id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2025-2779 | Insert Headers and Footers Code – HT Script <= 1.1.2 - Missing Authorization to Authenticated (Subscriber+) Limited Options Update | The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 1/true on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny access to legitimate users or be used to set some values to true, such as registration. | [] |
GHSA-67hw-j62w-x85g | An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily. | [] |
|
CVE-2019-10562 | u'Improper authentication and signature verification of debug polices in secure boot loader will allow unverified debug policies to be loaded into secure memory and leads to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MSM8998, Nicobar, QCS404, QCS605, QCS610, Rennell, SA415M, SA6155P, SC7180, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] |
|
GHSA-v536-r24f-xv5h | Adobe Acrobat Reader versions 22.002.20212 (and earlier) and 20.005.30381 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2022-34613 | Mealie 1.0.0beta3 contains an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file. | [
"cpe:2.3:a:mealie_project:mealie:1.0.0:beta3:*:*:*:*:*:*"
] |
|
CVE-2025-22526 | WordPress PHP/MySQL CPU performance statistics Plugin <= 1.2.1 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in NotFound PHP/MySQL CPU performance statistics allows Object Injection. This issue affects PHP/MySQL CPU performance statistics: from n/a through 1.2.1. | [] |
GHSA-45cf-cf6g-j6mm | A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets. | [] |
|
CVE-2007-5549 | Unspecified vulnerability in Command EXEC in Cisco IOS allows local users to bypass command restrictions and obtain sensitive information via an unspecified "variation of an IOS command" involving "two different methods", aka CSCsk16129. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | [
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-9069 | BIOS Write Protection Race Condition | In some Lenovo IdeaPad consumer notebook models, a race condition in the BIOS flash device locking mechanism is not adequately protected against, potentially allowing an attacker with administrator access to alter the contents of BIOS. | [
"cpe:2.3:o:hp:310s-14isk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:310s-14isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:320-15ikbra_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320-15ikbra:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:320-15ikbrn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320-15ikbrn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:320-15ikbrn_touch_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320-15ikbrn_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320-17ikbrn:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320-17ikbrn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320s-14ikb:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320s-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:320s-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320s-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:320s-15isk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:320s-15isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:510s-14isk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:510s-14isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:520-15ikbrn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:520-15ikbrn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:520s-14ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:520s-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:710s_plus-13ikb_16g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:710s_plus-13ikb_16g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:710s_plus-3ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:710s_plus-3ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:xiaoxinair13ikbpro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:xiaoxinair13ikbpro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:710s_plus_touch-13ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:710s_plus_touch-13ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:720s-13ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:720s-13ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:b320-14ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b320-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e42-80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e42-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e52-80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e52-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:flex_4-1470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:flex_4-1470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:flex_5-1470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:flex_5-1470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:flex_5-1570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:flex_5-1570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:ideapad_2in1_14_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ideapad_2in1_14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_320-14ikb\\(i\\+a\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_320-14ikb\\(i\\+a\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_320-14ikb\\(i\\+n\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_320-14ikb\\(i\\+n\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_320-15abr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_320-15abr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_320-15ikb\\(i\\+n\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_320-15ikb\\(i\\+n\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_320s-14ikbr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_320s-14ikbr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_320s-15ikbr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_320s-15ikbr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_520s-14ikbr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_520s-14ikbr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_720s-14ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_720s-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_flex_5-1470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_flex_5-1470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_flex_5-1570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_flex_5-1570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_ideapad_y520-15ikbn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_ideapad_y520-15ikbn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_tianyi_310-14ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_tianyi_310-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_tianyi_310-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_tianyi_310-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_y520-15ikba_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_y520-15ikba:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_y520-15ikbm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_y520-15ikbm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_yoga_520-14ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_yoga_520-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_yoga_520-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_yoga_520-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:miix_720-12ikb:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:miix_720-12ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:nano110-14ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:nano110-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:nano110-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:nano110-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:rescuer_r720-15ikbm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:rescuer_r720-15ikbm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:rescuer_y520-15ikbm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:rescuer_y520-15ikbm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v310-14ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v310-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v310-14isk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v310-14isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v310-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v310-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v310-15isk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v310-15isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:v330-14ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v330-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:v330-14isk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v330-14isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v510-14ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v510-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v510-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:v510-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:yoga_310-11iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:yoga_310-11iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:yoga_510-14isk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:yoga_510-14isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:yoga_720-13ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:yoga_720-13ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:yoga_720-13ikbr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:yoga_720-13ikbr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:yoga_720-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:yoga_720-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_v720-14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_v720-14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:7000_u42_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:7000_u42:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:7000-15_u42_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:7000-15_u42:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:r720-15ikba_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:r720-15ikba:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y520-15ikba_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y520-15ikba:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:r720-15ikbn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:r720-15ikbn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y520-15ikbn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y520-15ikbn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:y720-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:y720-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:lenovo_y720-15ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:lenovo_y720-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:e43-80_kbl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:e43-80_kbl:-:*:*:*:*:*:*:*"
] |
GHSA-7hjq-6rpg-gmgh | Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access. | [] |
|
GHSA-w4g8-m7x6-rg5v | Stack-based buffer overflow in AppKit in Apple Mac OS X 10.4.11 allows user-assisted remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted PostScript Printer Description (PPD) file that is not properly handled when querying a network printer. | [] |
|
CVE-2000-1111 | Telnet Service for Windows 2000 Professional does not properly terminate incomplete connection attempts, which allows remote attackers to cause a denial of service by connecting to the server and not providing any input. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-2346 | In affected versions of Octopus Deploy it is possible for a low privileged guest user to interact with extension endpoints. | [
"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-7w5c-h3p4-5gm9 | Swift3 before 1.9 allows remote attackers to conduct replay attacks via an Authorization request that lacks a Date header. | [] |
|
GHSA-w854-jxf9-rc9g | Cross-site scripting (XSS) vulnerability in HP Insight Control Performance Management before 6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-rxj2-8fr9-hwcq | Missing Authorization vulnerability in FeedbackWP kk Star Ratings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects kk Star Ratings: from n/a through 5.4.5. | [] |
|
GHSA-7p4g-p325-hv5m | The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator. | [] |
|
GHSA-gxvf-mxfh-phm4 | The msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.2 allows remote servers to cause a denial of service (application crash) via an OIM message that lacks UTF-8 encoding. | [] |
|
CVE-2021-37918 | Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution. | [
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7110:*:*:*:*:*:*"
] |
|
GHSA-6q8c-xccr-rq92 | A vulnerability, which was classified as critical, has been found in ???????????? Lingdang CRM up to 8.6.4.3. Affected by this issue is some unknown functionality of the file /crm/wechatSession/index.php?msgid=1&operation=upload. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-r3r5-jhw6-4634 | Insecure temporary file usage in SWHKD | SWHKD 1.1.5 unsafely uses the /tmp/swhkd.sock pathname. There can be an information leak or denial of service. | [] |
GHSA-h5c3-v724-8qcf | The mintToken function of a smart contract implementation for MultiGames (MLT), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
GHSA-xmv7-rrcx-3gfq | mICQ 0.4.9 and earlier allows remote attackers to cause a denial of service (crash) via malformed ICQ message types without a 0xFE separator character. | [] |
|
GHSA-g8q7-xv52-hf9f | Feedgen Vulnerable to XML Denial of Service Attacks | ImpactThe *feedgen* library allows supplying XML as content for some of the available fields. This XML will be parsed and integrated into the existing XML tree. During this process, feedgen is vulnerable to [XML Denial of Service Attacks](https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses) (e.g. XML Bomb).This becomes a concern in particular if feedgen is used to include content from untrused sources and if XML (including XHTML) is directly included instead of providing plain tex content only.PatchesThis problem has been fixed in feedgen 0.9.0 which disallows XML entity expansion and external resources.WorkaroundsUpdating is strongly recommended and should not be problematic. Nevertheless, as a workaround, avoid providing XML directly to feedgen or ensure that no entity expansion is part of the XML.References[Security Briefs - XML Denial of Service Attacks and Defenses](https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/november/xml-denial-of-service-attacks-and-defenses)[Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack#cite_note-2)For more informationIf you have any questions or comments about this advisory:Open an issue in [lkiesow/python-feedgen](https://github.com/lkiesow/python-feedgen/issues)Send an email to [email protected] | [] |
CVE-1999-1370 | The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs. | [
"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-20975 | In getAvailabilityStatus of EnableContentCapturePreferenceController.java, there is a possible way to bypass DISALLOW_CONTENT_CAPTURE due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-250573776 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
CVE-2006-2758 | Directory traversal vulnerability in jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary files via a %2e%2e%5c (encoded ../) in the URL. NOTE: this might be the same issue as CVE-2005-3747. | [
"cpe:2.3:a:jetty:jetty:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-12881 | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-q9g3-fwp8-6jx4 | To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] |
|
GHSA-5w28-vv2q-8hr9 | Multiple cross-site scripting (XSS) vulnerabilities in view.php in JCE-Tech PHP Video Script (aka Video Niche Script) 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) video or (2) title parameter. | [] |
|
GHSA-fvv8-w6rh-m9pr | Multiple PHP remote file inclusion vulnerabilities in WebCalendar 0.9.45 allow remote attackers to execute arbitrary PHP code via a URL in the includedir parameter to (1) login.php, (2) get_reminders.php, or (3) get_events.php. | [] |
|
GHSA-697g-g69g-85cq | In the Linux kernel, the following vulnerability has been resolved:usb: gadget: Fix use-after-free bug by not setting udc->dev.driverThe syzbot fuzzer found a use-after-free bug:BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320
Read of size 8 at addr ffff88802b934098 by task udevd/3689CPU: 2 PID: 3689 Comm: udevd Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255
__kasan_report mm/kasan/report.c:442 [inline]
kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
dev_uevent+0x712/0x780 drivers/base/core.c:2320
uevent_show+0x1b8/0x380 drivers/base/core.c:2391
dev_attr_show+0x4b/0x90 drivers/base/core.c:2094Although the bug manifested in the driver core, the real cause was a
race with the gadget core. dev_uevent() does:and between the test and the dereference of dev->driver, the gadget
core sets dev->driver to NULL.The race wouldn't occur if the gadget core registered its devices on
a real bus, using the standard synchronization techniques of the
driver core. However, it's not necessary to make such a large change
in order to fix this bug; all we need to do is make sure that
udc->dev.driver is always NULL.In fact, there is no reason for udc->dev.driver ever to be set to
anything, let alone to the value it currently gets: the address of the
gadget's driver. After all, a gadget driver only knows how to manage
a gadget, not how to manage a UDC.This patch simply removes the statements in the gadget core that touch
udc->dev.driver. | [] |
|
GHSA-x75m-rrhq-6j68 | The web part of Zenitel AlphaCom XE Audio Server through 11.2.3.10, called AlphaWeb XE, does not restrict file upload in the Custom Scripts section at php/index.php. Neither the content nor extension of the uploaded files is checked, allowing execution of PHP code under the /cmd directory. | [] |
|
GHSA-5cc7-3r85-874q | OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. | [] |
|
GHSA-6mpj-9376-4g2w | Symantec Norton Security prior to 22.16.3, SEP (Windows client) prior to and including 12.1 RU6 MP9, and prior to 14.2 RU1, SEP SBE prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22, SEP-12.1.7484.7002 and SEP Cloud prior to 22.16.3 may be susceptible to a kernel memory disclosure, which is a type of issue where a specially crafted IRP request can cause the driver to return uninitialized memory. | [] |
|
GHSA-mjmp-9722-7h88 | SQL injection vulnerability in the bblogin function in functions.php in PHP-Nuke 6.x through 7.2 allows remote attackers to bypass authentication and gain access by injecting base64-encoded SQL code into the user parameter. | [] |
|
GHSA-g96v-26x6-4jrf | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying Linux operating system with the privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. | [] |
|
CVE-2012-4400 | repository/repository_ajax.php in Moodle 2.2.x before 2.2.5 and 2.3.x before 2.3.2 allows remote authenticated users to bypass intended upload-size restrictions via a -1 value in the maxbytes field. | [
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-vgx9-m8h2-6vmq | Tadiran Telecom Aeonix - CWE-204: Observable Response Discrepancy | [] |
|
GHSA-3h4g-q9gm-hwvc | The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to access all candidates' files in the photo folder on the website by specifying a "user id" parameter and file name, such as in a recruitment_online/upload/user/[user_id]/photo/[file_name] URI. | [] |
|
GHSA-6qqp-4vm3-359v | OpenStack Barbican credential leak flaw | A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials. | [] |
CVE-2007-5279 | Heap-based buffer overflow in ConeXware PowerArchiver before 10.20.21 might allow remote attackers to execute arbitrary code via a long filename in a BlackHole archive. | [
"cpe:2.3:a:conexware:powerarchiver:8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:conexware:powerarchiver:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:conexware:powerarchiver:9.5_beta_4:*:*:*:*:*:*:*",
"cpe:2.3:a:conexware:powerarchiver:9.5_beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:conexware:powerarchiver:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:conexware:powerarchiver:9.62.03:*:*:*:*:*:*:*"
] |
|
CVE-2005-3159 | SQL injection vulnerability in messages.php in PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the msg_view parameter, a different vulnerability than CVE-2005-3157 and CVE-2005-3158. | [
"cpe:2.3:a:php_fusion:php_fusion:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:php_fusion:php_fusion:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:php_fusion:php_fusion:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php_fusion:php_fusion:5.01_service_pack:*:*:*:*:*:*:*",
"cpe:2.3:a:php_fusion:php_fusion:6.0.105:*:*:*:*:*:*:*",
"cpe:2.3:a:php_fusion:php_fusion:6.0.106:*:*:*:*:*:*:*"
] |
|
CVE-2025-4354 | Tenda DAP-1520 storage check_dws_cookie stack-based overflow | A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02 and classified as critical. Affected by this issue is the function check_dws_cookie of the file /storage. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2021-34492 | Windows Certificate Spoofing Vulnerability | Windows Certificate Spoofing Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19003:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19003:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4530:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4530:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25661:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25661:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20069:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20069:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20069:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25661:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20069:*:*:*:*:*:x64:*"
] |
GHSA-83mm-jfvg-jxxh | Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters. | [] |
|
CVE-2008-0948 | Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors. | [
"cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2015-6256 | Cisco ASR 5000 devices with software 19.0.M0.60828 allow remote attackers to cause a denial of service (OSPF process restart) via crafted length fields in headers of OSPF packets, aka Bug ID CSCuv62820. | [
"cpe:2.3:a:cisco:asr_5000_series_software:19.0.m0.60828:*:*:*:*:*:*:*"
] |
|
CVE-2024-4290 | Sailthru Triggermail <= 1.1 - Admin+ Stored XSS | The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:jontascher:sailthru_triggermail:*:*:*:*:*:*:*:*"
] |
GHSA-8j4q-gqp8-q3c6 | Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | [] |
|
GHSA-q58w-h83p-f9h2 | SQL injection vulnerability in the files mod in index.php in BXCP 0.3.0.4 allows remote attackers to execute arbitrary SQL commands via the where parameter in a view action. | [] |
|
CVE-2017-8184 | MTK platform in Huawei smart phones with software of earlier than Nice-AL00C00B160 versions, earlier than Nice-AL10C00B140 versions has a any memory access vulnerability. An attacker tricks a user into installing a malicious application on the smart phone, and send given parameter to cause to any memory access vulnerabilities, leading to sensitive information leakage. | [
"cpe:2.3:o:huawei:mtk_platform_smart_phone_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mtk_platform_smart_phone:-:*:*:*:*:*:*:*"
] |
|
GHSA-8g3h-4jcf-7hc9 | Multiple PHP remote file inclusion vulnerabilities in Easy Hosting Control Panel for Ubuntu (EHCP) 0.22.8 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the confdir parameter to (1) dbutil.bck.php and (2) dbutil.php in config/. | [] |
|
CVE-2021-21464 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] |
|
GHSA-mx65-frcm-qpfg | The IMAP server in Softalk Mail Server (formerly WorkgroupMail) 8.5.1.431 allows remote authenticated users to cause a denial of service (resource consumption and daemon crash) via a long IMAP APPEND command with certain repeated parameters. | [] |
|
CVE-2019-19148 | Tellabs Optical Line Terminal (OLT) 1150 devices allow Remote Command Execution via the -l option to TELNET or SSH. Tellabs has addressed this issue in the SR30.1 and SR31.1 release on February 18, 2020. | [
"cpe:2.3:o:tellabs:optical_line_terminal_1150_firmware:ont709.2.50.12:*:*:*:*:*:*:*",
"cpe:2.3:h:tellabs:optical_line_terminal_1150:fp29.2_015873:*:*:*:*:*:*:*"
] |
|
GHSA-457x-pfmm-7g5g | A Stored Cross-Site Scripting (XSS) vulnerability in DivvyDrive's "aciklama" parameter could allow anyone to gain users' session informations. | [] |
|
CVE-2021-20694 | Improper access control vulnerability in DAP-1880AC firmware version 1.21 and earlier allows a remote authenticated attacker to bypass access restriction and to start a telnet service via unspecified vectors. | [
"cpe:2.3:o:dlink:dap-1880ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dap-1880ac:-:*:*:*:*:*:*:*"
] |
|
GHSA-c69v-pxwp-r79x | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CartFlows Pro plugin <= 1.11.11 versions. | [] |
|
GHSA-j3vq-pmp5-r5xj | Missing ratelimit on passwrod resets in zenml | zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account. | [] |
CVE-2024-4786 | An improper validation vulnerability was reported in the Lenovo Tab K10 that could allow a specially crafted application to keep the device on. | [] |
|
GHSA-xmf6-p99q-898v | A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin. | [] |
|
CVE-2021-40374 | A stored cross-site scripting (XSS) vulnerability was identified in Apperta Foundation OpenEyes 3.5.1. Updating a patient's details allows remote attackers to inject arbitrary web script or HTML via the Address1 parameter. This JavaScript then executes when the patient profile is loaded, which could be used in a XSS attack. | [
"cpe:2.3:a:apperta:openeye:3.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-7qqj-72mh-gqcj | A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02; SIPROTEC 7SJ686 : All versions < V 4.87; SIPROTEC 7UT686 : All versions < V 4.02; SIPROTEC 7SD686 : All versions < V 4.05; SIPROTEC 7SJ66 : All versions < V 4.30. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations. A legitimate user must be logged into the web interface for the attack to be successful. | [] |
|
CVE-2018-6502 | MFSBGN03824 rev.1 - ArcSight Management Center, Insufficient Access Control, Reflected Cross Site Scripting, Access Control vulnerability, Cross-Site Request Forgery (CSRF), Unauthenticated File Download, Directory Traversal Vulnerability | A potential Reflected Cross-Site Scripting (XSS) Security vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for Reflected Cross-site Scripting (XSS). | [
"cpe:2.3:a:hp:arcsight_management_center:*:*:*:*:*:*:*:*"
] |
GHSA-wvw2-928h-x7m8 | A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "AES_UnWRAP" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake. | [] |
|
CVE-2009-3500 | Multiple SQL injection vulnerabilities in BPowerHouse BPGames 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) cat_id parameter to main.php and (2) game_id parameter to game.php. | [
"cpe:2.3:a:bpowerhouse:bpgames:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2005-3228 | Multiple interpretation error in unspecified versions of Ikarus AntiVirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. | [
"cpe:2.3:a:ikarus:ikarus_antivirus:*:*:*:*:*:*:*:*"
] |
|
GHSA-5phw-6g3r-55xx | Cross-site Scripting in OpenCRX | OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Saved Search Creation. | [] |
CVE-2012-3126 | Unspecified vulnerability in the Solaris Cluster component in Oracle Sun Products Suite 3.3 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Apache Tomcat Agent. | [
"cpe:2.3:a:oracle:sun_products_suite:3.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-33377 | Connected IO v2.1.0 and prior has an OS command injection vulnerability in the set firewall command in part of its communication protocol, enabling attackers to execute arbitrary OS commands on devices. | [
"cpe:2.3:a:connectedio:connected_io:*:*:*:*:*:*:*:*"
] |
|
GHSA-frv9-59cr-r66w | Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when using a Windows guest, allows local users to affect availability via unknown vectors related to Core. | [] |
|
GHSA-v5jp-9wvr-f556 | Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox. | [] |
|
CVE-2019-0329 | SAP Information Steward, version 4.2, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:information_steward:4.2:*:*:*:*:*:*:*"
] |
|
GHSA-3jmq-8xjh-2jpc | Unspecified vulnerability in the Oracle Access Manager component in Oracle Fusion Middleware 10.1.4.3.0, 11.1.1.5.0, and 11.1.2.0.0 allows remote attackers to affect integrity, related to OAM Webgate. | [] |
|
GHSA-4wv7-983f-6869 | Deserialization of Untrusted Data vulnerability in yolo 3 allows attackers to execute arbitrary code via crafted yaml file. | [] |
|
GHSA-pmh5-hfq5-56mq | CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands sent to them, resulting in remote command execution and a takeover of the cryptocurrency wallet if an attacker can trick an application such as a web browser into connecting and sending a command for example. This attack appears to be exploitable via a victim visiting a webpage hosting malicious content that trigger such behavior. | [] |
|
GHSA-8g7x-vrfh-74fj | FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input. | [] |
|
CVE-2006-4449 | Cross-site scripting (XSS) vulnerability in attachment.php in MyBulletinBoard (MyBB) 1.1.7 and possibly other versions allows remote attackers to inject arbitrary web script or HTML via a GIF image that contains URL-encoded Javascript, which is rendered by Internet Explorer. | [
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.7:*:*:*:*:*:*:*"
] |
|
CVE-2018-19943 | If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later | [
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:-:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200109:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200421:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200611:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.2.6:build_20200821:*:*:*:*:*:*"
] |
|
GHSA-mr95-wr78-6g74 | An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0. | [] |
|
GHSA-mq6h-8q58-f5gv | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | [] |
|
GHSA-7m5c-wx89-wrj6 | An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. | [] |
|
CVE-2020-10945 | Centreon before 19.10.7 exposes Session IDs in server responses. | [
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:centreon:widget-host-monitoring:*:*:*:*:*:*:*:*",
"cpe:2.3:a:centreon:widget-host-monitoring:19.10.0:*:*:*:*:*:*:*"
] |
|
GHSA-x8rg-8rqv-3645 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability. | [] |
|
GHSA-fcx2-wv6q-3q9q | SP8DE PreSale Token (DSPX) is a smart contract running on Ethereum. The mint function has an integer overflow that allows minted tokens to be arbitrarily retrieved by the contract owner. | [] |
|
CVE-2005-1143 | Cross-site scripting (XSS) vulnerability in index.php in EasyPHPCalendar before 6.2.8 allows remote attackers to inject arbitrary web script or HTML via the yr parameter. | [
"cpe:2.3:a:easyphpcalendar:easyphpcalendar:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-41288 | Video Station | An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following version:
Video Station 5.7.2 ( 2023/11/23 ) and later
| [
"cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*"
] |
CVE-2022-22676 | An event handler validation issue in the XPC Services API was addressed by removing the service. This issue is fixed in macOS Monterey 12.2. An application may be able to delete files for which it does not have permission. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-999m-wm5p-rpj8 | The GamiPress WordPress plugin before 1.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] |
|
CVE-2019-13966 | In iTop through 2.6.0, an XSS payload can be delivered in certain fields (such as icon) of the XML file used to build the dashboard. This is similar to CVE-2015-6544 (which is only about the dashboard title). | [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
] |
|
GHSA-jrmw-x68c-2f58 | The Login Me Now plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.2. This is due to insecure authentication based on an arbitrary transient name in the 'AutoLogin::listen()' function. This makes it possible for unauthenticated attackers to log in an existing user on the site, even an administrator. Note: this vulnerability requires using a transient name and value from another software, so the plugin is not inherently vulnerable on it's own. | [] |
|
GHSA-c4mm-9h9f-6xf6 | An arbitrary file upload vulnerability in the component /include/file.php of lylme_spage v1.9.5 allows attackers to execute arbitrary code via uploading a crafted file. | [] |
|
GHSA-wx2p-fvg9-w66q | Vulnerability in the Oracle Health Sciences Data Management Workbench product of Oracle Health Sciences Applications (component: User Interface). Supported versions that are affected are 2.4.8.7 and 2.5.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Health Sciences Data Management Workbench. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Health Sciences Data Management Workbench accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [] |
|
CVE-2024-7436 | D-Link DI-8100 msp_info.htm msp_info_htm command injection | A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07. This issue affects the function msp_info_htm of the file msp_info.htm. The manipulation of the argument cmd leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273521 was assigned to this vulnerability. | [
"cpe:2.3:h:d-link:di-8100:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-8100_firmware:16.07:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-8100:*:*:*:*:*:*:*:*"
] |
CVE-2020-25218 | Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allow Authentication Bypass in its administrative web interface. | [
"cpe:2.3:o:grandstream:grp2612_firmware:1.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:grp2612:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:grp2612p_firmware:1.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:grp2612p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:grp2612w_firmware:1.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:grp2612w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:grp2613_firmware:1.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:grp2613:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:grp2614_firmware:1.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:grp2614:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:grp2615_firmware:1.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:grp2615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:grandstream:grp2616_firmware:1.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:h:grandstream:grp2616:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-50344 | I, Librarian has a Stored XSS vulnerability in Supplemental Files | I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to be executed with the application context. An attacker can exploit this vulnerability by uploading a supplementary file that contains a malicious code or script. This code will then be executed when the file is loaded in the browser. The vulnerability was fixed in version 5.11.2. | [] |
GHSA-7j4m-73mf-j53v | Multiple unspecified vulnerabilities in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allow remote attackers to cause a denial of service (crash) via a crafted RADIUS Access-Request packet. NOTE: it has been reported that at least one issue is a heap-based buffer overflow involving the Tunnel-Password attribute. | [] |
|
CVE-2020-5735 | Amcrest cameras and NVR are vulnerable to a stack-based buffer overflow over port 37777. An authenticated remote attacker can abuse this issue to crash the device and possibly execute arbitrary code. | [
"cpe:2.3:o:amcrest:1080-lite_8ch_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:1080-lite_8ch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:amdv10814-h5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:amdv10814-h5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ipm-721_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ipm-721:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip2m-841_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip2m-841:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip2m-841-v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip2m-841-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip2m-853ew_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip2m-853ew:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip2m-858w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip2m-858w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip2m-866w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip2m-866w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip2m-866ew_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip2m-866ew:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip4m-1053ew_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip4m-1053ew:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip8m-2454ew_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip8m-2454ew:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip8m-2493eb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip8m-2493eb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip8m-2496eb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip8m-2496eb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip8m-2597e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip8m-2597e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip8m-mb2546ew_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip8m-mb2546ew:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip8m-mt2544ew_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip8m-mt2544ew:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ip8m-t2499ew_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ip8m-t2499ew:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amcrest:ipm-hx1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amcrest:ipm-hx1:-:*:*:*:*:*:*:*"
] |
|
GHSA-ggrf-7m8q-4wh6 | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Out-of-bounds Read vulnerability in the PDFLibTool component. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.