Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2024-45282
HTTP Verb Tampering in SAP S/4 HANA(Manage Bank Statements)
Fields which are in 'read only' state in Bank Statement Draft in Manage Bank Statements application, could be modified by MERGE method. The property of an OData entity representing assumably immutable method is not protected against external modifications leading to integrity violations. Confidentiality and Availability are not impacted.
[ "cpe:2.3:a:sap:s\\/4_hana:102:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:103:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:104:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:105:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:106:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4_hana:107:*:*:*:*:*:*:*" ]
CVE-2022-38223
There is an out-of-bounds write in checkType located in etc.c in w3m 0.5.3. It can be triggered by sending a crafted HTML file to the w3m binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.
[ "cpe:2.3:a:tats:w3m:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
CVE-2013-1570
Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote attackers to affect availability via unknown vectors related to MemCached.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*" ]
CVE-2009-0090
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, and 2.0 SP1 does not properly validate .NET verifiable code, which allows remote attackers to obtain unintended access to stack memory, and execute arbitrary code, via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Pointer Verification Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
CVE-2010-5279
article.php in Virtual War (aka VWar) 1.6.1 R2 allows remote attackers to cause a denial of service (memory consumption) via a large integer in the ratearticleselect parameter.
[ "cpe:2.3:a:vwar:virtual_war:1.6.1:r2:*:*:*:*:*:*" ]
CVE-2016-6655
An issue was discovered in Cloud Foundry Foundation Cloud Foundry release versions prior to v245 and cf-mysql-release versions prior to v31. A command injection vulnerability was discovered in a common script used by many Cloud Foundry components. A malicious user may exploit numerous vectors to execute arbitrary commands on servers running Cloud Foundry.
[ "cpe:2.3:a:cloudfoundry:cf-mysql-release:*:*:*:*:*:*:*:*", "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*" ]
CVE-2024-11284
WP JobHunt <= 7.1 - Unauthenticated Privilege Escalation via Password Reset/Account Takeover
The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.9. This is due to the plugin not properly validating a user's identity prior to updating their password through the account_settings_save_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
[]
CVE-2007-1175
Cross-site scripting (XSS) vulnerability in an admin feature in WebAPP before 20070209 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:web-app.org:webapp:*:*:*:*:*:*:*:*" ]
GHSA-8jg6-w2pj-fc33
An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message "mbuf exceed" -- an indication of memory buffer exhaustion -- due to the receipt of crafted HTTP traffic. Each crafted HTTP packet inspected by UTM consumes mbufs which can be identified through the following log messages: all_logs.0:Jun 8 03:25:03 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 50%. all_logs.0:Jun 8 03:25:13 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 51%. all_logs.0:Jun 8 03:25:24 srx1 node0.fpc4 : SPU3 jmpi mbuf stall 52%. ... Eventually the system runs out of mbufs and the system crashes (fails over) with the error "mbuf exceed". This issue only occurs when HTTP AV inspection is configured. Devices configured for Web Filtering alone are unaffected by this issue. Affected releases are Junos OS on SRX Series: 12.1X46 versions prior to 12.1X46-D81; 12.3X48 versions prior to 12.3X48-D77; 15.1X49 versions prior to 15.1X49-D101, 15.1X49-D110.
[]
CVE-2007-6485
Multiple PHP remote file inclusion vulnerabilities in Centreon 1.4.1 (aka Oreon 1.4) allow remote attackers to execute arbitrary PHP code via a URL in the fileOreonConf parameter to (1) MakeXML.php or (2) MakeXML4statusCounter.php in include/monitoring/engine/.
[ "cpe:2.3:a:centreon:centreon:1.4.1:*:*:*:*:*:*:*" ]
GHSA-prjh-j2wm-cr5p
Multiple cross-site scripting (XSS) vulnerabilities in Xtreme ASP Photo Gallery 1.05 and earlier, and possibly 2.0 (trial), allow remote attackers to inject arbitrary web script or HTML via the (1) catname and (2) total parameters in (a) displaypic.asp, and the (3) catname parameter in (b) displaythumbs.asp.
[]
GHSA-mfxm-ch85-27q4
Unspecified vulnerability in the JavaVM component in Oracle Database 10.2.0.4, 11.1.0.7, and 11.2.0.1.0 allows remote authenticated users to affect integrity via unknown vectors.
[]
CVE-2014-0779
The PLC driver in ServerMain.exe in the Kepware KepServerEX 4 component in Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R2 build 71.4165, 2010 R2.1 build 71.4325, 2010 R3 build 72.4560, 2010 R3.1 build 72.4644, 2013 R1 build 73.4729, 2013 R1.1 build 73.4832, 2013 R1.1a build 73.4903, 2013 R1.2 build 73.4955, and 2013 R2 build 74.5094 allows remote attackers to cause a denial of service (application crash) via a crafted OPF file (aka project file).
[ "cpe:2.3:a:aveva:clearscada:2010:r2:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2010:r2.1:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2010:r3:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2010:r3.1:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2013:r1:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2013:r1.1:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2013:r1.1a:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2013:r1.2:*:*:*:*:*:*", "cpe:2.3:a:aveva:clearscada:2013:r2:*:*:*:*:*:*" ]
GHSA-vh6q-mgp6-79wr
In the Linux kernel, the following vulnerability has been resolved:wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabledWhen QoS is disabled, the queue priority value will not map to the correct ieee80211 queue since there is only one queue. Stop/wake queue 0 when QoS is disabled to prevent trying to stop/wake a non-existent queue and failing to stop/wake the actual queue instantiated.Log of issue before change (with kernel parameter qos=0): [ +5.112651] ------------[ cut here ]------------ [ +0.000005] WARNING: CPU: 7 PID: 25513 at net/mac80211/util.c:449 __ieee80211_wake_queue+0xd5/0x180 [mac80211] [ +0.000067] Modules linked in: b43(O) snd_seq_dummy snd_hrtimer snd_seq snd_seq_device nft_chain_nat xt_MASQUERADE nf_nat xfrm_user xfrm_algo xt_addrtype overlay ccm af_packet amdgpu snd_hda_codec_cirrus snd_hda_codec_generic ledtrig_audio drm_exec amdxcp gpu_sched xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_rpfilter ipt_rpfilter xt_pkttype xt_LOG nf_log_syslog xt_tcpudp nft_compat nf_tables nfnetlink sch_fq_codel btusb uinput iTCO_wdt ctr btrtl intel_pmc_bxt i915 intel_rapl_msr mei_hdcp mei_pxp joydev at24 watchdog btintel atkbd libps2 serio radeon btbcm vivaldi_fmap btmtk intel_rapl_common snd_hda_codec_hdmi bluetooth uvcvideo nls_iso8859_1 applesmc nls_cp437 x86_pkg_temp_thermal snd_hda_intel intel_powerclamp vfat videobuf2_vmalloc coretemp fat snd_intel_dspcfg crc32_pclmul uvc polyval_clmulni snd_intel_sdw_acpi loop videobuf2_memops snd_hda_codec tun drm_suballoc_helper polyval_generic drm_ttm_helper drm_buddy tap ecdh_generic videobuf2_v4l2 gf128mul macvlan ttm ghash_clmulni_intel ecc tg3 [ +0.000044] videodev bridge snd_hda_core rapl crc16 drm_display_helper cec mousedev snd_hwdep evdev intel_cstate bcm5974 hid_appleir videobuf2_common stp mac_hid libphy snd_pcm drm_kms_helper acpi_als mei_me intel_uncore llc mc snd_timer intel_gtt industrialio_triggered_buffer apple_mfi_fastcharge i2c_i801 mei snd lpc_ich agpgart ptp i2c_smbus thunderbolt apple_gmux i2c_algo_bit kfifo_buf video industrialio soundcore pps_core wmi tiny_power_button sbs sbshc button ac cordic bcma mac80211 cfg80211 ssb rfkill libarc4 kvm_intel kvm drm irqbypass fuse backlight firmware_class efi_pstore configfs efivarfs dmi_sysfs ip_tables x_tables autofs4 dm_crypt cbc encrypted_keys trusted asn1_encoder tee tpm rng_core input_leds hid_apple led_class hid_generic usbhid hid sd_mod t10_pi crc64_rocksoft crc64 crc_t10dif crct10dif_generic ahci libahci libata uhci_hcd ehci_pci ehci_hcd crct10dif_pclmul crct10dif_common sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel usbcore scsi_mod libaes crypto_simd cryptd scsi_common [ +0.000055] usb_common rtc_cmos btrfs blake2b_generic libcrc32c crc32c_generic crc32c_intel xor raid6_pq dm_snapshot dm_bufio dm_mod dax [last unloaded: b43(O)] [ +0.000009] CPU: 7 PID: 25513 Comm: irq/17-b43 Tainted: G W O 6.6.7 #1-NixOS [ +0.000003] Hardware name: Apple Inc. MacBookPro8,3/Mac-942459F5819B171B, BIOS 87.0.0.0.0 06/13/2019 [ +0.000001] RIP: 0010:__ieee80211_wake_queue+0xd5/0x180 [mac80211] [ +0.000046] Code: 00 45 85 e4 0f 85 9b 00 00 00 48 8d bd 40 09 00 00 f0 48 0f ba ad 48 09 00 00 00 72 0f 5b 5d 41 5c 41 5d 41 5e e9 cb 6d 3c d0 <0f> 0b 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc 48 8d b4 16 94 00 00 [ +0.000002] RSP: 0018:ffffc90003c77d60 EFLAGS: 00010097 [ +0.000001] RAX: 0000000000000001 RBX: 0000000000000002 RCX: 0000000000000000 [ +0.000001] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff88820b924900 [ +0.000002] RBP: ffff88820b924900 R08: ffffc90003c77d90 R09: 000000000003bfd0 [ +0.000001] R10: ffff88820b924900 R11: ffffc90003c77c68 R12: 0000000000000000 [ +0.000001] R13: 0000000000000000 R14: ffffc90003c77d90 R15: ffffffffc0fa6f40 [ +0.000001] FS: 0000000000000000(0000) GS:ffff88846fb80000(0000) knlGS:0000000000000000 [ +0.000001] CS: 0010 DS: 0 ---truncated---
[]
CVE-2007-2570
PHP remote file inclusion vulnerability in handlers/page/show.php in Wikivi5 allows remote attackers to execute arbitrary PHP code via a URL in the sous_rep parameter.
[ "cpe:2.3:a:guilain_omont:wikivi5:*:*:*:*:*:*:*:*" ]
GHSA-rf27-g3g9-2jmf
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
CVE-2017-9150
The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2022-42946
Parsing a maliciously crafted X_B and PRT file can force Autodesk Maya 2023 and 2022 to read beyond allocated buffer. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
[ "cpe:2.3:a:autodesk:maya:2023:*:*:*:*:*:*:*" ]
CVE-2019-2684
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
[ "cpe:2.3:a:oracle:jdk:1.7.0:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update202:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update202:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:12:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*" ]
CVE-2016-4089
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
GHSA-wcqw-fr5w-xxr6
PHP remote file inclusion vulnerability in head.php in CityWriter 0.9.7 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter.
[]
GHSA-cpqm-9j8g-qcfc
Cross-site scripting (XSS) vulnerability in the web management interface in Adobe LiveCycle Workflow 6.2 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
[]
CVE-2021-37637
Null pointer dereference in `CompressElement` in TensorFlow
TensorFlow is an end-to-end open source platform for machine learning. It is possible to trigger a null pointer dereference in TensorFlow by passing an invalid input to `tf.raw_ops.CompressElement`. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/data/compression_utils.cc#L34) was accessing the size of a buffer obtained from the return of a separate function call before validating that said buffer is valid. We have patched the issue in GitHub commit 5dc7f6981fdaf74c8c5be41f393df705841fb7c5. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*" ]
GHSA-5rrc-5c48-rjcr
BEA WebLogic Server 6.1, 7.0 and 7.0.0.1, when routing messages to a JMS target domain that is inaccessible, may leak the user's password when it throws a ResourceAllocationException.
[]
CVE-2018-6585
SQL Injection exists in the JTicketing 2.0.16 component for Joomla! via a view=events action with a filter_creator or filter_events_cat parameter.
[ "cpe:2.3:a:techjoomla:jticketing:2.0.16:*:*:*:*:joomla\\!:*:*" ]
GHSA-w653-2g89-6682
A buffer overflow vulnerability exists in the confsrv ucloud_set_node_location functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
[]
CVE-2010-1021
Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:mads_brunn:t3quixplorer:*:*:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
CVE-2006-0653
Multiple SQL injection vulnerabilities in Hinton Design phpht Topsites 1.3 allow remote attackers to execute arbitrary SQL commands via multiple vectors including the username parameter.
[ "cpe:2.3:a:hinton_design:phpht_topsites:1.3:*:*:*:*:*:*:*" ]
CVE-2020-36366
Stack overflow vulnerability in parse_value Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
[ "cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*" ]
CVE-2023-22834
The contour service was not checking that users had permission to create an analysis for a given dataset
The Contour Service was not checking that users had permission to create an analysis for a given dataset. This could allow an attacker to clutter up Compass folders with extraneous analyses, that the attacker would otherwise not have permission to create.
[ "cpe:2.3:a:palantir:contour:*:*:*:*:*:*:*:*" ]
GHSA-gpqm-7gpf-39qf
Dell EMC ScaleIO, versions prior to 2.5, do not properly handle some packet data in the MDM service. As a result, a remote attacker could potentially send specifically crafted packet data to the MDM service causing it to crash.
[]
CVE-2024-27612
Numbas editor before 7.3 mishandles editing of themes and extensions.
[]
CVE-2017-14402
The EyesOfNetwork web interface (aka eonweb) 5.1-0 has SQL injection via the user_name parameter to module/admin_user/add_modify_user.php in the "ACCOUNT CREATION" section, related to lack of input validation in include/function.php.
[ "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.1-0:*:*:*:*:*:*:*" ]
GHSA-hg42-ggpx-469x
Directory traversal vulnerability in Oxide WebServer allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in an HTTP request.
[]
GHSA-2fc8-wj99-h595
Open Redirect vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation.
[]
CVE-2021-44854
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The REST API publicly caches results from private wikis.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.37.0:-:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.37.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.37.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.37.0:rc2:*:*:*:*:*:*" ]
CVE-2010-3301
The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" ]
GHSA-38fh-5rpq-pxq2
Buffer over-read can happen while parsing received SDP values due to lack of NULL termination check on SDP in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[]
CVE-2018-6846
Z-BlogPHP 1.5.1 allows remote attackers to discover the full path via a direct request to zb_system/function/lib/upload.php.
[ "cpe:2.3:a:zblogcn:z-blogphp:1.5.1:*:*:*:*:*:*:*" ]
GHSA-69q7-hww4-8pjq
phpBB allows CSRF
phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships.
[]
CVE-2023-26588
Use of hard-coded credentials vulnerability in Buffalo network devices allows an attacker to access the debug function of the product. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier
[ "cpe:2.3:o:buffalo:bs-gsl2024_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2024:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2016p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2016p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2008_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2024_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2024:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2048_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2048:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2008p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2008p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2016p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2016p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2024p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2024p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2005_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2005:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2008_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2005p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2005p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gsl2008p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gsl2008p:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2016hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2016hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:buffalo:bs-gs2024hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:buffalo:bs-gs2024hp:-:*:*:*:*:*:*:*" ]
CVE-2018-4846
A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). A factory account with hardcoded password might allow attackers access to the device over port 5900/tcp. Successful exploitation requires no user interaction or privileges and impacts the confidentiality, integrity, and availability of the affected device. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.
[ "cpe:2.3:o:siemens:rapidpoint_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:rapidpoint_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:rapidlab_1200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:rapidlab_1200:-:*:*:*:*:*:*:*" ]
GHSA-q2m2-q2fg-fgwh
WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.
[]
CVE-2001-1525
Directory traversal vulnerability in the comments action in easyNews 1.5 and earlier allows remote attackers to modify news.dat, template.dat and possibly other files via a ".." in the cid parameter.
[ "cpe:2.3:a:easyscripts:easynews:1.5:*:*:*:*:*:*:*" ]
GHSA-3j27-47wq-ghmh
In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389074; Issue ID: MSV-1803.
[]
GHSA-x932-88vq-xg5c
nslcd/pam.c in the nss-pam-ldapd 0.8.0 PAM module returns a success code when a user is not found in LDAP, which allows remote attackers to bypass authentication.
[]
GHSA-vgpg-jv9c-rhh6
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to obtain sensitive information via the OWA_UTIL stored procedures (1) OWA_UTIL.signature, (2) OWA_UTIL.listprint, or (3) OWA_UTIL.show_query_columns.
[]
CVE-2019-6237
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
GHSA-rvqr-jw83-fp2r
A vulnerability was found in SourceCodester E-Commerce System 1.0. It has been classified as critical. Affected is an unknown function of the file /ecommerce/admin/products/controller.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2021-20288
An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[ "cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
GHSA-58mf-39rm-33p8
In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.
[]
CVE-2009-4361
Multiple buffer overflows in qoslist in IBM AIX 6.1 allow local users to cause a denial of service (application crash) or possibly gain privileges via a long string argument. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*" ]
GHSA-pgfj-6vh7-8ffh
Unspecified vulnerability in the BIOS F.04 through F.11 for the HP Compaq Business Notebook PC allows local users to cause a denial of service via unspecified vectors.
[]
CVE-2024-6276
lahirudanushka School Management System Teacher Page teacher.php sql injection
A vulnerability, which was classified as critical, has been found in lahirudanushka School Management System 1.0.0/1.0.1. This issue affects some unknown processing of the file teacher.php of the component Teacher Page. The manipulation of the argument update leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269489 was assigned to this vulnerability.
[ "cpe:2.3:a:lahirudanushka:school_management_system:1.0.1:*:*:*:*:*:*:*" ]
GHSA-66rv-hwf5-7jr5
Cross-site scripting (XSS) vulnerability in the wptexturize function in WordPress before 3.7.5, 3.8.x before 3.8.5, and 3.9.x before 3.9.3 allows remote attackers to inject arbitrary web script or HTML via crafted use of shortcode brackets in a text field, as demonstrated by a comment or a post.
[]
CVE-2017-14258
In the SDK in Bento4 1.5.0-616, SetItemCount in Core/Ap4StscAtom.h file contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.
[ "cpe:2.3:a:bento4:bento4:1.5.0-616:*:*:*:*:*:*:*" ]
GHSA-hq64-qw75-h6q8
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus allows Stored XSS.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005.
[]
CVE-2025-39417
WordPress Redirect wordpress to welcome or landing page plugin <= 2.0 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Eslam Mahmoud Redirect wordpress to welcome or landing page allows Stored XSS. This issue affects Redirect wordpress to welcome or landing page: from n/a through 2.0.
[]
CVE-2023-41257
A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:12.1.3.15356:*:*:*:*:*:*:*" ]
CVE-2023-36679
WordPress Spectra plugin <= 2.6.6 - Server Side Request Forgery (SSRF) vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Brainstorm Force Spectra.This issue affects Spectra: from n/a through 2.6.6.
[]
CVE-2022-37015
Symantec Endpoint Detection and Response (SEDR) Appliance, prior to 4.7.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
[ "cpe:2.3:a:symantec:endpoint_detection_and_response:*:*:*:*:*:*:*:*" ]
CVE-2017-5835
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
[ "cpe:2.3:a:libimobiledevice:libplist:*:*:*:*:*:*:*:*" ]
CVE-2010-2787
api.php in MediaWiki before 1.15.5 does not prevent use of public caching headers for private data, which allows remote attackers to bypass intended access restrictions and obtain sensitive information by retrieving documents from an HTTP proxy cache that has been used by a victim.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4:beta4:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4:beta5:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4:beta6:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:beta3:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:beta4:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:rc3:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5:rc4:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.15.3:*:*:*:*:*:*:*" ]
CVE-2021-38459
AUVESY Versiondog
The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.
[ "cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:*" ]
GHSA-353f-x9x4-qj59
mirror 2.8.x in Linux systems allows remote attackers to create files one level above the local target directory.
[]
CVE-2009-1031
Directory traversal vulnerability in the FTP server in Rhino Software Serv-U File Server 7.0.0.1 through 7.4.0.1 allows remote attackers to create arbitrary directories via a \.. (backslash dot dot) in an MKD request.
[ "cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.1:*:*:*:*:*:*:*" ]
GHSA-6gg7-q37j-4gwp
A vulnerability was found in drogatkin TJWS2. It has been declared as critical. Affected by this vulnerability is the function deployWar of the file 1.x/src/rogatkin/web/WarRoller.java. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 1bac15c496ec54efe21ad7fab4e17633778582fc. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216187.
[]
CVE-2019-10058
Various Lexmark products have Incorrect Access Control.
[ "cpe:2.3:o:lexmark:cs31x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs31x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs41x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs41x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms310:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms312_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms312:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms317_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms317:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m1140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1140:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms315_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms315:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms417_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms417:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms51x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms51x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms610dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms610dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms617_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms617:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m1145_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1145:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m3150dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3150dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms71x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms71x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5163dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms810_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms811_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms812_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms817_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms818_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms810de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5155_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5163_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms812de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5170_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms91x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms91x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx31x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx31x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm1135_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1135:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx510:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx511:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx611_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm3150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx71x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx71x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx81x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx81x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm51xx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm51xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm71xx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm71xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx91x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx91x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm91x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm91x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx6500e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c746_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c748_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs748_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c792_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs796_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c925_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x548_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs548_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x74x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x74x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs748_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x792_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs79x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs79x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x925_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs925_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x95x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x95x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs95x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs95x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:6500e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c734_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c736_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e46x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e46x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t65x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t65x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x46x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x65x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x65x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x73x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x73x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:w850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x86x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x86x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs51x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs51x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms610de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms610de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m3150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3150:-:*:*:*:*:*:*:*" ]
GHSA-hfvg-qx3h-rpgq
Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method.
[]
GHSA-hq28-vq28-wfpf
Multiple PHP remote file inclusion vulnerabilities in Basic Analysis and Security Engine (BASE) 1.4.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) BASE_path parameter to base_ag_main.php, (2) base_db_setup.php, (3) base_graph_common.php, (4) base_graph_display.php, (5) base_graph_form.php, (6) base_graph_main.php, (7) base_local_rules.php, (8) base_logout.php, (9) base_main.php, (10) base_maintenance.php, (11) base_payload.php, (12) base_qry_alert.php, (13) base_qry_common.php, (14) base_qry_main.php, (15) base_stat_alerts.php, (16) base_stat_class.php, (17) base_stat_common.php, (18) base_stat_ipaddr.php, (19) base_stat_iplink.php, (20) base_stat_ports.php, (21) base_stat_sensor.php, (22) base_stat_time.php, (23) base_stat_uaddr.php, (24) base_user.php, (25) index.php, (26) admin/base_roleadmin.php, (27) admin/base_useradmin.php, (28) admin/index.php, (29) help/base_setup_help.php, (30) includes/base_action.inc.php, (31) includes/base_cache.inc.php, (32) includes/base_db.inc.php, (33) includes/base_db.inc.php, (34) includes/base_include.inc.php, (35) includes/base_output_html.inc.php, (36) includes/base_output_query.inc.php, (37) includes/base_state_criteria.inc.php, (38) includes/base_state_query.inc.php or (39) setup/base_conf_contents.php; (40) GLOBALS[user_session_path] parameter to includes/base_state_common.inc.php; (41) BASE_Language parameter to setup/base_conf_contents.php; or (42) ado_inc_php parameter to setup/setup2.php.
[]
GHSA-rgfm-p43r-5rx5
Cross Site Scripting (XSS) exists in Tiki before 12.13, 15.6, 17.2, and 18.1.
[]
CVE-2011-0403
Untrusted search path vulnerability in ImgBurn.exe in ImgBurn 2.4.0.0, 2.5.4.0, and other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a CUE file.
[ "cpe:2.3:a:imgburn:imgburn:1.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:1.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:1.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:imgburn:imgburn:2.5.4.0:*:*:*:*:*:*:*" ]
GHSA-m8xh-2cm5-qm87
A vulnerability, which was classified as problematic, was found in GZ Scripts PHP GZ Hotel Booking Script 1.8. This affects an unknown part of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233355. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2024-53028
Time-of-check Time-of-use (TOCTOU) Race Condition in Automotive Vehicle Networks
Memory corruption may occur while processing message from frontend during allocation.
[]
GHSA-6839-rv39-32jh
A vulnerability classified as problematic has been found in TRENDnet TEW-637AP and TEW-638APB 1.2.7/1.3.0.106. This affects the function sub_41DED0 of the file /bin/goahead of the component HTTP Request Handler. The manipulation leads to null pointer dereference. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2022-31781
Regular Expression Denial of Service (ReDoS) in ContentType.java. (GHSL-2022-022)
Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular expression used on the parameter of the org.apache.tapestry5.http.ContentType class. Apache Tapestry 5.8.2 has a fix for this vulnerability. Notice the vulnerability cannot be triggered by web requests in Tapestry code alone. It would only happen if there's some non-Tapestry codepath passing some outside input to the ContentType class constructor.
[ "cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*" ]
CVE-2020-0783
An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0781.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-gf44-5pfx-c922
The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
[]
CVE-2020-10462
Reflected XSS in admin/edit-field.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
CVE-2002-1113
summary_graph_functions.php in Mantis 0.17.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the g_jpgraph_path parameter to reference the location of the PHP code.
[ "cpe:2.3:a:mantis:mantis:0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.9:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.10:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.11:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.12:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.3:*:*:*:*:*:*:*" ]
CVE-2016-7271
The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
GHSA-vwrp-g292-cvrv
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
[]
CVE-2018-1999039
A server-side request forgery vulnerability exists in Jenkins Confluence Publisher Plugin 2.0.1 and earlier in ConfluenceSite.java that allows attackers to have Jenkins submit login requests to an attacker-specified Confluence server URL with attacker specified credentials.
[ "cpe:2.3:a:jenkins:confluence_publisher:*:*:*:*:*:jenkins:*:*" ]
GHSA-hwmj-vfcw-cjqf
A vulnerability was found in SourceCodester Online Internship Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/login.php of the component POST Parameter Handler. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228770 is the identifier assigned to this vulnerability.
[]
GHSA-cm63-5mv5-74rv
IBM API Connect 5.0.0.0-5.0.8.3 Developer Portal does not enforce Two Factor Authentication (TFA) while resetting a user password but enforces it for all other login scenarios. IBM X-Force ID: 144483.
[]
GHSA-fhmf-3rjf-jmj7
POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'level' parameter value in the view log (log.php) because proper filtration is omitted.
[]
CVE-2012-4570
SQL injection vulnerability in LetoDMS_Core/Core/inc.ClassDMS.php in LetoDMS (formerly MyDMS) before 3.3.8 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:letodms_project:letodms:*:*:*:*:*:*:*:*" ]
GHSA-28pf-wwvx-8jx3
IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x before 7.0.0.2 CF27, and 8.0.0.x before 8.0.0.1 CF10, when the wcm.path.traversal.security setting is enabled, allows remote attackers to bypass intended read restrictions on an item by accessing that item within search results.
[]
GHSA-c4p7-3xph-5f74
The 1 Decembrie 1918 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.dec.2012. This is due to missing or incorrect nonce validation on the 1-decembrie-1918/1-decembrie-1918.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-5jm3-4wj9-623c
Microsoft Word and Excel allow remote attackers to steal sensitive information via certain field codes that insert the information when the document is returned to the attacker, as demonstrated in Word using (1) INCLUDETEXT or (2) INCLUDEPICTURE, aka "Flaw in Word Fields and Excel External Updates Could Lead to Information Disclosure."
[]
GHSA-6rjf-7wv7-gjwv
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The wguest account could execute commands by injecting into PostgreSQL trigger functions. This allowed privilege escalation from the wguest user to the postgres user.
[]
CVE-2022-0424
Popup by Supsystic < 1.10.9 - Unauthenticated Subscriber Email Addresses Disclosure
The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users
[ "cpe:2.3:a:supsystic:popup:*:*:*:*:*:wordpress:*:*" ]
CVE-2025-2303
Block Logic <= 1.0.8 - Authenticated (Contributor+) Remote Code Execution
The Block Logic – Full Gutenberg Block Display Control plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.8 via the block_logic_check_logic function. This is due to the unsafe evaluation of user-controlled input. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
[]
GHSA-xw28-c23x-fjj4
A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.
[]
CVE-2024-32580
WordPress Master Slider plugin <= 3.9.8 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Averta Master Slider allows Stored XSS.This issue affects Master Slider: from n/a through 3.9.8.
[]
CVE-2024-53717
WordPress yPHPlista plugin <= 1.1.1 - CSRF to Stored Cross Site Scripting (XSS) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Yonatan Reinberg yPHPlista allows Stored XSS.This issue affects yPHPlista: from n/a through 1.1.1.
[]
GHSA-r2vw-jgq9-jqx2
Improper Authorization in @sap-cloud-sdk/core
Affected versions of `@sap-cloud-sdk/core` do not properly validate JWTs. The `verifyJwt()` function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT.RecommendationUpgrade to version 1.21.2 or later.
[]
CVE-2016-9052
An exploitable stack-based buffer overflow vulnerability exists in the querying functionality of Aerospike Database Server 3.10.0.3. A specially crafted packet can cause a stack-based buffer overflow in the function as_sindex__simatch_by_iname resulting in remote code execution. An attacker can simply connect to the port to trigger this vulnerability.
[ "cpe:2.3:a:aerospike:database_server:3.10.0.3:*:*:*:*:*:*:*" ]
GHSA-pwvv-p7vx-5wpp
SolarView Compact v6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Solar_AiConf.php.
[]
CVE-2011-4499
The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware before 4.30.5, WRT54GS v1 through v3 with firmware before 4.71.1, and WRT54GS v4 with firmware before 1.06.1 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability.
[ "cpe:2.3:a:cisco:linksys_wrt54g_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:linksys_wrt54g_router_firmware:3.03.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:linksys_wrt54g_router_firmware:4.20.7:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54g:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54g:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:linksys_wrt54gs_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:linksys_wrt54gs_router_firmware:2.09.1:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54gs:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54gs:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54gs:3.0:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54gs:4.0:*:*:*:*:*:*:*" ]