id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-cw58-gpgw-hwx2 | Plone allows weak passwords | Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking. | [] |
GHSA-w5qx-q47h-98vx | Unspecified vulnerability on HP Integrated Lights-Out 3 (aka iLO3) cards with firmware before 1.57 and 4 (aka iLO4) cards with firmware before 1.22, when Single-Sign-On (SSO) is used, allows remote attackers to execute arbitrary code via unknown vectors. | [] |
|
CVE-2015-6946 | Multiple stack-based buffer overflows in the Reprise License Manager service in Borland AccuRev allow remote attackers to execute arbitrary code via the (1) akey or (2) actserver parameter to the activate_doit function or (3) licfile parameter to the service_startup_doit functionality. | [
"cpe:2.3:a:microfocus:accurev:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-1037 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] |
|
GHSA-c6qp-pc37-g43r | The optional feature 'Anti-Virus & Sandbox' of i-FILTER contains an issue with improper pattern file validation. If exploited, the product may treat an unauthorized pattern file as an authorized. If the product uses a specially crafted pattern file, information in the server where the product is running may be retrieved, and/or cause a denial of service (DoS) condition. | [] |
|
CVE-2016-6470 | A vulnerability in the installation procedure of the Cisco Hybrid Media Service could allow an authenticated, local attacker to elevate privileges to the root level. More Information: CSCvb81344. Known Affected Releases: 1.0. | [
"cpe:2.3:a:cisco:hybrid_media_service:1.0_base:*:*:*:*:*:*:*"
] |
|
CVE-2021-22457 | A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write. | [
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-4jr8-m4vf-8c9w | A vulnerability has been found in SourceCodester PHP CRUD 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /endpoint/delete.php of the component Delete Person Handler. The manipulation of the argument person leads to sql injection. The attack can be launched remotely. | [] |
|
GHSA-6q2r-m35r-8mf3 | An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage. | [] |
|
GHSA-8g24-3pxp-63wv | SQL injection vulnerability in frs/shownotes.php in Gforge 4.5.19 and earlier allows remote attackers to execute arbitrary SQL commands via the release_id parameter. | [] |
|
CVE-2019-11015 | A vulnerability was found in the MIUI OS version 10.1.3.0 that allows a physically proximate attacker to bypass Lockscreen based authentication via the Wallpaper Carousel application to obtain sensitive Clipboard data and the user's stored credentials (partially). This occurs because of paste access to a social media login page. | [
"cpe:2.3:o:miui:miui:10.1.3.0:*:*:*:*:*:*:*"
] |
|
GHSA-r88g-69v7-222w | Cross-site scripting (XSS) vulnerability in HP Integrated Lights-Out 4 (iLO4) with firmware before 1.32 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-w7gh-f2fm-9q8r | PEAR HTTP_Request2 vulnerable to Cross-site Scripting | In PEAR HTTP_Request2 before 2.7.0, multiple files in the tests directory, notably tests/_network/getparameters.php and tests/_network/postparameters.php, reflect any GET or POST parameters, leading to XSS. | [] |
GHSA-qwj6-q94f-8425 | MathLive's Lack of Escaping of HTML allows for XSS | SummaryDespite normal text rendering as LaTeX expressions, preventing XSS, the library also provides users with commands which may modify HTML, such as the `\htmlData` command, and the lack of escaping leads to XSS.DetailsOverall in the code, other than in the `test` folder, no functions escaping HTML can be seen.PoCGo to https://cortexjs.io/mathlive/demo/Paste either `\htmlData{><img/onerror=alert(1)"src=}{}` or `\htmlData{x=" ><img/onerror=alert(1) src>}{}` in the LaTeX textarea.ImpactMathLive users who render untrusted mathematical expressions could encounter malicious input using \htmlData that runs arbitrary JavaScript, or generate invalid HTML. | [] |
GHSA-7g98-5gp8-66pw | UCMS 1.6 is vulnerable to arbitrary file upload via ucms/sadmin/file PHP file. | [] |
|
GHSA-fvq4-vxm4-wp27 | The Under Construction plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.96. This is due to missing or incorrect nonce validation on the dismiss_notice function called via the admin_action_ucp_dismiss_notice action. This makes it possible for unauthenticated attackers to dismiss plugin notifications via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-wfmq-qg4j-pwmg | Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities discovered in WP-DownloadManager WordPress plugin (versions <= 1.68.6). Vulnerable parameters &download_path, &download_path_url, &download_page_url, &download_categories. | [] |
|
GHSA-266h-7g3r-4j2m | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the delay property of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7157. | [] |
|
CVE-2022-20620 | Missing permission checks in Jenkins SSH Agent Plugin 1.23 and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:ssh_agent:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-fhp7-79wc-6xf2 | Unrestricted file upload vulnerability in e107 before 0.7.20 allows remote authenticated users to execute arbitrary code by uploading a .php.filetypesphp file. NOTE: the vendor disputes the significance of this issue, noting that "an odd set of preferences and a missing file" are required. | [] |
|
GHSA-83p5-f4pw-9chq | An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191. | [] |
|
CVE-2021-22196 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4. It was possible to exploit a stored cross-site-scripting in merge request via a specifically crafted branch name. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2022-31701 | VMware Workspace ONE Access and Identity Manager contain a broken authentication vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3. | [
"cpe:2.3:a:vmware:access:21.08.0.0:*:*:*:*:linux:*:*",
"cpe:2.3:a:vmware:access:21.08.0.1:*:*:*:*:linux:*:*",
"cpe:2.3:a:vmware:access:22.09.0.0:*:*:*:*:linux:*:*",
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager_connector:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-6146 | SQL injection vulnerability in pm.php in DeluxeBB 1.2 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via a delete##### parameter in a Delete action, a different vector than CVE-2005-2989. | [
"cpe:2.3:a:deluxebb:deluxebb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.06:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.07:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.08:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.09:*:*:*:*:*:*:*"
] |
|
CVE-2024-11372 | Connexion Logs <= 3.0.2 - Admin+ SQL Injection | The Connexion Logs WordPress plugin through 3.0.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks | [] |
CVE-2025-46944 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
CVE-2022-1056 | Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd. | [
"cpe:2.3:a:libtiff:libtiff:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
] |
|
CVE-2008-2850 | SQL injection vulnerability in the TrailScout module 5.x before 5.x-1.4 for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified cookies, related to improper use of the Drupal database API. | [
"cpe:2.3:a:drupal:trailscout_module:5.x:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.3:*:*:*:*:*:*:*"
] |
|
CVE-2020-9805 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-22908 | A buffer overflow vulnerability exists in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user. As of version 9.1R3, this permission is not enabled by default. | [
"cpe:2.3:a:ivanti:connect_secure:9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0rx:*:*:*:*:*:*:*"
] |
|
CVE-2018-16556 | A vulnerability has been identified in SIMATIC S7-400 CPU 412-1 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 DP V7 (All versions), SIMATIC S7-400 CPU 414-2 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-2 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-2 DP V7 (All versions), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 417-4 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V4.5 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.2.1), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 V7 (All versions), SIPLUS S7-400 CPU 417-4 V7 (All versions). Specially crafted packets sent to port 102/tcp via Ethernet interface, via
PROFIBUS, or via Multi Point Interfaces (MPI) could cause the affected
devices to go into defect mode. Manual reboot is required to resume normal
operation.
Successful exploitation requires an attacker to be able to send specially
crafted packets to port 102/tcp via Ethernet interface, via PROFIBUS or Multi
Point Interfaces (MPI). No user interaction and no user privileges are
required to exploit the security vulnerability. The vulnerability could allow
causing a denial of service condition of the core functionality of the CPU,
compromising the availability of the system. | [
"cpe:2.3:o:siemens:simatic_s7-400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-400_pn\\/dp_v7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_pn\\/dp_v7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-400h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-400h_v6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400h_v6:-:*:*:*:*:*:*:*"
] |
|
GHSA-7j5w-vxpg-45wv | Windows Graphics Component Information Disclosure Vulnerability. | [] |
|
CVE-2021-47664 | Enumeration of valid user names | Due to improper authentication mechanism an unauthenticated remote attacker can enumerate valid usernames. | [] |
CVE-2025-32833 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockProjectUserRights' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. | [] |
|
CVE-2017-7968 | An Incorrect Default Permissions issue was discovered in Schneider Electric Wonderware InduSoft Web Studio v8.0 Patch 3 and prior versions. Upon installation, Wonderware InduSoft Web Studio creates a new directory and two files, which are placed in the system's path and can be manipulated by non-administrators. This could allow an authenticated user to escalate his or her privileges. | [
"cpe:2.3:a:schneider-electric:wonderware_indusoft_web_studio:*:*:*:*:*:*:*:*"
] |
|
CVE-2005-0538 | Directory traversal vulnerability in (1) GinpPictureServlet.java and (2) PicCollection.java in ginp (Java Photo Gallery Web Application) before 0.22 allows remote attackers to read arbitrary files. | [
"cpe:2.3:a:ginp:ginp:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ginp:ginp:0.21:*:*:*:*:*:*:*"
] |
|
GHSA-wg83-v62r-wh2x | STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL. | [] |
|
GHSA-9qqf-p84p-rm35 | Buffer overflow in the get_dsmp function in loaders/masi_load.c in libxmp before 4.1.0 allows remote attackers to execute arbitrary code via a crafted MASI file. | [] |
|
CVE-2023-3752 | Creativeitem Academy LMS courses cross site scripting | A vulnerability was found in Creativeitem Academy LMS 5.15. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /home/courses. The manipulation of the argument sort_by leads to cross site scripting. The attack may be launched remotely. VDB-234422 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:creativeitem:academy_lms:5.15:*:*:*:*:*:*:*"
] |
CVE-2024-42905 | Beijing Digital China Cloud Technology Co., Ltd. DCME-320 v.7.4.12.60 has a command execution vulnerability, which can be exploited to obtain device administrator privileges via the getVar function in the code/function/system/tool/ping.php file. | [
"cpe:2.3:a:beijing_digital_china_cloud_technology:dcme-320:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-7688 | Apache OpenMeetings 1.0.0 updates user password in insecure manner. | [
"cpe:2.3:a:apache:openmeetings:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openmeetings:3.2.1:*:*:*:*:*:*:*"
] |
|
GHSA-f4w6-wh8p-6rgp | Directory Traversal vulnerability in Webport CMS 1.19.10.17121 via the file parameter to file/download. | [] |
|
CVE-2015-1318 | The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container). | [
"cpe:2.3:a:apport_project:apport:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.17:*:*:*:*:*:*:*"
] |
|
GHSA-7245-x6gq-6qg5 | An issue was discovered in CandyCMS version 1.0.0, allows remote attackers to execute arbitrary code via the install.php component. | [] |
|
GHSA-vhv3-2hw6-3q7j | Multiple cross-site scripting (XSS) vulnerabilities in cart.php in X-Cart 5.1.8 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) product_id or (2) category_id parameter. | [] |
|
GHSA-m8wm-g2fv-r2mc | FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability. | [] |
|
GHSA-4fhm-jjgv-fj89 | Cross-site scripting in the web application taskbar in TerraMaster TOS version 3.1.03 allows attackers to execute JavaScript via the user's username. | [] |
|
GHSA-hqx2-j33x-9fc4 | Gitea XSS Vulnerability in Repository Description | Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim's browser, when the vulnerable repo page is loaded. The component is: repository's description. The attack vector is: victim must navigate to public and affected repo page. | [] |
GHSA-c29x-q9mw-w4j4 | A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp. | [] |
|
GHSA-7fm6-52cc-8v3r | In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541765; Issue ID: ALPS08541765. | [] |
|
CVE-2014-2323 | SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname. | [
"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"
] |
|
CVE-2017-8991 | HPE has identified a cross site scripting (XSS) vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This issue is resolved in HF16 for HPE CV 6.1 or subsequent version. | [
"cpe:2.3:a:hp:centralview_fraud_risk_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-44wj-8576-vhvg | The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users. | [] |
|
CVE-2014-5731 | The Word Search (aka com.virtuesoft.wordsearch) application 2.3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:jiuzhangtech:word_search:2.3.0:*:*:*:*:android:*:*"
] |
|
GHSA-5wpq-6r82-j39f | An issue was discovered on Samsung mobile devices with Q(10.0) software. Attackers can bypass Factory Reset Protection (FRP) via SPEN. The Samsung ID is SVE-2020-17019 (May 2020). | [] |
|
GHSA-xrvj-hr46-wm97 | A vulnerability, which was classified as critical, has been found in Codezips Online Institute Management System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2024-21196 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-m57p-p67h-mq74 | Command Injection Vulnerability in systeminformation | Impactcommand injection vulnerabilityPatchesProblem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1WorkaroundsIf you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency()For more informationIf you have any questions or comments about this advisory:Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md) | [] |
GHSA-88j7-9543-qfmf | DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to denial-of-service the device via long input values. | [] |
|
CVE-2022-48073 | Phicomm K2G v22.6.3.20 was discovered to store the root and admin passwords in plaintext. | [
"cpe:2.3:o:phicomm:k2_firmware:22.6.534.263:*:*:*:*:*:*:*",
"cpe:2.3:h:phicomm:k2:-:*:*:*:*:*:*:*"
] |
|
GHSA-hp54-qjw8-r2qr | Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow. An attacker can supply a string in the page parameter for reboot.asp endpoint, allowing him to force an overflow when the string is concatenated to the HTML body. | [] |
|
GHSA-5wgx-vm65-xvp4 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation. | [] |
|
CVE-2019-13075 | Tor Browser through 8.5.3 has an information exposure vulnerability. It allows remote attackers to detect the browser's language via vectors involving an IFRAME element, because text in that language is included in the title attribute of a LINK element for a non-HTML page. This is related to a behavior of Firefox before 68. | [
"cpe:2.3:a:torproject:tor_browser:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-29907 | WordPress SEO Backlink Monitor plugin <= 1.5.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Active Websight SEO Backlink Monitor allows Reflected XSS.This issue affects SEO Backlink Monitor: from n/a through 1.5.0.
| [] |
CVE-2022-38684 | In contacts service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
GHSA-4rrx-j7vf-86fq | There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. | [] |
|
CVE-2005-3851 | Cross-site scripting (XSS) vulnerability in search.asp in Online Attendance System (OASYS) Lite 1.0 allows remote attackers to inject arbitrary web script or HTML via certain search parameters, possibly the keyword parameter. | [
"cpe:2.3:a:onlinetechtools.com:oasys_lite:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-x425-m56q-8m7m | The RE-VOLT 2 : Best RC 3D Racing (aka com.wego.revolt2_global) application 1.2.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2021-38278 | Tenda AC10-1200 v15.03.06.23_EN was discovered to contain a buffer overflow via the urls parameter in the saveParentControlInfo function. | [
"cpe:2.3:o:tendacn:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac10:-:*:*:*:*:*:*:*"
] |
|
GHSA-5x5p-mx9q-gjm3 | SQL Injection vulnerability in "B/W Dates Reports" page in phpgurukul Client Management System using PHP & MySQL 1.1 allows attacker to execute arbitrary SQL commands via "todate" and "fromdate" parameters. | [] |
|
GHSA-rrq7-cmgh-6g3h | The Donation Block For PayPal WordPress plugin before 2.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] |
|
GHSA-xq4p-gp5c-c5rw | Session fixation vulnerability in Fujitsu e-Pares V01 L01, L03, L10, L20, L30 allows remote attackers to hijack web sessions via unspecified vectors. | [] |
|
CVE-2022-42989 | ERP Sankhya before v4.11b81 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Caixa de Entrada. | [
"cpe:2.3:a:sankhya:sankhya_om:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-22337 | Improper input validation for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access. | [
"cpe:2.3:a:intel:unison_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-13493 | The mintToken function of a smart contract implementation for DaddyToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:daddytoken_project:daddytoken:-:*:*:*:*:*:*:*"
] |
|
GHSA-4rpw-8wx9-fp4x | After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8. | [] |
|
CVE-2000-0344 | The knfsd NFS server in Linux kernel 2.2.x allows remote attackers to cause a denial of service via a negative size value. | [
"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-13903 | u'Error in UE due to race condition in EPCO handling' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, MDM9205, MDM9206, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, SDM450, SM8150 | [
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-4191 | Panda Antivirus 2008 stores service executables under the product's installation directory with weak permissions, which allows local users to obtain LocalSystem privileges by modifying PAVSRV51.EXE or other unspecified files, a related issue to CVE-2006-4657. | [
"cpe:2.3:a:panda:panda_antivirus:2008:*:*:*:*:*:*:*"
] |
|
CVE-2018-13661 | The mintToken function of a smart contract implementation for APP, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:app_project:app:-:*:*:*:*:*:*:*"
] |
|
GHSA-596x-3pr6-hffr | Improper authorization in Dynamic Lockscreen prior to SMR Sep-2022 Release 1 in Android R(11) and 3.3.03.66 in Android S(12) allows unauthorized use of javascript interface api. | [] |
|
GHSA-h97f-mg55-8293 | Cross-site scripting (XSS) vulnerability in lib/owl.lib.php in Steve Bourgeois and Chris Vincent Owl Intranet Knowledgebase 0.95 and earlier allows remote attackers to inject arbitrary web script or HTML via the username parameter in a getpasswd action to register.php. | [] |
|
GHSA-37cg-58rj-qc4c | In Bluetooth, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230756082 | [] |
|
CVE-2025-46331 | OpenFGA Authorization Bypass | OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA v1.8.10 to v1.3.6 (Helm chart <= openfga-0.2.28, docker <= v.1.8.10) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. This issue has been patched in version 1.8.11. | [] |
GHSA-7gqh-3qq3-gvrr | Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | [] |
|
CVE-2021-24297 | Goto < 2.1 - Reflected Cross-Site Scripting (XSS) | The Goto WordPress theme before 2.1 did not properly sanitize the formvalue JSON POST parameter in its tl_filter AJAX action, leading to an unauthenticated Reflected Cross-site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:boostifythemes:goto:*:*:*:*:*:wordpress:*:*"
] |
CVE-2021-31169 | Windows Container Manager Service Elevation of Privilege Vulnerability | Windows Container Manager Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.982:*:*:*:*:*:*:*"
] |
GHSA-v8f2-89xw-2297 | The password reset feature of Ai3 QbiBot lacks proper access control, allowing unauthenticated remote attackers to reset any user's password. | [] |
|
CVE-2003-1117 | Buffer overflow in RealSystem Server 6.x, 7.x and 8.x, and RealSystem Proxy 8.x, related to URL error handling, allows remote attackers to cause a denial of service and possibly execute arbitrary code. | [
"cpe:2.3:a:realnetworks:realsystem_proxy:8:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realsystem_server:6:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realsystem_server:7:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realsystem_server:8:*:*:*:*:*:*:*"
] |
|
CVE-2023-49356 | A stack buffer overflow vulnerability in MP3Gain v1.6.2 allows an attacker to cause a denial of service via the WriteMP3GainAPETag function at apetag.c:592. | [
"cpe:2.3:a:glensawyer:mp3gain:1.6.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-36617 | ewxrjk sftpserver parse.c sftp_parse_path uninitialized pointer | A vulnerability was found in ewxrjk sftpserver. It has been declared as problematic. Affected by this vulnerability is the function sftp_parse_path of the file parse.c. The manipulation leads to uninitialized pointer. The real existence of this vulnerability is still doubted at the moment. The name of the patch is bf4032f34832ee11d79aa60a226cc018e7ec5eed. It is recommended to apply a patch to fix this issue. The identifier VDB-216205 was assigned to this vulnerability. NOTE: In some deployment models this would be a vulnerability. README specifically warns about avoiding such deployment models. | [
"cpe:2.3:a:greenend:sftpserver:*:*:*:*:*:*:*:*"
] |
CVE-2016-5963 | IBM Security Privileged Identity Manager (ISPIM) Virtual Appliance 2.x before 2.0.2 FP8 does not properly validate updates, which allows remote authenticated users to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:ibm:security_privileged_identity_manager_virtual_appliance:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-96fw-j29x-xjf5 | CascadeView TFTP server allows local users to gain privileges via a symlink attack. | [] |
|
CVE-2020-25846 | CHANGING Inc. NHIServiSignAdapter Windows Versions - Information Leakage -2 | The digest generation function of NHIServiSignAdapter has not been verified for source file path, which leads to the SMB request being redirected to a malicious host, resulting in the leakage of user's credential. | [
"cpe:2.3:a:panorama_project:nhiservisignadapter:1.0.20.0218:*:*:*:*:windows:*:*"
] |
GHSA-v8m7-6w47-349v | Podcast Capture in Podcast Producer for Apple Mac OS X 10.5.2 invokes a subtask with passwords in command line arguments, which allows local users to read the passwords via process listings. | [] |
|
GHSA-x7r8-3f2q-rqcm | The SH Email Alert plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'mid' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
GHSA-c7p3-j6ff-c94q | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H). | [] |
|
GHSA-jwqm-c9f2-2cq3 | Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit | Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected. | [] |
CVE-2022-49073 | ata: sata_dwc_460ex: Fix crash due to OOB write | In the Linux kernel, the following vulnerability has been resolved:
ata: sata_dwc_460ex: Fix crash due to OOB write
the driver uses libata's "tag" values from in various arrays.
Since the mentioned patch bumped the ATA_TAG_INTERNAL to 32,
the value of the SATA_DWC_QCMD_MAX needs to account for that.
Otherwise ATA_TAG_INTERNAL usage cause similar crashes like
this as reported by Tice Rex on the OpenWrt Forum and
reproduced (with symbols) here:
| BUG: Kernel NULL pointer dereference at 0x00000000
| Faulting instruction address: 0xc03ed4b8
| Oops: Kernel access of bad area, sig: 11 [#1]
| BE PAGE_SIZE=4K PowerPC 44x Platform
| CPU: 0 PID: 362 Comm: scsi_eh_1 Not tainted 5.4.163 #0
| NIP: c03ed4b8 LR: c03d27e8 CTR: c03ed36c
| REGS: cfa59950 TRAP: 0300 Not tainted (5.4.163)
| MSR: 00021000 <CE,ME> CR: 42000222 XER: 00000000
| DEAR: 00000000 ESR: 00000000
| GPR00: c03d27e8 cfa59a08 cfa55fe0 00000000 0fa46bc0 [...]
| [..]
| NIP [c03ed4b8] sata_dwc_qc_issue+0x14c/0x254
| LR [c03d27e8] ata_qc_issue+0x1c8/0x2dc
| Call Trace:
| [cfa59a08] [c003f4e0] __cancel_work_timer+0x124/0x194 (unreliable)
| [cfa59a78] [c03d27e8] ata_qc_issue+0x1c8/0x2dc
| [cfa59a98] [c03d2b3c] ata_exec_internal_sg+0x240/0x524
| [cfa59b08] [c03d2e98] ata_exec_internal+0x78/0xe0
| [cfa59b58] [c03d30fc] ata_read_log_page.part.38+0x1dc/0x204
| [cfa59bc8] [c03d324c] ata_identify_page_supported+0x68/0x130
| [...]
This is because sata_dwc_dma_xfer_complete() NULLs the
dma_pending's next neighbour "chan" (a *dma_chan struct) in
this '32' case right here (line ~735):
> hsdevp->dma_pending[tag] = SATA_DWC_DMA_PENDING_NONE;
Then the next time, a dma gets issued; dma_dwc_xfer_setup() passes
the NULL'd hsdevp->chan to the dmaengine_slave_config() which then
causes the crash.
With this patch, SATA_DWC_QCMD_MAX is now set to ATA_MAX_QUEUE + 1.
This avoids the OOB. But please note, there was a worthwhile discussion
on what ATA_TAG_INTERNAL and ATA_MAX_QUEUE is. And why there should not
be a "fake" 33 command-long queue size.
Ideally, the dw driver should account for the ATA_TAG_INTERNAL.
In Damien Le Moal's words: "... having looked at the driver, it
is a bigger change than just faking a 33rd "tag" that is in fact
not a command tag at all."
BugLink: https://github.com/openwrt/openwrt/issues/9505 | [] |
GHSA-8pgh-m49h-qpxh | The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.