id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2025-23685 | WordPress RomanCart On WordPress plugin <= 0.0.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound RomanCart allows Reflected XSS. This issue affects RomanCart: from n/a through 0.0.2. | [] |
GHSA-fj9m-2hq3-2ghm | An improper certification validation vulnerability in the Insider Threat Management (ITM) Agent for MacOS could be used by an anonymous actor on an adjacent network to establish a man-in-the-middle position between the agent and the ITM server after the agent has registered. All versions prior to 7.14.3.69 are affected. Agents for Windows, Linux, and Cloud are unaffected. | [] |
|
GHSA-j3f2-qmpv-4939 | A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | [] |
|
GHSA-prjq-57v9-5pcf | Buffer overflow in IOHIDFamily in Apple iOS before 8.4.1 and OS X before 10.10.5 allows local users to gain privileges via unspecified vectors. | [] |
|
CVE-2005-1839 | Multiple SQL injection vulnerabilities in Doug Luxem Liberum Help Desk 0.97.3 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) view.asp or (2) print.asp or (3) edit parameter to register.asp. | [
"cpe:2.3:a:liberum:liberum_help_desk:0.97.3:*:*:*:*:*:*:*"
] |
|
GHSA-qj23-j7r8-wv79 | A vulnerability, which was classified as problematic, was found in Emlog Pro up to 1.2.2. This affects the POST parameter handling of articles. The manipulation with the input <script>alert(1);</script> leads to cross site scripting. It is possible to initiate the attack remotely but it requires a signup and login by the attacker. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-m9rr-495w-r5xp | Cross-site scripting (XSS) vulnerability in IBM InfoSphere Information Server through 8.5 FP3, 8.7 through FP2, and 9.1 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the web console. | [] |
|
CVE-2024-24795 | Apache HTTP Server: HTTP Response Splitting in multiple modules | HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.
Users are recommended to upgrade to version 2.4.59, which fixes this issue. | [] |
CVE-2009-0140 | Unspecified vulnerability in the SMB component in Apple Mac OS X 10.4.11 and 10.5.6 allows remote SMB servers to cause a denial of service (memory exhaustion and system shutdown) via a crafted file system name. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*"
] |
|
GHSA-hfc3-8773-fvhf | A vulnerability, which was classified as problematic, has been found in htmly 5.3 whis affects the component Edit Profile Module. The manipulation of the field Title with script tags leads to persistent cross site scripting. The attack may be initiated remotely and requires an authentication. A simple POC has been disclosed to the public and may be used. | [] |
|
CVE-2011-1896 | Cross-site scripting (XSS) vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "ExcelTable Reflected XSS Vulnerability." | [
"cpe:2.3:a:microsoft:forefront_unified_access_gateway:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_unified_access_gateway:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_unified_access_gateway:2010:update1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:forefront_unified_access_gateway:2010:update2:*:*:*:*:*:*"
] |
|
GHSA-432q-7x98-83cg | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | [] |
|
CVE-2007-0225 | Cross-site scripting (XSS) vulnerability in shopcustadmin.asp in VP-ASP Shopping Cart 6.09 and earlier allows remote attackers to inject arbitrary web script or HTML via the msg parameter. | [
"cpe:2.3:a:virtual_programming:vp-asp:6.09:*:*:*:*:*:*:*"
] |
|
CVE-2008-1197 | The Marvell driver for the Netgear WN802T Wi-Fi access point with firmware 1.3.16 on the Marvell 88W8361P-BEM1 chipset does not properly parse the SSID information element in an association request, which allows remote authenticated users to cause a denial of service (device reboot or hang) or possibly execute arbitrary code via a "Null SSID." | [
"cpe:2.3:h:marvell:88w8361w-bem1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn802t:1.3.16:*:*:*:*:*:*:*"
] |
|
GHSA-jwpw-q68h-r678 | Duplicate Advisory: Improper Neutralization of CRLF Sequences in dio | Duplicate advisoryThis advisory has been withdrawn because it is a duplicate of GHSA-9324-jv53-9cc8. This link is maintained to preserve external references.Original DescriptionThe dio package prior to 5.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669. | [] |
CVE-2025-31599 | WordPress Bulk Product Sync plugin <= 8.6 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in N-Media Bulk Product Sync allows SQL Injection. This issue affects Bulk Product Sync: from n/a through 8.6. | [] |
CVE-2016-2994 | Cross-site scripting (XSS) vulnerability in IBM UrbanCode Deploy 6.2.x before 6.2.1.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.201:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-26471 | A reflected cross-site scripting (XSS) vulnerability in zhimengzhe iBarn v1.5 allows attackers to inject malicious JavaScript into the web browser of a victim via the search parameter in offer.php. | [
"cpe:2.3:a:ibarn_project:ibarn:1.5:*:*:*:*:*:*:*"
] |
|
GHSA-3qrv-r8v8-pmw7 | A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks. | [] |
|
GHSA-gj42-cfph-mjj4 | An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, callback function SmmCreateVariableLockList () calls CreateVariableLockListInSmm (). In CreateVariableLockListInSmm (), it uses StrSize () to get variable name size and it could lead to a buffer over-read. | [] |
|
CVE-2023-25443 | WordPress Button Generator – easily Button Builder Plugin <= 2.3.5 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Button Generator – easily Button Builder plugin <= 2.3.5 versions. | [
"cpe:2.3:a:wow-company:button_generator:*:*:*:*:*:wordpress:*:*"
] |
GHSA-wq4v-jc7c-r7pj | IBM Aspera Faspex 4.4.2 could allow a remote attacker to obtain sensitive credential information for an external user, using a specially crafted SQL query. IBM X-Force ID: 249613. | [] |
|
GHSA-65hj-59g8-fjjc | MISP before 2.4.166 unsafely allows users to use the order parameter, related to app/Model/Attribute.php, app/Model/GalaxyCluster.php, app/Model/Workflow.php, and app/Plugin/Assets/models/behaviors/LogableBehavior.php. | [] |
|
GHSA-8ppx-8g69-j34r | Mahara 15.04 before 15.04.10 and 15.10 before 15.10.6 and 16.04 before 16.04.4 are vulnerable to incorrect access control after the password reset link is sent via email and then user changes default email, Mahara fails to invalidate old link.Consequently the link in email can be used to gain access to the user's account. | [] |
|
GHSA-26wh-22xw-qfqx | Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file. | [] |
|
CVE-2024-39597 | [CVE-2024-39597] Improper Authorization Checks on Early Login Composable Storefront B2B sites of SAP Commerce | In SAP Commerce, a user can misuse the forgotten
password functionality to gain access to a Composable Storefront B2B site for
which early login and registration is activated, without requiring the merchant
to approve the account beforehand. If the site is not configured as isolated
site, this can also grant access to other non-isolated early login sites, even
if registration is not enabled for those other sites. | [
"cpe:2.3:a:sap:commerce_hycom:2205:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:2211:*:*:*:*:*:*:*"
] |
CVE-2024-11463 | DeBounce Email Validator <= 5.6.5 - Reflected Cross-Site Scripting | The DeBounce Email Validator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'from', 'to', and 'key' parameters in all versions up to, and including, 5.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
GHSA-2rgv-xfw7-xr24 | Yopify, an e-commerce notification plugin, up to April 06, 2017, leaks the first name, last initial, city, and recent purchase data of customers, all without user authorization. | [] |
|
GHSA-52r8-qcqv-p7v2 | The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. | [] |
|
CVE-2020-11647 | In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector could crash. This was addressed in epan/dissectors/packet-bacapp.c by limiting the amount of recursion. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
|
CVE-2007-0715 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PICT file. | [
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*"
] |
|
CVE-2006-3862 | Buffer overflow in IBM Informix Dynamic Server (IDS) 9.40.TC5 through 9.40.xC7 and 10.00.TC1 through 10.00.xC3 allows attackers to execute arbitrary code via the SQLIDEBUG environment variable (envariable). | [
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.xc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.0.tc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc1:*:*:*:*:*:*:*"
] |
|
GHSA-qgwp-x6h8-qx34 | Improper log management vulnerability in Watch Active2 PlugIn prior to 2.2.08.21033151 version allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone via log. | [] |
|
CVE-2024-36056 | Hw64.sys in Marvin Test HW.exe before 5.0.5.0 allows unprivileged user-mode processes to arbitrarily map physical memory via IOCTL 0x9c406490 (for IoAllocateMdl, MmBuildMdlForNonPagedPool, and MmMapLockedPages), leading to NT AUTHORITY\SYSTEM privilege escalation. | [
"cpe:2.3:a:marvin_test:hw_driver:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-4fgq-8wpc-wxq9 | Directory traversal vulnerability in PixlrEditorHandler.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to write arbitrary files via the path parameter. | [] |
|
CVE-2020-15973 | Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-qx2x-78qf-mfrj | Greymatter 1.21c and earlier with the Bookmarklet feature enabled allows remote attackers to read a cleartext password and gain administrative privileges by guessing the name of a gmrightclick-*.reg file which contains the administrator name and password in cleartext, then retrieving the file from the web server before the Greymatter administrator performs a "Clear And Exit" action. | [] |
|
CVE-2015-9245 | Insecure default configuration in Progress Software OpenEdge 10.2x and 11.x allows unauthenticated remote attackers to specify arbitrary URLs from which to load and execute malicious Java classes via port 20931. | [
"cpe:2.3:a:progress:openedge:10.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:10.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:10.2b07:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:10.2b08:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:openedge:11.5:*:*:*:*:*:*:*"
] |
|
CVE-2020-11532 | Zoho ManageEngine DataSecurity Plus prior to 6.0.1 uses default admin credentials to communicate with a DataEngine Xnode server. This allows an attacker to bypass authentication for this server and execute all operations in the context of admin user. | [
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_datasecurity_plus:*:*:*:*:*:*:*:*"
] |
|
GHSA-j8g4-73f9-2crf | The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors. | [] |
|
CVE-2021-32626 | Lua scripts can overflow the heap-based Lua stack in Redis | Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code execution. This problem exists in all versions of Redis with Lua scripting support, starting from 2.6. The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. For users unable to update an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | [
"cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
] |
CVE-2024-36391 | MileSight DeviceHub - CWE-320: Key Management Errors | MileSight DeviceHub - CWE-320: Key Management Errors may allow Authentication Bypass and Man-In-The-Middle Traffic | [
"cpe:2.3:a:milesight:devicehub:3.0.1-r1:*:*:*:*:*:*:*"
] |
CVE-2024-5535 | SSL_select_next_proto buffer overread | Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.
Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.
The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).
This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.
In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.
This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.
The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"
] |
CVE-2018-19348 | The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x000000000012dff5" issue. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:9.3.0.10826:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:u3d:9.3.0.10809:*:*:*:*:*:*:*"
] |
|
GHSA-5377-84rf-5wx2 | Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: ndbcluster/plugin). Supported versions that are affected are 7.2.27 and prior, 7.3.16 and prior, 7.4.14 and prior and 7.5.5 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.0 Base Score 5.0 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H). | [] |
|
CVE-2015-8613 | Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-89w3-2j93-4g79 | Fluent Bit (aka fluent-bit) 1.7.0 through 1.7,4 has a double free in flb_free (called from flb_parser_json_do and flb_parser_do). | [] |
|
CVE-2024-21475 | Use of Out-of-range Pointer Offset in Video | Memory corruption when the payload received from firmware is not as per the expected protocol size. | [
"cpe:2.3:a:qualcomm:snapdragon:*:*:*:*:*:*:*:*"
] |
GHSA-q25j-cchh-9cp6 | ** UNSUPPORTED WHEN ASSIGNED ** A cross-site scripting (XSS) vulnerability in SAP J2EE Engine 7.01 allows remote attackers to inject arbitrary web script via the wsdlPath parameter to /ctcprotocol/Protocol. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] |
|
GHSA-77xg-4prx-v7j6 | Reflected cross site scripting (XSS) vulnerability was discovered in Sophos Web Appliance v4.3.9.1 that allows for arbitrary code to be inputted via the double quotes. | [] |
|
CVE-2022-49081 | highmem: fix checks in __kmap_local_sched_{in,out} | In the Linux kernel, the following vulnerability has been resolved:
highmem: fix checks in __kmap_local_sched_{in,out}
When CONFIG_DEBUG_KMAP_LOCAL is enabled __kmap_local_sched_{in,out} check
that even slots in the tsk->kmap_ctrl.pteval are unmapped. The slots are
initialized with 0 value, but the check is done with pte_none. 0 pte
however does not necessarily mean that pte_none will return true. e.g.
on xtensa it returns false, resulting in the following runtime warnings:
WARNING: CPU: 0 PID: 101 at mm/highmem.c:627 __kmap_local_sched_out+0x51/0x108
CPU: 0 PID: 101 Comm: touch Not tainted 5.17.0-rc7-00010-gd3a1cdde80d2-dirty #13
Call Trace:
dump_stack+0xc/0x40
__warn+0x8f/0x174
warn_slowpath_fmt+0x48/0xac
__kmap_local_sched_out+0x51/0x108
__schedule+0x71a/0x9c4
preempt_schedule_irq+0xa0/0xe0
common_exception_return+0x5c/0x93
do_wp_page+0x30e/0x330
handle_mm_fault+0xa70/0xc3c
do_page_fault+0x1d8/0x3c4
common_exception+0x7f/0x7f
WARNING: CPU: 0 PID: 101 at mm/highmem.c:664 __kmap_local_sched_in+0x50/0xe0
CPU: 0 PID: 101 Comm: touch Tainted: G W 5.17.0-rc7-00010-gd3a1cdde80d2-dirty #13
Call Trace:
dump_stack+0xc/0x40
__warn+0x8f/0x174
warn_slowpath_fmt+0x48/0xac
__kmap_local_sched_in+0x50/0xe0
finish_task_switch$isra$0+0x1ce/0x2f8
__schedule+0x86e/0x9c4
preempt_schedule_irq+0xa0/0xe0
common_exception_return+0x5c/0x93
do_wp_page+0x30e/0x330
handle_mm_fault+0xa70/0xc3c
do_page_fault+0x1d8/0x3c4
common_exception+0x7f/0x7f
Fix it by replacing !pte_none(pteval) with pte_val(pteval) != 0. | [] |
GHSA-qg5c-7q7p-mwc6 | The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character. | [] |
|
CVE-2024-1465 | The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘carousel_skin’ attribute of the Posts Carousel widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2018-9353 | In ihevcd_parse_slice_data of ihevcd_parse_slice.c there is a possible heap buffer out of bound read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-29917 | WordPress Compact WP Audio Player plugin <= 1.9.9 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Compact WP Audio Player allows Stored XSS.This issue affects Compact WP Audio Player: from n/a through 1.9.9.
| [] |
CVE-2024-42578 | A Cross-Site Request Forgery (CSRF) in the component edit_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. | [
"cpe:2.3:a:oswapp:warehouse_inventory_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-3074 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles). Supported versions that are affected are 8.0.11 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-42923 | SQL injection in Forma LMS | Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'id' parameter in the 'appCore/index.php?r=adm/mediagallery/delete' function in order to dump the entire database or delete all contents from the 'core_user_file' table. | [
"cpe:2.3:a:formalms:formalms:*:*:*:*:*:*:*:*"
] |
CVE-2003-0508 | Buffer overflow in the WWWLaunchNetscape function of Adobe Acrobat Reader (acroread) 5.0.7 and earlier allows remote attackers to execute arbitrary code via a .pdf file with a long mailto link. | [
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-19843 | Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache. | [
"cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-27219 | In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies. | [] |
|
CVE-2015-4303 | Cisco TelePresence Video Communication Server (VCS) X8.5.2 allows remote authenticated users to execute arbitrary commands in the context of the nobody user account via an unspecified web-page parameter, aka Bug ID CSCuv12333. | [
"cpe:2.3:a:cisco:telepresence_video_communication_server_software:x8.5.2:*:*:*:*:*:*:*"
] |
|
GHSA-57pw-qp4x-896h | A vulnerability in the web-based contract management service interface Ebiz4u of INOGARD could allow an victim user to download any file. The attacker is able to use startup menu directory via directory traversal for automatic execution. The victim user need to reboot, however. | [] |
|
GHSA-g5fm-jp9v-2432 | Improper Handling of `callbackUrl` parameter in next-auth | ImpactAn attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally we convert to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to our **API route handler timing out and logging in to fail**. This has been remedied in the following releases:next-auth v3 users before version 3.29.5 are impacted. (We recommend upgrading to v4, as v3 is considered unmaintained. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4))next-auth v4 users before version 4.5.0 are impacted.PatchesWe've released patches for this vulnerability in:v3 - `3.29.5`v4 - `4.5.0`You can do:oror(This will update to the latest v4 version, but you can change `latest` to `3` if you want to stay on v3. This is not recommended.)WorkaroundsIf for some reason you cannot upgrade, the workaround requires you to rely on [Advanced Initialization](https://next-auth.js.org/configuration/initialization#advanced-initialization). Here is an example:**Before:****After:**ReferencesThis vulnerability was discovered not long after https://github.com/nextauthjs/next-auth/security/advisories/GHSA-q2mx-j4x2-2h74 was published and is very similar in nature.Related documentation:https://next-auth.js.org/getting-started/client#specifying-a-callbackurlhttps://next-auth.js.org/configuration/callbacks#redirect-callbackA test case has been added so this kind of issue will be checked before publishing. See: https://github.com/nextauthjs/next-auth/commit/e498483b23273d1bfc81be68339607f88d411bd6For more informationIf you have any concerns, we request responsible disclosure, outlined here: https://next-auth.js.org/security#reporting-a-vulnerabilityTimelineThe issue was reported 2022 June 10th, a response was sent out to the reporter in less than 2 hours, and a patch was published within 3 hours. | [] |
GHSA-mf8q-f3gh-r43c | The SmartConnect Class control allows remote attackers to cause a denial of service (Internet Explorer crash) by creating a COM object of the class associated with the control's CLSID, which is not intended for use within Internet Explorer. | [] |
|
GHSA-2fx6-2pm7-cwvm | Server-Side Request Forgery (SSRF) vulnerability in Vova Anokhin WP Shortcodes Plugin — Shortcodes Ultimate.This issue affects WP Shortcodes Plugin — Shortcodes Ultimate: from n/a through 5.12.6. | [] |
|
CVE-2021-24412 | Html5 Audio Player < 2.1.3 - Contributor+ Stored Cross-Site Scripting | The Html5 Audio Player – Audio Player for WordPress plugin before 2.1.3 does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode | [
"cpe:2.3:a:bplugins:html5_audio_player:*:*:*:*:*:wordpress:*:*"
] |
GHSA-wxp2-g4cg-jg3f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Cloud Security Gateway (CSG) Portal on Web Cloud Security Gateway, Email Security Cloud (login_submit.mhtml modules), Forcepoint Web Security Portal on Hybrid (login_submit.mhtml modules) allows Reflected XSS.This issue affects Cloud Security Gateway (CSG): before 03/29/2023; Web Security: before 03/29/2023. | [] |
|
CVE-2013-3745 | Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 allows local users to affect availability via unknown vectors related to Libraries/Libc. | [
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
] |
|
CVE-2023-30985 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 3), Solid Edge SE2023 (All versions < V223.0 Update 2). Affected applications contain an out of bounds read past the end of an allocated buffer while parsing a specially crafted OBJ file. This vulnerability could allow an attacker to disclose sensitive information. (ZDI-CAN-19426) | [
"cpe:2.3:a:siemens:solid_edge_se2023:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2023:update_0001:*:*:*:*:*:*:*"
] |
|
GHSA-738r-q8gh-xrrc | The elliptic curve cryptography (ECC) hardware accelerator, part of the ARM® TrustZone® CryptoCell 310, contained in the NordicSemiconductor nRF52840 through 2021-03-29 has a non-constant time ECDSA implemenation. This allows an adversary to recover the private ECC key used during an ECDSA operation. | [] |
|
GHSA-2cq5-j9m5-v929 | A vulnerability was found in Tenda AC1206 15.03.06.23. It has been classified as critical. Affected is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid/timeZone leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] |
|
CVE-2019-18663 | A SQL injection vulnerability in a /login/forgot1 POST request in ARP-GUARD 4.0.0-5 allows unauthenticated remote attackers to execute arbitrary SQL commands via the user_id parameter. | [
"cpe:2.3:a:isl:arp-guard:4.0.0-5:*:*:*:*:*:*:*"
] |
|
CVE-2023-0646 | dst-admin cavesConsole command injection | A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220033 was assigned to this vulnerability. | [
"cpe:2.3:a:dst-admin_project:dst-admin:1.5.0:*:*:*:*:*:*:*"
] |
GHSA-gj42-9mvq-cfm7 | Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing. | [] |
|
GHSA-fjp9-rfvr-287m | In the Linux kernel, the following vulnerability has been resolved:drm/amd/amdgpu: fix refcount leak[Why]
the gem object rfb->base.obj[0] is get according to num_planes
in amdgpufb_create, but is not put according to num_planes[How]
put rfb->base.obj[0] in amdgpu_fbdev_destroy according to num_planes | [] |
|
GHSA-6882-w5r7-3gf2 | Directory traversal vulnerability in OpenBase 10.0.5 and earlier allows remote authenticated users to create files with arbitrary contents via a .. (dot dot) in the first argument to the GlobalLog stored procedure. NOTE: this can be leveraged to execute arbitrary code using CVE-2007-5926. | [] |
|
GHSA-22p8-j48p-jr45 | Apache before 1.3.24, when writing to the log file, records a spoofed hostname from the reverse lookup of an IP address, even when a double-reverse lookup fails, which allows remote attackers to hide the original source of activities. | [] |
|
CVE-2023-3349 | Information exposure on IBERMATICA RPS | Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated user to retrieve sensitive information, such as usernames, IP addresses or SQL queries sent to the application. By accessing the URL /RPS2019Service/status.html, the application enables the logging mechanism by generating the log file, which can be downloaded. | [
"cpe:2.3:a:ayesa:ibermatica_rps:2019:*:*:*:*:*:*:*"
] |
CVE-2003-1485 | Clearswift MAILsweeper 4.0 through 4.3.7 allows remote attackers to bypass filtering via a file attachment that contains "multiple extensions combined with large blocks of white space." | [
"cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*"
] |
|
GHSA-963c-26c4-cw72 | Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory. | [] |
|
CVE-2024-33633 | WordPress Piotnet Addons For Elementor Pro plugin <= 7.1.17 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor Pro allows Reflected XSS.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.
| [
"cpe:2.3:a:piotnet:piotnet_forms:*:*:*:*:*:wordpress:*:*"
] |
GHSA-5qp2-wwm4-h7fm | FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject. | [] |
|
CVE-2023-20032 | On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:
A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.
This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.
For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"]. | [
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*"
] |
|
GHSA-3m66-g4vg-fpcq | An XSS Injection vulnerability exists in Sangoma FreePBX and PBXact 13, 14, and 15 within the Debug/Test page of the Superfecta module at the admin/config.php?display=superfecta URI. This affects Superfecta through 13.0.4.7, 14.x through 14.0.24, and 15.x through 15.0.2.20. | [] |
|
CVE-2014-2968 | Cross-site scripting (XSS) vulnerability in the web interface on the Huawei E355 CH1E355SM modem with software 21.157.37.01.910 and Web UI 11.001.08.00.03 allows remote attackers to inject arbitrary web script or HTML via an SMS message. | [
"cpe:2.3:a:huawei:e355_web_ui:11.001.08.00.03:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e355_firmware:21.157.37.01.910:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:e355:ch1e355sm:*:*:*:*:*:*:*"
] |
|
GHSA-j59g-frgq-2p43 | Network Product Identification (PID) Checker in Microsoft Office v. X for Mac allows remote attackers to cause a denial of service (crash) via a malformed product announcement. | [] |
|
GHSA-vc5q-m359-46xj | PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24316. | [] |
|
GHSA-5hfr-5xvx-h6rq | An issue was discovered in Bilboplanet 2.0. Stored XSS exists in the user_id parameter to signup.php. | [] |
|
CVE-2010-3976 | Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*"
] |
|
GHSA-q8hg-pf8v-cxrv | Symfony Http-Kernel has non-constant time comparison in UriSigner | When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability. | [] |
GHSA-mrrv-j79h-j3g7 | A vulnerability classified as critical has been found in PHPGurukul e-Diary Management System 1.0. This affects an unknown part of the file /add-notes.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-3m2q-3qhr-66rq | In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705028; Issue ID: GN20220705028. | [] |
|
CVE-2009-2375 | Stack-based buffer overflow in Photo DVD Maker 8.02, and possibly earlier versions, allows remote attackers to execute arbitrary code via a long File_Name parameter in a .pdm file. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.30:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.32:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.40:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.53:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.54:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.55:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.60:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:6.61:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.04:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.05:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.32:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.33:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.34:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.55:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.56:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.58:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.71:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.73:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.77:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.78:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.80:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.90:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.91:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.92:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.93:*:*:*:*:*:*:*",
"cpe:2.3:a:photo-dvd-maker:photo_dvd_maker:7.96:*:*:*:*:*:*:*"
] |
|
CVE-2022-28366 | Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839. | [
"cpe:2.3:a:cyberneko_html_project:cyberneko_html:*:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlunit:htmlunit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:antisamy_project:antisamy:*:*:*:*:*:*:*:*"
] |
|
GHSA-2f86-j3w8-9473 | Possible memory corruption due to improper check when application loader object is explicitly destructed while application is unloading in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT | [] |
|
GHSA-vhfc-33hx-x5w9 | cPanel before 74.0.8 allows local users to disable the ClamAV daemon (SEC-409). | [] |
|
CVE-2019-16893 | The Web Management of TP-Link TP-SG105E V4 1.0.0 Build 20181120 devices allows an unauthenticated attacker to reboot the device via a reboot.cgi request. | [
"cpe:2.3:o:tp-link:tp-sg105e_firmware:1.0.0:build_20181120:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tp-sg105e:4:*:*:*:*:*:*:*"
] |
|
CVE-2019-0592 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0611. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-36c5-5h9q-3jvp | On Prima Systems FlexAir devices through 2.4.9api3, an authenticated user can upload Python (.py) scripts and execute arbitrary code with root privileges. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.