Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-3367-p2hq-xqjf
Cross-site scripting (XSS) vulnerability in the RSS/Atom feed-reader implementation in Iwate Portal Bar allows remote attackers to inject arbitrary web script or HTML via a crafted feed.
[]
CVE-2019-13628
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.
[ "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*" ]
GHSA-wj6h-64fc-37mp
Minerva timing attack on P-256 in python-ecdsa
python-ecdsa has been found to be subject to a Minerva timing attack on the P-256 curve. Using the `ecdsa.SigningKey.sign_digest()` API function and timing signatures an attacker can leak the internal nonce which may allow for private key discovery. Both ECDSA signatures, key generation, and ECDH operations are affected. ECDSA signature verification is unaffected. The python-ecdsa project considers side channel attacks out of scope for the project and there is no planned fix.
[]
GHSA-w82j-qrr8-455x
A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
[]
CVE-2019-15012
Bitbucket Server and Bitbucket Data Center from version 4.13. before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the edit-file request. A remote attacker with write permission on a repository can write to any arbitrary file to the victims Bitbucket Server or Bitbucket Data Center instance using the edit-file endpoint, if the user has Bitbucket Server or Bitbucket Data Center running, and has the permission to write the file at that destination. In some cases, this can result in execution of arbitrary code by the victims Bitbucket Server or Bitbucket Data Center instance.
[ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ]
CVE-2010-4359
SQL injection vulnerability in index.php in Jurpopage 0.2.0 allows remote attackers to execute arbitrary SQL commands via the category parameter.
[ "cpe:2.3:a:jurpo:jurpopage:0.2.0:*:*:*:*:*:*:*" ]
CVE-2012-6590
The web-based management UI in Palo Alto Networks PAN-OS 4.0.x before 4.0.8 allows remote attackers to obtain verbose error information via crafted input, aka Ref ID 33139.
[ "cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*" ]
GHSA-j3px-wrmc-2h8r
Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
[]
CVE-2011-3363
The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*" ]
CVE-2023-48469
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
CVE-2016-9918
In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
[ "cpe:2.3:a:bluez_project:bluez:5.42:*:*:*:*:*:*:*" ]
GHSA-c82m-j4x6-2m9m
GNUBOARD5 before 5.3.2.0 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board group extra contents" parameter, aka the adm/boardgroup_form_update.php gr_1~10 parameter.
[]
GHSA-4p92-fv6v-fhfj
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
[]
CVE-2020-9094
There is an out of bound read vulnerability in some verisons of Huawei CloudEngine product. A module does not deal with specific message properly. Attackers can exploit this vulnerability by sending malicious packet. This can lead to denial of service.
[ "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r019c00spc800:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r019c00spc800:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c20spc800:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r019c00spc800:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r019c00spc800:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*" ]
CVE-2022-28318
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16379.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
GHSA-7crq-fr5p-gw4f
D-Link DAP-2622 DDP Set AG Profile NMS URL Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20082.
[]
CVE-2020-5329
Dell EMC Avamar Server contains an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links.
[ "cpe:2.3:a:dell:emc_avamar_server:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:dell:emc_avamar_server:7.4.1:*:*:*:*:*:*:*" ]
GHSA-42j4-733x-5vcf
Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7
Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.https://vaadin.com/security/cve-2020-36320
[]
CVE-2005-4333
Multiple cross-site scripting (XSS) vulnerabilities in Binary Board System (BBS) 0.2.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) inreplyto, (2) article, and (3) board parameters to reply.pl, (4) branch, (5) board, and (6) stats.pl parameters to (b) stats.pl, and (7) board parameter to (c) toc.pl.
[ "cpe:2.3:a:binary-concepts:binary_board_system:*:*:*:*:*:*:*:*" ]
GHSA-rhm9-gp5p-5248
Gradio vulnerable to arbitrary file read with File and UploadButton components
SummaryIf File or UploadButton components are used as a part of Gradio application to preview file content, an attacker with access to the application might abuse these components to read arbitrary files from the application server.DetailsConsider the following application where a user can upload a file and preview its content:If we run this application and make the following request (which attempts to read the `/etc/passwd` file)Then this results in the following error on the serverThis is expected. However, if we now remove the `"meta":{"_type":"gradio.FileData"}` from the request:This doesn't cause an error and results in the content of /etc/passwd being shown in the response!This works because Gradio relies on the `processing_utils.async_move_files_to_cache` to sanitize all incoming file paths in all inputs. This function performs the following operationwhere `client_utils.is_file_obj_with_meta` is used as a filter which tells on which inputs to perform the `_move_to_cache` function (which also performs the allowed/disallowed check on the file path). The problem is that `client_utils.is_file_obj_with_meta` is not guaranteed to trigger for every input that contains a file path:For example, as in the PoC, the file path won't be checked if the `meta` key is not present in the request or if `_type` is not `gradio.FileData`.Then, the path remains under control of the attacker and is used to read a file in `_process_single_file` function in `file.py` and `upload_button.py` (and possibly other places)PoCAs described above, run the following Gradio appAnd make the following requestImpactArbitrary file read in specific Gradio applications that use File or UploadButton components to upload files and echo/preview the content to the user.
[]
CVE-2023-4532
Incorrect Authorization in GitLab
An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. Users were capable of linking CI/CD jobs of private projects which they are not a member of.
[ "cpe:2.3:a:gitlab:gitlab:16.2:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:16.4:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:16.3:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:enterprise:*:*:*" ]
GHSA-wwhr-5q8q-3gmc
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38628.
[]
GHSA-w8ch-v2qx-54xx
An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c
[]
CVE-2007-2877
Buffer overflow in tcl/win/tclWinReg.c in Tcl (Tcl/Tk) before 8.5a6 allows local users to gain privileges via long registry key paths.
[ "cpe:2.3:a:tcl_tk:tcl_tk:*:*:*:*:*:*:*:*" ]
CVE-2015-4683
Polycom RealPresence Resource Manager (aka RPRM) before 8.4 allows attackers to obtain sensitive information and potentially gain privileges by leveraging use of session identifiers as parameters with HTTP GET requests.
[ "cpe:2.3:a:polycom:realpresence_resource_manager:*:*:*:*:*:*:*:*" ]
CVE-2010-2811
Virtual Desktop Server Manager (VDSM) in Red Hat Enterprise Virtualization (RHEV) 2.2 does not properly accept TCP connections for SSL sessions, which allows remote attackers to cause a denial of service (daemon outage) via crafted SSL traffic.
[ "cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*" ]
GHSA-3mp3-2m7f-5wff
Null Pointer Dereference may occur due to improper validation while processing crafted SDP body in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
[]
CVE-2024-29992
Azure Identity Library for .NET Information Disclosure Vulnerability
Azure Identity Library for .NET Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:azure_identity_library_for_.net:*:*:*:*:*:*:*:*" ]
CVE-2017-11422
Statamic framework before 2.6.0 does not correctly check a session's permissions when the methods from a user's class are called. Problematic methods include reset password, create new account, create new role, etc.
[ "cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*" ]
CVE-2023-4452
Web Server Buffer Overflow Vulnerability
A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot.
[ "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-vpn-2gsfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-vpn-2gsfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-vpn-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-vpn-2gsfp-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-2gsfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-2gsfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:edr-810-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-810-2gsfp-t:-:*:*:*:*:*:*:*" ]
GHSA-jg62-3p5c-pg7j
A weak permission was found in the backup directory in LaborOfficeFree affecting version 19.10. This vulnerability allows any authenticated user to read backup files in the directory '%programfiles(x86)% LaborOfficeFree BackUp'.
[]
CVE-2016-1841
libxslt, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2001-1463
The remote administration client for RhinoSoft Serv-U 3.0 sends the user password in plaintext even when S/KEY One-Time Password (OTP) authentication is enabled, which allows remote attackers to sniff passwords.
[ "cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*" ]
CVE-2017-10810
Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2018-16379
Ogma CMS 0.4 Beta has XSS via the "Footer Text footer" field on the "Theme/Theme Options" screen.
[ "cpe:2.3:a:digimute:ogma_cms:0.4:beta:*:*:*:*:*:*" ]
CVE-2024-12268
Responsive Blocks – WordPress Gutenberg Blocks <= 1.9.7 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Responsive Blocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'responsive-block-editor-addons/portfolio' block in all versions up to, and including, 1.9.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2009-1040
Buffer overflow in WinAsm Studio 5.1.5.0 allows user-assisted remote attackers to execute arbitrary code via a crafted project (.wap) file.
[ "cpe:2.3:a:winasm:winasm_studio:5.1.5.0:*:*:*:*:*:*:*" ]
GHSA-7r3c-3rhp-45ch
Use-after-free vulnerability in Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, and Excel Services on SharePoint Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted calculatedColumnFormula object in an Office document, aka "Microsoft Office Memory Corruption Vulnerability."
[]
GHSA-4r99-7p57-xjr3
An improperly implemented security check for standard vulnerability [CWE-358] in FortiADC Web Application Firewall (WAF) 7.4.0 through 7.4.4, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions when cookie security policy is enabled may allow an attacker, under specific conditions, to retrieve the initial encrypted and signed cookie protected by the feature
[]
CVE-2006-5164
Multiple cross-site scripting (XSS) vulnerabilities in cart.php in Sum Effect Software digiSHOP 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) sortBy or (2) search parameters.
[ "cpe:2.3:a:sum_effect_software:digishop:4.0:*:*:*:*:*:*:*" ]
CVE-2017-7802
A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
CVE-2017-16041
ikst versions before 1.1.2 download resources over HTTP, which leaves it vulnerable to MITM attacks.
[ "cpe:2.3:a:ikst_project:ikst:*:*:*:*:*:node.js:*:*" ]
GHSA-cxvx-j264-5q8h
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
[]
CVE-2014-0404
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 4.3.4 allows local users to affect integrity and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-0406.
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*" ]
CVE-2008-5898
CodeAvalanche Directory stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the administrator password via a direct request for _private/CADirectory.mdb. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:codeavalanche:directory:_nil_:*:*:*:*:*:*:*" ]
GHSA-ggf3-232m-5283
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
[]
GHSA-wp93-prx6-vqjm
A vulnerability, which was classified as problematic, has been found in D-Link DIR-618 and DIR-605L 2.02/3.02. This issue affects some unknown processing of the file /goform/formAdvNetwork. The manipulation leads to improper access controls. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
[]
GHSA-6hvv-x2xw-p422
The vRealize Operations Manager API (8.x prior to 8.5) contains a broken access control vulnerability leading to unauthenticated API access. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can add new nodes to existing vROps cluster.
[]
CVE-2024-29817
WordPress affiliate-toolkit – WordPress Affiliate Plugin plugin <= 3.4.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SERVIT Software Solutions affiliate-toolkit allows Stored XSS.This issue affects affiliate-toolkit: from n/a through 3.4.5.
[]
GHSA-67wg-9mvv-jfqw
The content-audit plugin before 1.9.2 for WordPress has XSS.
[]
CVE-2022-20698
Clam AntiVirus (ClamAV) Denial of Service Vulnerability
A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
[ "cpe:2.3:a:clamav:clamav:*:*:*:*:lts:*:*:*", "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*" ]
GHSA-4c94-48c4-m77x
The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
[]
CVE-2007-6376
Directory traversal vulnerability in autohtml.php in Francisco Burzi PHP-Nuke 8.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the filename parameter, a different vector than CVE-2006-4190. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:francisco_burzi:php-nuke:8.0_final:*:*:*:*:*:*:*" ]
GHSA-r29v-vw6f-chmc
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693.
[]
CVE-2020-36626
Modern Tribe Panel Builder Plugin SearchFilter.php add_post_content_filtered_to_search_sql sql injection
A vulnerability classified as critical has been found in Modern Tribe Panel Builder Plugin. Affected is the function add_post_content_filtered_to_search_sql of the file ModularContent/SearchFilter.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4528d4f855dbbf24e9fc12a162fda84ce3bedc2f. It is recommended to apply a patch to fix this issue. VDB-216738 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:tri:panel_builder:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-11343
Telerik Document Processing Path Traversal
In Progress® Telerik® Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access.
[]
GHSA-84j7-2334-6mf2
Directory traversal vulnerability in security.inc.php in AzDGDatingLite 2.1.3, and possibly earlier versions, allows remote attackers to execute arbitrary PHP commands via ".." sequences and "%00" (trailing null byte) characters in the l parameter, which is used in an include_once statement.
[]
GHSA-j63m-2vr6-fv7m
DevDojo Voyager vulnerable to path traversal
DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass.
[]
CVE-2024-53198
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
In the Linux kernel, the following vulnerability has been resolved: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() This patch fixes an issue in the function xenbus_dev_probe(). In the xenbus_dev_probe() function, within the if (err) branch at line 313, the program incorrectly returns err directly without releasing the resources allocated by err = drv->probe(dev, id). As the return value is non-zero, the upper layers assume the processing logic has failed. However, the probe operation was performed earlier without a corresponding remove operation. Since the probe actually allocates resources, failing to perform the remove operation could lead to problems. To fix this issue, we followed the resource release logic of the xenbus_dev_remove() function by adding a new block fail_remove before the fail_put block. After entering the branch if (err) at line 313, the function will use a goto statement to jump to the fail_remove block, ensuring that the previously acquired resources are correctly released, thus preventing the reference count leak. This bug was identified by an experimental static analysis tool developed by our team. The tool specializes in analyzing reference count operations and detecting potential issues where resources are not properly managed. In this case, the tool flagged the missing release operation as a potential problem, which led to the development of this patch.
[]
CVE-2021-2392
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:bi_publisher:5.5.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*" ]
GHSA-jxh3-f5j5-g9vq
ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
[]
CVE-2013-6182
Unquoted Windows search path vulnerability in EMC Replication Manager before 5.5 allows local users to gain privileges via a crafted application in a parent directory of an intended directory.
[ "cpe:2.3:a:emc:replication_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:replication_manager:5.3:*:*:*:*:*:*:*" ]
CVE-2019-13629
MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
[ "cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*" ]
GHSA-v3cp-jj5w-cffv
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The system area allows arbitrary file overwrites via a symlink attack. The Samsung ID is SVE-2020-17183 (June 2020).
[]
GHSA-5gv4-m6hr-96m6
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in openEuler aops-zeus on Linux allows Command Injection. This vulnerability is associated with program files https://gitee.Com/openeuler/aops-zeus/blob/master/zeus/conf/constant.Py.This issue affects aops-zeus: from 1.2.0 through 1.4.0.
[]
CVE-2019-1946
Cisco Enterprise NFV Infrastructure Software Web-Based Management Interface Authentication Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to bypass authentication and get limited access to the web-based management interface. The vulnerability is due to an incorrect implementation of authentication in the web-based management interface. An attacker could exploit this vulnerability by sending a crafted authentication request to the web-based management interface on an affected system. A successful exploit could allow the attacker to view limited configuration details and potentially upload a virtual machine image.
[ "cpe:2.3:a:cisco:enterprise_network_function_virtualization_infrastructure:*:*:*:*:*:*:*:*" ]
CVE-2020-15676
Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" ]
CVE-2005-0846
Multiple cross-site scripting (XSS) vulnerabilities in the email auto-reply message in SurgeMail 2.2g3 allow remote attackers to inject arbitrary web script or HTML via the (1) message subject or (2) message header field.
[ "cpe:2.3:a:netwin:surgemail:2.2g3:*:*:*:*:*:*:*" ]
CVE-2014-3969
Xen 4.4.x, when running on an ARM system, does not properly check write permissions on virtual addresses, which allows local guest administrators to gain privileges via unspecified vectors.
[ "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*" ]
GHSA-57p5-7r24-7vg9
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Enterprise Infrastructure SEC). Supported versions that are affected are Prior to 9.2.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via JDENET to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
[]
CVE-2021-38977
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 212782.
[ "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_guardium_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_key_lifecycle_manager:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2017-18741
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects R6250 before 1.0.4.8, R6300v2 before 1.0.4.8, R6700 before 1.0.1.20, R7000 before 1.0.7.10, R7000P before 1.0.0.58, R6900P before 1.0.0.58, R7100LG before 1.0.0.32, R7900 before 1.0.1.14, R8000 before 1.0.3.22, and R8500 before 1.0.2.94.
[ "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*" ]
CVE-2012-4543
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) pageStart or (2) pageSize to the displayCRL script, or (3) nonce variable to the profileProcess script.
[ "cpe:2.3:a:redhat:certificate_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:certificate_system:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:certificate_system:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:certificate_system:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:certificate_system:8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:certificate_system:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:certificate_system:8.1:*:*:*:*:*:*:*" ]
GHSA-gj9p-prj2-vr68
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
CVE-2016-8309
Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 12.0.1, 12.0.2,12.0.4,12.1.0 and 12.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
[ "cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.3.0:*:*:*:*:*:*:*" ]
CVE-2014-3867
The Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 does not include the HTTPOnly flag in a Set-Cookie header for an unspecified cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, a different vulnerability than CVE-2013-3984.
[ "cpe:2.3:a:ibm:sametime:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*" ]
CVE-2007-3341
Unspecified vulnerability in the FTP implementation in Microsoft Internet Explorer allows remote attackers to "see a valid memory address" via unspecified vectors, a different issue than CVE-2007-0217.
[ "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*" ]
CVE-2022-45525
Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the downaction parameter at /goform/CertListInfo.
[ "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*", "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*" ]
GHSA-6v86-qcj2-7w7j
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jegstudio Gutenverse allows Stored XSS.This issue affects Gutenverse: from n/a through 1.9.4.
[]
GHSA-7mch-v7x5-pxc4
The issue was addressed with improved memory handling. This issue is fixed in watchOS 11.5, tvOS 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. Processing maliciously crafted web content may lead to memory corruption.
[]
CVE-2024-12979
code-projects Job Recruitment _all_edits.php cn_update cross site scripting
A vulnerability was found in code-projects Job Recruitment 1.0 and classified as problematic. This issue affects the function cn_update of the file /_parse/_all_edits.php. The manipulation of the argument cname leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
CVE-2008-1569
policyd-weight 0.1.14 beta-16 and earlier allows local users to modify or delete arbitrary files via a symlink attack on temporary files that are used when creating a socket.
[ "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:s390:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*", "cpe:2.3:a:policyd-weight:policyd-weight:*:beta16:*:*:*:*:*:*" ]
GHSA-4xrc-575q-x37w
Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.
[]
CVE-2019-9596
Darktrace Enterprise Immune System before 3.1 allows CSRF via the /whitelisteddomains endpoint.
[ "cpe:2.3:a:darktrace:enterprise_immune_system:*:*:*:*:*:*:*:*" ]
CVE-2007-5824
webserver.c in mt-dappd in Firefly Media Server 0.2.4 and earlier allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via a stats method action to /xml-rpc with (1) an empty Authorization header line, which triggers a crash in the ws_decodepassword function; or (2) a header line without a ':' character, which triggers a crash in the ws_getheaders function.
[ "cpe:2.3:a:firefly:media_server:*:*:*:*:*:*:*:*" ]
CVE-2005-2378
Directory traversal vulnerability in Oracle Reports allows remote attackers to read arbitrary files via an absolute or relative path to the (1) CUSTOMIZE or (2) desformat parameters to rwservlet. NOTE: vector 2 is probably the same as CVE-2006-0289, and fixed in Jan 2006 CPU.
[ "cpe:2.3:a:oracle:reports:*:*:*:*:*:*:*:*" ]
CVE-2002-2007
The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.
[ "cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*" ]
CVE-2022-2641
Horner Automation’s RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition.
[ "cpe:2.3:o:hornerautomation:rcc972_firmware:15.40:*:*:*:*:*:*:*", "cpe:2.3:h:hornerautomation:rcc972:-:*:*:*:*:*:*:*" ]
GHSA-p2mj-g72q-wq82
In IQrouter through 3.3.1, remote attackers can control the device (restart network, reboot, upgrade, reset) because of Incorrect Access Control.
[]
GHSA-fj69-cg4q-mwv9
SQL Injection exists in the JomEstate PRO through 3.7 component for Joomla! via the id parameter in a task=detailed action.
[]
GHSA-rxf3-4jfr-8gr6
On F5 BIG-IP 13.1.0-13.1.0.3, 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1 and Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
[]
CVE-2007-2270
The Linksys SPA941 VoIP Phone allows remote attackers to cause a denial of service (device reboot) via a 0377 (0xff) character in the From header, and possibly certain other locations, in a SIP INVITE request.
[ "cpe:2.3:h:linksys:spa941:*:*:*:*:*:*:*:*" ]
CVE-2021-47023
net: marvell: prestera: fix port event handling on init
In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix port event handling on init For some reason there might be a crash during ports creation if port events are handling at the same time because fw may send initial port event with down state. The crash points to cancel_delayed_work() which is called when port went is down. Currently I did not find out the real cause of the issue, so fixed it by cancel port stats work only if previous port's state was up & runnig. The following is the crash which can be triggered: [ 28.311104] Unable to handle kernel paging request at virtual address 000071775f776600 [ 28.319097] Mem abort info: [ 28.321914] ESR = 0x96000004 [ 28.324996] EC = 0x25: DABT (current EL), IL = 32 bits [ 28.330350] SET = 0, FnV = 0 [ 28.333430] EA = 0, S1PTW = 0 [ 28.336597] Data abort info: [ 28.339499] ISV = 0, ISS = 0x00000004 [ 28.343362] CM = 0, WnR = 0 [ 28.346354] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000100bf7000 [ 28.352842] [000071775f776600] pgd=0000000000000000, p4d=0000000000000000 [ 28.359695] Internal error: Oops: 96000004 [#1] PREEMPT SMP [ 28.365310] Modules linked in: prestera_pci(+) prestera uio_pdrv_genirq [ 28.372005] CPU: 0 PID: 1291 Comm: kworker/0:1H Not tainted 5.11.0-rc4 #1 [ 28.378846] Hardware name: DNI AmazonGo1 A7040 board (DT) [ 28.384283] Workqueue: prestera_fw_wq prestera_fw_evt_work_fn [prestera_pci] [ 28.391413] pstate: 60000085 (nZCv daIf -PAN -UAO -TCO BTYPE=--) [ 28.397468] pc : get_work_pool+0x48/0x60 [ 28.401442] lr : try_to_grab_pending+0x6c/0x1b0 [ 28.406018] sp : ffff80001391bc60 [ 28.409358] x29: ffff80001391bc60 x28: 0000000000000000 [ 28.414725] x27: ffff000104fc8b40 x26: ffff80001127de88 [ 28.420089] x25: 0000000000000000 x24: ffff000106119760 [ 28.425452] x23: ffff00010775dd60 x22: ffff00010567e000 [ 28.430814] x21: 0000000000000000 x20: ffff80001391bcb0 [ 28.436175] x19: ffff00010775deb8 x18: 00000000000000c0 [ 28.441537] x17: 0000000000000000 x16: 000000008d9b0e88 [ 28.446898] x15: 0000000000000001 x14: 00000000000002ba [ 28.452261] x13: 80a3002c00000002 x12: 00000000000005f4 [ 28.457622] x11: 0000000000000030 x10: 000000000000000c [ 28.462985] x9 : 000000000000000c x8 : 0000000000000030 [ 28.468346] x7 : ffff800014400000 x6 : ffff000106119758 [ 28.473708] x5 : 0000000000000003 x4 : ffff00010775dc60 [ 28.479068] x3 : 0000000000000000 x2 : 0000000000000060 [ 28.484429] x1 : 000071775f776600 x0 : ffff00010775deb8 [ 28.489791] Call trace: [ 28.492259] get_work_pool+0x48/0x60 [ 28.495874] cancel_delayed_work+0x38/0xb0 [ 28.500011] prestera_port_handle_event+0x90/0xa0 [prestera] [ 28.505743] prestera_evt_recv+0x98/0xe0 [prestera] [ 28.510683] prestera_fw_evt_work_fn+0x180/0x228 [prestera_pci] [ 28.516660] process_one_work+0x1e8/0x360 [ 28.520710] worker_thread+0x44/0x480 [ 28.524412] kthread+0x154/0x160 [ 28.527670] ret_from_fork+0x10/0x38 [ 28.531290] Code: a8c17bfd d50323bf d65f03c0 9278dc21 (f9400020) [ 28.537429] ---[ end trace 5eced933df3a080b ]---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-78fm-rcjq-jr27
Client / Server PCs with the HP Smart Universal Printing Driver installed are potentially vulnerable to Remote Code Execution and/or Elevation of Privilege. A client using the HP Smart Universal Printing Driver that sends a print job comprised of a malicious XPS file could potentially lead to Remote Code Execution and/or Elevation of Privilege on the PC.
[]
CVE-2014-1520
maintenservice_installer.exe in the Maintenance Service Installer in Mozilla Firefox before 29.0 and Firefox ESR 24.x before 24.5 on Windows allows local users to gain privileges by placing a Trojan horse DLL file into a temporary directory at an unspecified point in the update process.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" ]
GHSA-p7hc-j45p-4mhv
Integer signedness error in IOBluetoothFamily in the Bluetooth implementation in Apple OS X before 10.10 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (write to kernel memory) via a crafted app.
[]
CVE-2022-32000
Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/?page=service_transactions/manage_service_transaction&id=.
[ "cpe:2.3:a:badminton_center_management_system_project:badminton_center_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2012-4071
Cross-site scripting (XSS) vulnerability in the comments module in the RSGallery2 (com_rsgallery2) component before 2.3.0 for Joomla! 1.5.x, and before 3.2.0 for Joomla! 2.5.x, allows remote attackers to inject arbitrary web script or HTML via crafted BBCode markup in a comment.
[ "cpe:2.3:a:rsgallery2:com_rsgallery2:*:*:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.9.0-4:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.9.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.9.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.8:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.9:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.11:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.13:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.10.14:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.8:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.11.11:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.12.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.12.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.12.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.13.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.13.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.14.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:1.14.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:2.1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.15:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.25:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.5.26:*:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:rsgallery2:com_rsgallery2:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*" ]
CVE-2020-14306
An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[ "cpe:2.3:a:istio-operator_project:istio-operator:*:*:*:*:*:*:*:*" ]
GHSA-f62v-g6wp-2qc2
OpenGL in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2015-7064.
[]