:*:*:*:*:*:*:*" ]
GHSA-3xfp-j69g-wh2v
An XSS issue in the /goform/WifiBasicSet endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute malicious payloads via the WifiName POST parameter.
[]
CVE-2019-17244
IrfanView 4.53 allows Data from a Faulting Address to control Code Flow starting at JPEG_LS+0x0000000000001d8a.
[ "cpe:2.3:a:irfanview:irfanview:4.53:*:*:*:*:*:*:*" ]
GHSA-m5mm-7f4v-27v9
In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository.
[]
GHSA-rh73-cm8p-fv5g
In externalOnRequest of rilapplication.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239701761References: N/A
[]
CVE-2023-50881
WordPress Advanced Access Manager Plugin <= 6.9.15 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More allows Stored XSS.This issue affects Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.15.
[ "cpe:2.3:a:vasyltech:advanced_access_manager:*:*:*:*:*:wordpress:*:*" ]
CVE-2010-0263
Microsoft Office Excel 2007 SP1 and SP2; Office 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer SP1 and SP2; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2; and Office SharePoint Server 2007 SP1 and SP2 do not validate ZIP headers during decompression of Open XML (.XLSX) documents, which allows remote attackers to execute arbitrary code via a crafted document that triggers access to uninitialized memory locations, aka "Microsoft Office Excel XLSX File Parsing Code Execution Vulnerability."
[ "cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_excel_viewer:*:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_excel_viewer:*:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*", "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*", "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*" ]
CVE-2013-2702
Cross-site request forgery (CSRF) vulnerability in the Easy AdSense Lite plugin before 6.10 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that modify this plugin's settings.
[ "cpe:2.3:a:thulasidas:easy-adsense-lite:*:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.30:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.50:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.60:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.61:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.70:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.80:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.81:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:1.82:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.00:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.26:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.30:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.31:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.32:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.33:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.34:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.35:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.36:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.37:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.38:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.40:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.41:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.51:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.52:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.53:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.54:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.55:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.56:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.57:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.58:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.59:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.60:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.61:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.62:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.63:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.64:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.70:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.71:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.72:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.73:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.75:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.76:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.77:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.78:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.79:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.80:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.81:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.82:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.83:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.84:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.85:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.86:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.87:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.88:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.89:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.90:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.91:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.92:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.93:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.94:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.95:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.96:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.97:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.98:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:2.99:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.00:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.03:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.04:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.05:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.06:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.07:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.08:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.09:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:4.10:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.00:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.06:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.08:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.17:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.18:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.19:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.20:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.21:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.22:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.23:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:5.24:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:6.00:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:thulasidas:easy-adsense-lite:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*" ]
GHSA-vmxf-cw8g-82w4
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) 9.1(6.11) and 9.4(1.2) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device, aka WebVPN XSS. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCve19179.
[]
CVE-2018-20440
Technicolor CWA0101 CWA0101E-A23E-c7000r5712-170315-SKC devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.4413.2.2.2.1.5.4.1.14.1.3.10001 and 1.3.6.1.4.1.4413.2.2.2.1.18.1.2.3.4.1.2.10001 SNMP requests.
[ "cpe:2.3:o:technicolor:cwa0101_firmware:cwa0101e-a23e-c7000r5712-170315-skc:*:*:*:*:*:*:*", "cpe:2.3:h:technicolor:cwa0101:-:*:*:*:*:*:*:*" ]
CVE-1999-0569
A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.
[]
GHSA-v98x-rcq4-6937
The (1) strip_tags, (2) setcookie, (3) strtok, (4) wordwrap, (5) str_word_count, and (6) str_pad functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
[]
GHSA-qv64-w99c-qcr9
Jenkins temporary uploaded file created with insecure permissions
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it. Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins.
[]
CVE-2020-2959
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via MLD to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
GHSA-vcfg-5rc5-3vvf
Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.
[]
CVE-2023-0668
Wireshark IEEE-C37.118 parsing buffer overflow
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
GHSA-3cmq-9cqr-3jc4
In setParameter of MtpPacket.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
CVE-2021-23342
Cross-site Scripting (XSS)
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
[ "cpe:2.3:a:docsifyjs:docsify:*:*:*:*:*:*:*:*" ]
GHSA-xr6g-86xc-gg67
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Flector Easy Textillate allows Stored XSS.This issue affects Easy Textillate: from n/a through 2.02.
[]
GHSA-cx8v-4599-xpcf
Given the TEE is compromised and controlled by the attacker, improper state maintenance in StrongBox allows attackers to change Android ROT during device boot cycle after compromising TEE. The patch is applied in Galaxy S22 to prevent change of Android ROT after first initialization at boot time.
[]
GHSA-45w5-pvr8-4rh5
Command injection in eslint-fixer
The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted.
[]
GHSA-wvq7-fmcr-mvgx
The Gift Up Gift Cards for WordPress and WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'giftup' shortcode in all versions up to, and including, 2.20.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-g7hp-974g-6wg8
Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to access any file on the system.This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others.
[]
CVE-2021-33110
Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
[ "cpe:2.3:o:intel:ac_1550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*" ]
GHSA-h43f-65rj-8fvg
Huawei Share function in P30 9.1.0.193(C00E190R2P1) smartphone has an improper access control vulnerability. The function incorrectly controls certain access messages, attackers can simulate a sender to steal P2P network information. Successful exploit may cause information leakage.
[]
GHSA-2rvc-wpwm-6p6x
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter-result.php table parameter when action=add is used.
[]
CVE-2024-42941
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the wanmode parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[ "cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*", "cpe:2.3:h:tenda:fh1201:-:*:*:*:*:*:*:*" ]
GHSA-hggx-3mcq-v36x
The invalidRedirectUrl template in Atlassian Application Links before version 5.2.7, from version 5.3.0 before version 5.3.4 and from version 5.4.0 before version 5.4.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the redirectUrl parameter link in the redirect warning message.
[]
GHSA-rmp9-mc8w-mqf3
Users with Overall/Read access can enumerate credentials IDs in Amazon EC2 Plugin
Amazon EC2 Plugin provides a list of applicable credentials IDs to allow users configuring the plugin to select the one to use.This functionality does not correctly check permissions in Amazon EC2 Plugin 1.50.1 and earlier, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those can be used as part of an attack to capture the credentials using another vulnerability.An enumeration of credentials IDs in Amazon EC2 Plugin 1.50.2 now requires Overall/Administer permission.
[]
CVE-2014-6867
The Sortir en Alsace (aka com.axessweb.sortirenalsace) application 0.5b for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:sortir-en-alsace:sortir_en_alsace:0.5b:*:*:*:*:android:*:*" ]
CVE-2020-1188
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1131, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2016-4508
Cross-site scripting (XSS) vulnerability in Rexroth Bosch BLADEcontrol-WebVIS 3.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:bosch:bladecontrol-webvis:*:*:*:*:*:*:*:*" ]
CVE-2020-15648
Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header. This vulnerability affects Thunderbird < 78 and Firefox < 78.0.2.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
GHSA-fh9j-w3wm-258j
Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia ColdFusion 6.0 allows remote attackers to execute arbitrary via an HTTP GET request with a long .cfm file name.
[]
CVE-2024-11064
D-Link DSL6740C - OS Command Injection
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
[ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*" ]
GHSA-392h-r46j-q24p
OwnCast remote code execution vulnerability
An issue in OwnCast v.0.1.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via the authHost parameter of the indieauth function.
[]
CVE-2024-6945
Flute CMS Avatar Upload Page ImagesController.php unrestricted upload
A vulnerability was found in Flute CMS 0.2.2.4-alpha. It has been classified as critical. This affects an unknown part of the file app/Core/Http/Controllers/Profile/ImagesController.php of the component Avatar Upload Page. The manipulation of the argument avatar leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272067.
[ "cpe:2.3:a:flute:cms:0.2.2.4-alpha:*:*:*:*:*:*:*", "cpe:2.3:a:flute-cms:flute:0.2.2.4:alpha:*:*:*:*:*:*" ]
GHSA-cx3x-82j4-jc5x
Unspecified vulnerability in Zimbra Collaboration Server 7.2.5 and earlier, and 8.0.x through 8.0.5, has "critical" impact and unspecified vectors, a different vulnerability than CVE-2013-7091.
[]
CVE-2015-5168
Unspecified vulnerability in the HTTP/2 experimental feature in Apache Traffic Server 5.3.x before 5.3.2 has unknown impact and attack vectors, a different vulnerability than CVE-2015-5206.
[ "cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:traffic_server:5.3.1:*:*:*:*:*:*:*" ]
GHSA-gr5p-pgwj-mvx7
The QIWI Wallet (ru.mw) application before 1.14.2 for Android does not properly protect data, which allows remote attackers to read or modify financial information via a crafted application.
[]
CVE-2018-13616
The mintToken function of a smart contract implementation for IOCT_Coin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:ioct_coin_project:ioct_coin:-:*:*:*:*:*:*:*" ]
CVE-2021-31919
An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct.
[ "cpe:2.3:a:rkyv_project:rkyv:*:*:*:*:*:rust:*:*" ]
CVE-2024-1700
keerti1924 PHP-MYSQL-User-Login-System signup.php cross site scripting
A vulnerability, which was classified as problematic, was found in keerti1924 PHP-MYSQL-User-Login-System 1.0. Affected is an unknown function of the file /signup.php. The manipulation of the argument username with the input <script>alert("xss")</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:keerti1924:php-mysql-user-login-system:1.0:*:*:*:*:*:*:*" ]