Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
12.4k
cpes
sequencelengths
0
5.42k
CVE-2003-1306
Microsoft URLScan 2.5, with the RemoveServerHeader option enabled, allows remote attackers to obtain sensitive information (server name and version) via an HTTP request that generates certain errors such as 400 "Bad Request," which leak the Server header in the response.
[ "cpe:2.3:a:microsoft:urlscan:2.5:*:*:*:*:*:*:*" ]
CVE-2016-1000123
Unauthenticated SQL Injection in Huge-IT Video Gallery v1.0.9 for Joomla
[ "cpe:2.3:a:huge-it:video_gallery:1.0.9:*:*:*:*:joomla:*:*" ]
GHSA-jhx6-4qw4-hqm9
Multiple cross-site scripting (XSS) vulnerabilities in Redoable 1.2 allow remote attackers to inject arbitrary web script or HTML via the s parameter to (1) wp-content/themes/redoable/searchloop.php or (2) wp-content/themes/redoable/header.php.
[]
CVE-2023-46374
ZenTao Enterprise Edition version 4.1.3 and before is vulnerable to Cross Site Scripting (XSS).
[ "cpe:2.3:a:zentao:biz:*:*:*:*:enterprise:*:*:*" ]
CVE-2008-3817
Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator."
[ "cpe:2.3:h:cisco:adaptive_security_appliance_5500_series:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:pix_security_appliance:8.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:pix_security_appliance:8.1:*:*:*:*:*:*:*" ]
CVE-2023-27978
A CWE-502: Deserialization of Untrusted Data vulnerability exists in the Dashboard module that could cause an interpretation of malicious payload data, potentially leading to remote code execution when an attacker gets the user to open a malicious file. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).
[ "cpe:2.3:a:schneider-electric:custom_reports:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:igss_dashboard:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:igss_data_server:*:*:*:*:*:*:*:*" ]
CVE-2014-6160
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.
[ "cpe:2.3:a:ibm:websphere_service_registry_and_repository:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:webseal:-:*:*:*:*:*:*:*" ]
GHSA-pxqp-55mx-3p36
Cross-site scripting (XSS) vulnerability in report.php in Mr. CGI Guy Hot Links SQL-PHP 3.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter.
[]
CVE-2003-0403
Vignette StoryServer 5 and Vignette V/5 allows remote attackers to read and modify license information, and cause a denial of service (service halt) by directly accessing the /vgn/license template.
[ "cpe:2.3:a:vignette:content_suite:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:content_suite:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:content_suite:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:storyserver:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:storyserver:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:storyserver:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vignette:vignette:5.0:*:*:*:*:*:*:*" ]
CVE-2005-4065
SQL injection vulnerability in the search module in Edgewall Trac before 0.9.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
[ "cpe:2.3:a:edgewall_software:trac:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:edgewall_software:trac:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:edgewall_software:trac:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:edgewall_software:trac:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:edgewall_software:trac:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:edgewall_software:trac:0.9.1:*:*:*:*:*:*:*" ]
GHSA-g39r-hh73-78xj
An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3. This vulnerability was reported via the GitHub Bug Bounty program.
[]
GHSA-47gf-m7m2-wr32
Multiple SQL injection vulnerabilities in the WEC Discussion Forum (wec_discussion) extension 1.7.0 and earlier for TYPO3 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
GHSA-jxg7-33rp-3r4v
In PVRSRVBridgeChangeSparseMem of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270400061
[]
GHSA-wmcv-pj3g-38rp
An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .This issue does not affect Cloud NGFW or Prisma Access software.
[]
CVE-2024-23867
Cross-Site Scripting (XSS) vulnerability in Cups Easy
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/statecreate.php, in the stateid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[ "cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*" ]
CVE-2021-45231
A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[ "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:-:*:*:*", "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:saas:*:*:*", "cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:worry-free_business_security_services:-:*:*:*:saas:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-r496-7hgp-53wf
Vulnerability in dump function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
[]
GHSA-v636-gxjq-pvhh
htdocs/setup/index.php in Eventum before 2.3.5 allows remote attackers to inject and execute arbitrary PHP code via the hostname parameter.
[]
GHSA-q5wp-qj6q-q9jm
A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-4v68-66g8-2grg
An improper certificate validation vulnerability [CWE-295] in FortiOS 6.0.0 through 6.0.14, 6.2.0 through 6.2.10, 6.4.0 through 6.4.8, 7.0.0 may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the FortiGate and some peers such as private SDNs and external cloud platforms.
[]
CVE-2024-48824
An issue in Automatic Systems Maintenance SlimLane 29565_d74ecce0c1081d50546db573a499941b10799fb7 allows a remote attacker to obtain sensitive information via the Racine & FileName parameters in the download-file.php component.
[ "cpe:2.3:a:automatic_systems:maintenance_slimlane:*:*:*:*:*:*:*:*" ]
CVE-2013-3208
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*" ]
CVE-2017-14362
MFSBGN03793 rev.1 - Project and Portfolio Management Center, Multiple vulnerabilities
Cross-Site Request Forgery vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Cross-Site Forgery attack.
[ "cpe:2.3:a:microfocus:project_and_portfolio_management:9.32:*:*:*:*:*:*:*" ]
GHSA-m9mj-99qp-gvpw
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
GHSA-8jfh-qgm5-rg54
In onCreate of BluetoothPairingDialog.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege and untrusted devices accessing contact lists with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155648639
[]
GHSA-g2vx-prh9-62c4
Secure Boot Security Feature Bypass Vulnerability
[]
GHSA-8hwf-7cch-jr9v
In Zoo Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of the "gallery" file of the "Gallery" module in the background management system.
[]
GHSA-m4q5-8qvh-3qcq
SEMCMS v1.5 was discovered to contain a SQL injection vulnerability via the id parameter at /Ant_Suxin.php.
[]
CVE-2024-31022
An issue was discovered in CandyCMS version 1.0.0, allows remote attackers to execute arbitrary code via the install.php component.
[ "cpe:2.3:a:candycms:candycms:1.0.0:*:*:*:*:*:*:*" ]
CVE-2022-29534
An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an "Accept: application/json" header.
[ "cpe:2.3:a:misp:misp:*:*:*:*:*:*:*:*" ]
GHSA-chh6-j7qm-5f43
Web-Based Student Clearance System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in changepassword.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtnew_password parameter.
[]
GHSA-529g-gxp3-7xg6
A Cross-Site Request Forgery (CSRF) vulnerability in the Multi User plugin 1.8.2 for GetSimple CMS allows remote attackers to add admin (or other) users after an authenticated admin visits a third-party site or clicks on a URL.
[]
CVE-2021-26343
Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.
[ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*" ]
GHSA-j6p6-3278-jm6m
In the Linux kernel, the following vulnerability has been resolved:drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intfof_graph_get_remote_node() returns remote device node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.Patchwork: https://patchwork.freedesktop.org/patch/488473/
[]
CVE-2004-2570
Opera before 7.54 allows remote attackers to modify properties and methods of the location object and execute Javascript to read arbitrary files from the client's local filesystem or display a false URL to the user.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*" ]
CVE-2002-1070
Cross-site scripting vulnerability in PHPWiki Postnuke wiki module allows remote attackers to execute script as other PHPWiki users via the pagename parameter.
[ "cpe:2.3:a:php-wiki:php-wiki:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php-wiki:php-wiki:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-wiki:php-wiki:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php-wiki:php-wiki:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php-wiki:php-wiki:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php-wiki:php-wiki:1.3.3:*:*:*:*:*:*:*" ]
GHSA-745w-p4gm-x2vw
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_0_0_fallback_16 in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
[]
CVE-2022-43555
Ivanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*" ]
GHSA-jpmg-v3vc-73pm
The thumb_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the thumb_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
[]
GHSA-cf2x-g3fw-q673
The Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Tooltip module in all versions up to, and including, 2.0.6.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-6x24-3qv3-pqhx
Heap-based buffer overflow in QuickTime in Apple Mac OS X 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JP2 image.
[]
GHSA-w67r-pc7p-x294
The Linux kernel before 4.5 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by leveraging incorrect tracking of descriptor ownership and sending each descriptor over a UNIX socket before closing it. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-4312.
[]
GHSA-4rv9-5vc4-88cg
Command injection in node-ps
This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.
[]
CVE-2020-6872
The server management software module of ZTE has a storage XSS vulnerability. The attacker inserts some attack codes through the foreground login page, which will cause the user to execute the predefined malicious script in the browser. This affects <R5300G4V03.08.0100/V03.07.0300/V03.07.0200/V03.07.0108/V03.07.0100/V03.05.0047/V03.05.0046/V03.05.0045/V03.05.0044/V03.05.0043/V03.05.0040/V03.04.0020;R8500G4V03.07.0103/V03.07.0101/V03.06.0100/V03.05.0400/V03.05.0020;R5500G4V03.08.0100/V03.07.0200/V03.07.0100/V03.06.0100>.
[ "cpe:2.3:o:zte:r8500g4_firmware:03.05.0020:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r8500g4_firmware:03.05.0400:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r8500g4_firmware:03.06.0100:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r8500g4_firmware:03.07.0101:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r8500g4_firmware:03.07.0103:*:*:*:*:*:*:*", "cpe:2.3:h:zte:r8500g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5500g4_firmware:03.06.0100:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5500g4_firmware:03.07.0100:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5500g4_firmware:03.07.0200:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5500g4_firmware:03.08.0100:*:*:*:*:*:*:*", "cpe:2.3:h:zte:r5500g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.04.0020:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.05.0040:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.05.0043:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.05.0044:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.05.0045:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.05.0046:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.05.0047:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.07.0100:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.07.0108:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.07.0200:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.07.0300:*:*:*:*:*:*:*", "cpe:2.3:o:zte:r5300g4_firmware:03.08.0100:*:*:*:*:*:*:*", "cpe:2.3:h:zte:r5300g4:-:*:*:*:*:*:*:*" ]
GHSA-fwj9-7qq8-jc93
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dsi_writeinit function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17646.
[]
GHSA-2r2f-g8mw-9gvr
Segfault and OOB write due to incomplete validation in `EditDistance` in TensorFlow
ImpactThe implementation of [`tf.raw_ops.EditDistance`]() has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service:In multiple places throughout the code, we are computing an index for a write operation:However, the existing validation only checks against the upper bound of the array. Hence, it is possible to write before the array by massaging the input to generate negative values for `loc`.PatchesWe have patched the issue in GitHub commit [30721cf564cb029d34535446d6a5a6357bebc8e7](https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7).The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
[]
GHSA-7p6j-jj6q-633r
Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34731, CVE-2022-34733, CVE-2022-35834, CVE-2022-35836, CVE-2022-35840.
[]
GHSA-7r7m-5qmf-2775
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1850.
[]
CVE-2024-39759
Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_hour_value` POST parameter.
[]
GHSA-qhf3-77w4-c8w8
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the libc.a library to expose sensitive information. IBM X-Force ID: 206084.
[]
CVE-2007-1537
\Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via the NdisTapiDispatch function.
[ "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*" ]
GHSA-gvf3-496w-8fm9
The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
[]
CVE-2025-21830
landlock: Handle weird files
In the Linux kernel, the following vulnerability has been resolved: landlock: Handle weird files A corrupted filesystem (e.g. bcachefs) might return weird files. Instead of throwing a warning and allowing access to such file, treat them as regular files.
[]
GHSA-vhpv-9vr4-2gvr
LibreHealthIO lh-ehr version <REL-2.0.0 contains an Authenticated Local File Disclosure vulnerability in Importing of templates allows local file disclosure that can result in Disclosure of sensitive files on the server. This attack appear to be exploitable via User controlled variable in import templates function.
[]
GHSA-3m7g-q8jw-q449
Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
[]
GHSA-j389-3jxj-44c7
IBM WebSphere Application Server 4.0.1 through 4.0.3 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a large header.
[]
CVE-2024-32083
WordPress Easy Logo plugin <= 1.9.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Varun Kumar Easy Logo allows Stored XSS.This issue affects Easy Logo: from n/a through 1.9.3.
[]
CVE-2023-1203
Improper removal of sensitive data in the entry edit feature of Hub Business submodule in Devolutions Remote Desktop Manager PowerShell Module 2022.3.1.5 and earlier allows an authenticated user to access sensitive data on entries that were edited using the affected submodule.
[ "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:*:*:*" ]
GHSA-q8gg-8cmf-8w9m
Certain NETGEAR devices are affected by command injection. This affects R6100 before 1.0.1.14, R7500 before 1.0.0.110, R7500v2 before 1.0.3.16, R7800 before 1.0.2.32, EX6200v2 before 1.0.1.50, and D7800 before 1.0.1.22.
[]
CVE-2021-43971
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
[ "cpe:2.3:a:sysaid:sysaid:20.4.74:b10:*:*:*:*:*:*" ]
CVE-2009-1366
Cross-site scripting (XSS) vulnerability in Website\admin\Sales\paypalipn.aspx in DotNetNuke (DNN) before 4.9.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "name/value pairs" and "paypal IPN functionality."
[ "cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.10d:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.10e:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.9:*:*:*:*:*:*:*", "cpe:2.3:a:dotnetnuke:dotnetnuke:4.9.1:*:*:*:*:*:*:*" ]
CVE-2005-0362
awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters.
[ "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*" ]
GHSA-94v9-pm2x-hvrg
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via OracleNet to compromise Core RDBMS. While the vulnerability is in Core RDBMS, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Core RDBMS accessible data. CVSS 3.0 Base Score 5.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
[]
GHSA-v3q9-2p3m-7g43
Token reuse in Ory fosite
ImpactWhen using client authentication method "private_key_jwt" [[1]](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication), OpenId specification says the following about assertion `jti`:A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the partiesHydra does not seem to check the uniqueness of this `jti` value. Here is me sending the same token request twice, hence with the same `jti` assertion, and getting two access tokens:PatchesThis issue is patched in 0.31.0.WorkaroundsDo not allow clients to use `private_key_jwt`.Referenceshttps://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication
[]
GHSA-8fmw-29w8-grr7
Unspecified vulnerability in the Oracle iProcurement component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect integrity via unknown vectors related to Redirection.
[]
GHSA-9475-r4q8-rfwm
A logic issue was addressed with improved state management. This issue is fixed in iOS 17.4 and iPadOS 17.4. A user's locked tabs may be briefly visible while switching tab groups when Locked Private Browsing is enabled.
[]
CVE-2011-1471
Integer signedness error in zip_stream.c in the Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive file that triggers errors in zip_fread function calls.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ]
CVE-2024-10519
Wishlist for WooCommerce: Multi Wishlists Per Customer PRO 3.0.8 - 3.1.2 - Reflected Cross-Site Scripting via wtab Parameter
The Wishlist for WooCommerce: Multi Wishlists Per Customer PRO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wtab' parameter in versions 3.0.8 to 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Note: Only WordPress installations with versions of PHP <=7.4 are affected by this vulnerability.
[]
CVE-2023-39952
Advanced permissions not respected when copying entire group folders
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1, a user can access files inside a subfolder of a groupfolder accessible to them, even if advanced permissions would block access to the subfolder. Nextcloud Server versions 25.0.8, 26.0.3, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1 contain a patch for this issue. No known workarounds are available.
[ "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:enterprise:*:*:*" ]
GHSA-p5h8-cwcq-q5g2
An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR < 91.11, Thunderbird < 102, Thunderbird < 91.11, and Firefox < 101.
[]
GHSA-hrpx-f747-w52q
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability.
[]
GHSA-j267-253q-mfm4
Auth. (subscriber+) Messaging Block Bypass vulnerability in Better Messages plugin <= 1.9.10.69 on WordPress.
[]
CVE-2024-5123
SourceCodester Event Registration System cross site scripting
A vulnerability classified as problematic has been found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file /registrar/. The manipulation of the argument searchbar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265203.
[ "cpe:2.3:a:event_registration_system_project:event_registration_system:1.0:*:*:*:*:*:*:*" ]
GHSA-3rfh-9f52-4ppx
Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.2.2.
[]
CVE-1999-0391
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user.
[ "cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:3.5.1:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:3.5.1:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:3.5.1:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:3.5.1:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:3.5.1:sp5:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*" ]
GHSA-wf5x-pg8m-g5v4
IBM Aspera Faspex 5.0.4 could allow an authenticated user to change other user's credentials due to improper access controls. IBM X-Force ID: 249847.
[]
GHSA-vf5p-pgqg-rxgw
A SQL injection vulnerability in /model/update_classroom.php in Campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the name parameter.
[]
GHSA-4hfv-g3hm-82x2
Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root.
[]
GHSA-pw2g-xg7w-mccx
process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.
[]
GHSA-rpwq-xw4m-459x
A vulnerability exists in the FTP server of the Zyxel AX7501-B0 firmware prior to V5.17(ABPC.3)C0, which processes symbolic links on external storage media. A local authenticated attacker with administrator privileges could abuse this vulnerability to access the root file system by creating a symbolic link on external storage media, such as a USB flash drive, and then logging into the FTP server on a vulnerable device.
[]
GHSA-7qw8-c2p4-4gxq
An issue was discovered in HestiaCP before v1.3.5. Attackers are able to arbitrarily install packages due to values taken from the pgk [] parameter in the update request being transmitted to the operating system's package manager.
[]
GHSA-9wvr-rr6g-49mj
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
GHSA-8cmc-mx2x-f7v4
Windows AppContainer Elevation Of Privilege Vulnerability
[]
CVE-2012-1837
The (1) webreports, (2) post/create-role, and (3) post/update-role programs in IBM Tivoli Endpoint Manager (TEM) before 8.2 do not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
[ "cpe:2.3:a:ibm:tivoli_endpoint_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_endpoint_manager:8.0:*:*:*:*:*:*:*" ]
GHSA-qjm6-qmv8-v7pg
Buffer overflow in msvcrt.dll in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted media file, aka "Msvcrt.dll Buffer Overflow Vulnerability."
[]
CVE-2021-3125
In TP-Link TL-XDR3230 < 1.0.12, TL-XDR1850 < 1.0.9, TL-XDR1860 < 1.0.14, TL-XDR3250 < 1.0.2, TL-XDR6060 Turbo < 1.1.8, TL-XDR5430 < 1.0.11, and possibly others, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
[ "cpe:2.3:o:tp-link:tl-xdr3230_firmware:*:*:*:*:*:easy_exhibition_turbo:*:*", "cpe:2.3:h:tp-link:tl-xdr3230:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-xdr5430_firmware:*:*:*:*:*:easy_exhibition:*:*", "cpe:2.3:h:tp-link:tl-xdr5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-xdr3250_firmware:*:*:*:*:*:easy_exhibition:*:*", "cpe:2.3:h:tp-link:tl-xdr3250:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-xdr1860_firmware:*:*:*:*:*:easy_exhibition:*:*", "cpe:2.3:h:tp-link:tl-xdr1860:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-xdr1850_firmware:*:*:*:*:*:easy_exhibition:*:*", "cpe:2.3:h:tp-link:tl-xdr1850:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:tl-xdr6060_firmware:*:*:*:*:*:easy_exhibition:*:*", "cpe:2.3:h:tp-link:tl-xdr6060:-:*:*:*:*:*:*:*" ]
GHSA-3wgh-5r9h-pf5v
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.36 and Prior to 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H).
[]
CVE-2023-30123
wuzhicms v4.1.0 is vulnerable to Cross Site Scripting (XSS) in the Member Center, Account Settings.
[ "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*" ]
CVE-2020-36634
Indeed Engineering util ViewExportedVariablesServlet.java appendTo cross site scripting
A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:indeed:util:*:*:*:*:*:*:*:*" ]
CVE-2024-0426
ForU CMS cms_template.php sql injection
A vulnerability, which was classified as critical, has been found in ForU CMS up to 2020-06-23. This issue affects some unknown processing of the file admin/cms_template.php. The manipulation of the argument t_name/t_path leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250445 was assigned to this vulnerability.
[ "cpe:2.3:a:foru_cms_project:foru_cms:*:*:*:*:*:*:*:*" ]
CVE-2006-4542
Webmin before 1.296 and Usermin before 1.226 do not properly handle a URL with a null ("%00") character, which allows remote attackers to conduct cross-site scripting (XSS), read CGI program source code, list directories, and possibly execute programs.
[ "cpe:2.3:a:usermin:usermin:*:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.150:*:*:*:*:*:*:*", "cpe:2.3:a:usermin:usermin:1.210:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.76:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.77:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.78:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.79:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.84:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.85:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.88:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.92.1:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.00:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.1.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.60:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.70:*:*:*:*:*:*:*", "cpe:2.3:a:webmin:webmin:1.2.80:*:*:*:*:*:*:*" ]
GHSA-55ff-crw4-233h
Authentication Bypass by Spoofing vulnerability in Wpmet Wp Ultimate Review allows Functionality Bypass.This issue affects Wp Ultimate Review: from n/a through 2.3.2.
[]
GHSA-9w7j-q3xw-p9vh
Hyperledger Fabric subject to Denial of Service via non-validated request
A vulnerability exists in Hyperledger Fabric < 2.4 could allow an attacker to construct a non-validated request that could cause a denial of service attack. The peer gateway service tries to extract channel and chaincode information from the signed proposal, but it doesn't check the proposal fields for validity. Therefore a malformed proposal might end up crashing the peer service. This issue has been patched in 2.4.6. There are no known workarounds.
[]
CVE-2022-32250
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*" ]
CVE-2001-0071
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
[ "cpe:2.3:a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:privacy_guard:1.0.3b:*:*:*:*:*:*:*" ]
CVE-2007-0653
Integer overflow in X MultiMedia System (xmms) 1.2.10, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which triggers memory corruption.
[ "cpe:2.3:o:linux:linux_kernel:*:*:ia32_64-bit:*:*:*:*:*", "cpe:2.3:a:x_multimedia_system:x_multimedia_system:1.2.10:*:*:*:*:*:*:*" ]
GHSA-h9vm-fh7r-7pp6
The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.
[]
GHSA-49hv-2hp8-w863
HDF5 Library through 1.14.3 contains a heap-based buffer over-read in H5F_addr_decode_len in H5Fint.c, resulting in the corruption of the instruction pointer.
[]
CVE-2006-1081
SQL injection vulnerability in forgotten_password.php in Jonathan Beckett PluggedOut Nexus 0.1 allows remote attackers to execute arbitrary SQL commands via the email parameter.
[ "cpe:2.3:a:jonathan_beckett:pluggedout_nexus:0.1:*:*:*:*:*:*:*" ]
GHSA-h9g9-92v6-jw8x
MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way that attackers within range could connect to the device's web services and compromise the device.
[]