id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2015-0544 | EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value. | [
"cpe:2.3:a:emc:secure_remote_services:3.02:*:*:*:virtual:*:*:*",
"cpe:2.3:a:emc:secure_remote_services:3.03:*:*:*:virtual:*:*:*",
"cpe:2.3:a:emc:secure_remote_services:3.04:*:*:*:virtual:*:*:*"
] |
|
CVE-2020-1186 | An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1131, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191. | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-99v2-4jx9-8fv3 | Microsoft Dataverse Remote Code Execution Vulnerability | [] |
|
CVE-2003-0663 | Unknown vulnerability in the Local Security Authority Subsystem Service (LSASS) in Windows 2000 domain controllers allows remote attackers to cause a denial of service via a crafted LDAP message. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-5106 | A Code Execution vulnerability exists in select.py when using python-mode 2012-12-19. | [
"cpe:2.3:a:python-mode_project:python-mode:2012-12-19:*:*:*:*:*:*:*"
] |
|
CVE-2017-7298 | In Moodle 3.2.2+, there is XSS in the Course summary filter of the "Add a new course" page, as demonstrated by a crafted attribute of an SVG element. | [
"cpe:2.3:a:moodle:moodle:3.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2008-5557 | Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions. | [
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*"
] |
|
CVE-2022-20388 | Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323 | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-rx6g-pr26-7gxj | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A maliciously crafted email may be able to initiate FaceTime calls without user authorization. | [] |
|
CVE-2024-22294 | WordPress Download IP2Location Country Blocker Plugin <= 2.33.3 is vulnerable to Sensitive Data Exposure | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in IP2Location IP2Location Country Blocker.This issue affects IP2Location Country Blocker: from n/a through 2.33.3.
| [
"cpe:2.3:a:ip2location:country_blocker:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-2257 | Password Policy Bypass Vulnerability in Digisol Router | This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.
Successful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats. | [
"cpe:2.3:o:digisol:dg-gr1321_firmware:3.2.02:*:*:*:*:*:*:*"
] |
GHSA-fff2-pwcg-x73m | Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium) | [] |
|
GHSA-p4f6-prp8-fmgf | Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API, in conjunction with a manipulation involving a '$' (dollar sign) or '(' (open parenthesis) character. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671. | [] |
|
GHSA-6jfv-28cj-8jrr | mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. | [] |
|
GHSA-wwcm-7c7v-g9q6 | An issue was discovered on the PLANEX CS-QR20 1.30. A hardcoded account / password ("admin:password") is used in the Android application that allows attackers to use a hidden API URL "/goform/SystemCommand" to execute any command with root permission. | [] |
|
GHSA-9h2c-gmfr-3w4c | A vulnerability was found in Campcodes Online Shopping Portal 1.0. It has been classified as critical. This affects an unknown part of the file /admin/edit-subcategory.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2014-5213 | nds/files/opt/novell/eDirectory/lib64/ndsimon/public/images in iMonitor in Novell eDirectory before 8.8 SP8 Patch 4 allows remote authenticated users to obtain sensitive information from process memory via a direct request. | [
"cpe:2.3:a:novell:edirectory:*:sp8:*:*:*:*:*:*"
] |
|
CVE-2010-0921 | Cross-site request forgery (CSRF) vulnerability in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.281 for Domino 8.0.2 FP4 allows remote attackers to hijack the authentication of unspecified victims via vectors related to lack of "XSS/CSRF Get Filter and Referer Check fixes." | [
"cpe:2.3:a:ibm:lotus_inotes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.011:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.021:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.031:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.041:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.051:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.061:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.101:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.111:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.131:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.141:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.151:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.161:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.171:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.181:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.191:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.201:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.211:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.221:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.231:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.241:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.251:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_inotes:229.261:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*"
] |
|
CVE-2014-0945 | Cross-site scripting (XSS) vulnerability in the RES Console in Rule Execution Server in IBM Operational Decision Manager 7.5 before FP3 IF37, 8.0 before MP1 FP2, and 8.5 before MP1 IF26 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:operational_decision_manager:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:operational_decision_manager:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:operational_decision_manager:8.5:*:*:*:*:*:*:*"
] |
|
CVE-2014-7845 | The generate_password function in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not provide a sufficient number of possible temporary passwords, which allows remote attackers to obtain access via a brute-force attack. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*"
] |
|
GHSA-x88q-cqfj-5v26 | IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could disclose sensitive information to an unauthorized user due to insufficient timeout functionality in the Web UI. IBM X-Force ID: 176334. | [] |
|
CVE-2017-16417 | An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is a part of the font parsing module. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*"
] |
|
GHSA-v5h9-4559-8f5h | Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. | [] |
|
GHSA-h6mp-42gx-78qp | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c. | [] |
|
CVE-2023-47064 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*"
] |
GHSA-f7rp-xx67-4pj9 | Phachon mm-wiki vulnerable to stored cross-site scripting (XSS) | Phachon mm-wiki v.0.1.2 vulnerable to stored cross-site scripting (XSS). This could allow a remote attacker to execute arbitrary code via JavaScript code in the markdown editor. Any user browsing the document containing XSS malicious code will trigger the vulnerability. | [] |
CVE-2020-16281 | The Kommbox component in Rangee GmbH RangeeOS 8.0.4 could allow a local authenticated attacker to escape from the restricted environment and execute arbitrary code due to unrestricted context menus being accessible. | [
"cpe:2.3:a:rangee:rangeeos:8.0.4:*:*:*:*:*:*:*"
] |
|
CVE-2025-27332 | WordPress Smart Maintenance & Countdown Plugin <= 1.2 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in gmnazmul Smart Maintenance & Countdown allows Stored XSS. This issue affects Smart Maintenance & Countdown: from n/a through 1.2. | [] |
CVE-2016-5318 | Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
] |
|
GHSA-px5w-6xv9-xcqp | The Asus ASUS_A002 Android device with a build fingerprint of asus/WW_ASUS_A002/ASUS_A002:7.0/NRD90M/14.1600.1805.51-20180626:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [] |
|
GHSA-7c6p-848j-wh5h | Composer code execution and possible privilege escalation via compromised InstalledVersions.php or installed.php | ImpactSeveral files within the local working directory are included during the invocation of Composer and in the context of the executing user.As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files.All Composer CLI commands are affected, including composer.phar's self-update.The following are of high risk:Composer being run with sudo.Pipelines which may execute Composer on untrusted projects.Shared environments with developers who run Composer individually on the same project.Patches2.7.0, 2.2.23WorkaroundsIt is advised that the patched versions are applied at the earliest convenience.Where not possible, the following should be addressed:Remove all sudo composer privileges for all users to mitigate root privilege escalation.Avoid running Composer within an untrusted directory, or if needed, verify that the contents of `vendor/composer/InstalledVersions.php` and `vendor/composer/installed.php` do not include untrusted code.A reset can also be done on these files by the following: | [] |
GHSA-qcc8-2v4m-qw7h | Untrusted search path vulnerability in the installer in Apple iTunes before 12.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory. | [] |
|
CVE-2019-12477 | Supra Smart Cloud TV allows remote file inclusion in the openLiveURL function, which allows a local attacker to broadcast fake video without any authentication via a /remote/media_control?action=setUri&uri= URI. | [
"cpe:2.3:o:supra:stv-lc40lt0020f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supra:stv-lc40lt0020f:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-5413 | httpd.tkd in Radia Integration Server in Hewlett-Packard (HP) OpenView Configuration Management (CM) Infrastructure 4.0 through 4.2i and Client Configuration Manager (CCM) 2.0 allows remote attackers to read arbitrary files via URLs containing tilde (~) references to home directories, as demonstrated by ~root. | [
"cpe:2.3:a:hp:openview_client_configuraton_manager:2.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.0:*:aix:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.0:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.0:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.1:*:aix:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.1:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2:*:aix:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2i:*:aix:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2i:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2i:*:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2i:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_configuration_management:4.2i:*:windows:*:*:*:*:*"
] |
|
CVE-2007-0061 | The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory." | [
"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
] |
|
CVE-2018-18880 | In firmware version MS_2.6.9900 of Columbia Weather MicroServer, a networkdiags.php reflected Cross-site scripting (XSS) vulnerability allows remote authenticated users to inject arbitrary web script. | [
"cpe:2.3:o:columbiaweather:weather_microserver_firmware:ms_2.6.9900:*:*:*:*:*:*:*",
"cpe:2.3:h:columbiaweather:weather_microserver:-:*:*:*:*:*:*:*"
] |
|
GHSA-mc64-v3mw-vq6w | Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability." | [] |
|
CVE-2016-0663 | Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to Performance Schema. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] |
|
GHSA-9c43-6hr9-gv5m | An issue was discovered in S-CMS v1.5. There is a SQL injection vulnerability in search.php via the keyword parameter. | [] |
|
GHSA-rx8q-xg7h-mqpc | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fyljp SpiderDisplay allows Reflected XSS. This issue affects SpiderDisplay: from n/a through 1.9.1. | [] |
|
GHSA-3f45-mmr7-7f4p | JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x. | [] |
|
CVE-2021-0673 | In Audio Aurisys HAL, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05977326; Issue ID: ALPS05977326. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] |
|
GHSA-9xhv-3vhq-92w6 | A stack-based buffer overflow vulnerability has been identified in Teledyne DALSA Sherlock Version 7.2.7.4 and prior, which may allow remote code execution. | [] |
|
GHSA-8v3r-gw3g-qx4m | An issue was discovered in TopManage OLK 2020. As there is no ReadOnly on the Session cookie, the user and admin accounts can be taken over in a DOM-Based XSS attack. | [] |
|
GHSA-cxmh-cjjc-hchp | The error checking routine used for the C_Verify call on a symmetric verification key in the nCipher PKCS#11 library 1.2.0 and later returns the CKR_OK status even when it detects an invalid signature, which could allow remote attackers to modify or forge messages. | [] |
|
GHSA-gxhq-965f-5wv4 | Unspecified vulnerability in Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by futura-sciences.com, seoptimise.com, and mitosyfraudes.org. | [] |
|
CVE-2008-4666 | SQL injection vulnerability in webboard.php in Ultimate Webboard 3.00 allows remote attackers to execute arbitrary SQL commands via the Category parameter. | [
"cpe:2.3:a:deeserver:ultimate_webboard:3.00:*:*:*:*:*:*:*"
] |
|
GHSA-2x28-c7j7-23gv | Subrion remote command execution vulnerability | Subrion 4.2.1 has a remote command execution vulnerability in the backend. | [] |
CVE-2020-4778 | IBM Curam Social Program Management 7.0.9 and 7.0.10 uses MD5 algorithm for hashing token in a single instance which less safe than default SHA-256 cryptographic algorithm used throughout the Cúram application. IBM X-Force ID: 189156. | [
"cpe:2.3:a:ibm:curam_social_program_management:7.0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:7.0.10.0:*:*:*:*:*:*:*"
] |
|
GHSA-698q-p785-rxxv | 3DSecure 2.0 allows XSS in its 3DSMethod Authentication via a modified params parameter in a /rest/online request with a /redirect?action=challenge&txn= substring. | [] |
|
CVE-2013-2653 | security/MemberLoginForm.php in SilverStripe 3.0.3 supports login using a GET request, which makes it easier for remote attackers to conduct phishing attacks without detection by the victim. | [
"cpe:2.3:a:silverstripe:silverstripe:3.0.3:*:*:*:*:*:*:*"
] |
|
CVE-2015-4648 | Stack-based buffer overflow in the Ipropsapi.ipropsapiCtrl.1 ActiveX control in ipropsapivideo in Panasonic Security API (PS-API) ActiveX SDK before 8.10.18 allows remote attackers to execute arbitrary code via a long string to the MulticastAddr method. | [
"cpe:2.3:a:panasonic:security_api_activex_sdk:*:*:*:*:*:*:*:*"
] |
|
GHSA-hw8c-33xc-vg7v | Cross-site scripting (XSS) vulnerability in skins/ace/popup-notopic.php in MindTouch OpenGarden DekiWiki before Gooseberry++ allows remote attackers to inject arbitrary web script or HTML via the message parameter. | [] |
|
CVE-2018-17476 | Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-829j-8cmx-37h4 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | [] |
|
CVE-2017-5553 | Cross-site scripting (XSS) vulnerability in plugins/markdown_plugin/_markdown.plugin.php in b2evolution before 6.8.5 allows remote authenticated users to inject arbitrary web script or HTML via a javascript: URL. | [
"cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*"
] |
|
CVE-2003-0242 | IPSec in Mac OS X before 10.2.6 does not properly handle certain incoming security policies that match by port, which could allow traffic that is not explicitly allowed by the policies. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-41199 | Due to lack of proper memory management, when a victim opens a manipulated Open Inventor File (.iv, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
| [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*"
] |
|
GHSA-vw72-3qh4-x2wh | Unspecified vulnerability in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to the "put bit buffer when num_saved_bits is reset." | [] |
|
GHSA-5752-wxxv-m9xh | In the Linux kernel, the following vulnerability has been resolved:bpf: Fix crash due to out of bounds access into reg2btf_ids.When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added
kfunc support, it defined reg2btf_ids as a cheap way to translate the verifier
reg type to the appropriate btf_vmlinux BTF ID, however
commit c25b2ae13603 ("bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL")
moved the __BPF_REG_TYPE_MAX from the last member of bpf_reg_type enum to after
the base register types, and defined other variants using type flag
composition. However, now, the direct usage of reg->type to index into
reg2btf_ids may no longer fall into __BPF_REG_TYPE_MAX range, and hence lead to
out of bounds access and kernel crash on dereference of bad pointer. | [] |
|
CVE-2008-5007 | create_lazarus_export_tgz.sh in lazarus 0.9.24 allows local users to overwrite or delete arbitrary files via a symlink attack on a (1) /tmp/lazarus.tgz temporary file or a (2) /tmp/lazarus temporary directory. | [
"cpe:2.3:a:lazarus:lazarus:0.9.24:*:*:*:*:*:*:*"
] |
|
GHSA-3fw2-3g64-5h2v | Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34728, CVE-2022-38006. | [] |
|
CVE-2024-54333 | WordPress Check Pincode For Woocommerce plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in silverplugins217 Check Pincode For Woocommerce allows Reflected XSS.This issue affects Check Pincode For Woocommerce: from n/a through 1.1. | [] |
CVE-2016-10954 | The Neosense theme before 1.8 for WordPress has qquploader unrestricted file upload. | [
"cpe:2.3:a:dynamicpress:neosense:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2021-29606 | Heap OOB read in TFLite | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of `Split_V`(https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the `SizeOfDimension` function(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/kernel_util.h#L148-L150) will access data outside the bounds of the tensor shape array. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] |
GHSA-mxh3-24xj-7crf | A vulnerability in the API implementation of Cisco ACI Multi-Site Orchestrator (MSO) could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability is due to improper authorization on specific APIs. An attacker could exploit this vulnerability by sending crafted HTTP requests. A successful exploit could allow an attacker who is authenticated with non-Administrator privileges to elevate to Administrator privileges on an affected device. | [] |
|
CVE-2009-1377 | The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug." | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"
] |
|
GHSA-74x8-6hh6-9qvg | The mintToken function of a smart contract implementation for Coinstar (CSTR), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
CVE-2006-1997 | Unspecified vulnerability in Sybase Pylon Anywhere groupware synchronization server before 7.0 allows local users to obtain sensitive information such as email and PIM data of another user via unknown attack vectors. | [
"cpe:2.3:a:sybase:pylon_anywhere:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.4.9:*:*:*:*:*:*:*"
] |
|
CVE-2008-5918 | Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [
"cpe:2.3:a:tigris:websvn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*"
] |
|
GHSA-38h8-x697-gh8q | Tmp files readable by other users in sync-exec | Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user.RecommendationThere is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively.The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`. | [] |
CVE-2024-48282 | A SQL Injection vulnerability was found in /password-recovery.php of PHPGurukul User Registration & Login and User Management System 3.2, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the femail parameter in a POST HTTP request. | [
"cpe:2.3:a:phpgurukul:user_registration_and_login_and_user_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2004-0836 | Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-50304 | ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() | In the Linux kernel, the following vulnerability has been resolved:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
The per-netns IP tunnel hash table is protected by the RTNL mutex and
ip_tunnel_find() is only called from the control path where the mutex is
taken.
Add a lockdep expression to hlist_for_each_entry_rcu() in
ip_tunnel_find() in order to validate that the mutex is held and to
silence the suspicious RCU usage warning [1].
[1]
WARNING: suspicious RCU usage
6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted
-----------------------------
net/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
1 lock held by ip/362:
#0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60
stack backtrace:
CPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139
Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
Call Trace:
<TASK>
dump_stack_lvl+0xba/0x110
lockdep_rcu_suspicious.cold+0x4f/0xd6
ip_tunnel_find+0x435/0x4d0
ip_tunnel_newlink+0x517/0x7a0
ipgre_newlink+0x14c/0x170
__rtnl_newlink+0x1173/0x19c0
rtnl_newlink+0x6c/0xa0
rtnetlink_rcv_msg+0x3cc/0xf60
netlink_rcv_skb+0x171/0x450
netlink_unicast+0x539/0x7f0
netlink_sendmsg+0x8c1/0xd80
____sys_sendmsg+0x8f9/0xc20
___sys_sendmsg+0x197/0x1e0
__sys_sendmsg+0x122/0x1f0
do_syscall_64+0xbb/0x1d0
entry_SYSCALL_64_after_hwframe+0x77/0x7f | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*"
] |
GHSA-gwq2-m8h6-8gvq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wiredmindshelp LeadLab by wiredminds allows Reflected XSS. This issue affects LeadLab by wiredminds: from n/a through 1.3. | [] |
|
GHSA-9rjp-j2f3-hgr2 | A vulnerability has been found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeidproof.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2025-21235 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | [] |
GHSA-fm68-v3v6-jm8v | Unrestricted file upload vulnerability in PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 allows remote attackers to execute arbitrary code by uploading a ColdFusion page, and then accessing it via unspecified vectors. | [] |
|
CVE-2016-6087 | IBM Domino 8.5 and 9.0 could allow an attacker to steal credentials using multiple sessions and large amounts of data using Domino TLS Key Exchange validation. IBM X-Force ID: 117918. | [
"cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.7:*:*:*:*:*:*:*"
] |
|
CVE-2020-2633 | Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Connector Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L). | [
"cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-3x49-h2mv-h459 | Insufficient permissions in Ivanti Patch SDK before version 9.7.703 allows a local authenticated attacker to delete arbitrary files. | [] |
|
CVE-2024-27337 | Kofax Power PDF TIF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability | Kofax Power PDF TIF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of TIF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22033. | [
"cpe:2.3:a:kofax:power_pdf:*:*:*:*:*:*:*:*"
] |
GHSA-69j6-29vr-p3j9 | Authentication bypass for viewing and deletions of snapshots | Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1.[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly.CVE-2021-39226 Snapshot authentication bypassSummaryCVSS Score: 9.8 Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HWe received a security report to [[email protected]](mailto:[email protected]) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability.ImpactUnauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths:`/dashboard/snapshot/:key`, or`/api/snapshots/:key`If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path:`/api/snapshots-delete/:deleteKey`Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths:`/api/snapshots/:key`, or`/api/snapshots-delete/:deleteKey`The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss.Attack auditWhile we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment.Through reverse proxy/load balancer logsTo determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK).
For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job="nginx-ingress-controller"} |= "\"status\": 200" |= "\"uri\": \"/api/snapshots/:key\""`.Through the Grafana Enterprise audit featureIf you enabled “Log web requests” in your configuration with `router_logging = true`, look for
`"requestUri":"/api/snapshots-delete/”`,`“requestUri":"/api/snapshots/:key"`, or `"type":"snapshot"` in combination with `"action":"delete"`.Patched versionsRelease 8.1.6:[Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6)[Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/)Release 7.5.11:[Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11)[Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/)Solutions and mitigationsDownload and install the appropriate patch for your version of Grafana.[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.WorkaroundIf for some reason you cannot upgrade:You can use a reverse proxy or similar to block access to the literal paths`/api/snapshots/:key``/api/snapshots-delete/:deleteKey``/dashboard/snapshot/:key``/api/snapshots/:key`They have no normal function and can be disabled without side effects.Timeline and postmortemHere is a detailed timeline starting from when we originally learned of the issue. All times in UTC.2021-09-15 14:49: Tuan Tran [email protected] sends initial report about viewing snapshots without authentication2021-09-15 15:56: Initial reproduction2021-09-15 17:10: MEDIUM severity declared2021-09-15 18:58: Workaround deployed on Grafana Cloud2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more.2021-09-16 09:35: HIGH severity declared2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS2021-09-16 11:19: CRITICAL declared2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation2021-09-23: Grafana Cloud instances updated2021-09-28 12:00: Grafana Enterprise images released to customers under embargo2021-10-05 17:00: Public releaseReporting security issuesIf you think you have found a security vulnerability, please send a report to [[email protected]](mailto:[email protected]). This address can be used for all of
Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CAThe key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index.Security announcementsWe maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements),
where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss).AcknowledgementWe would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us. | [] |
CVE-2021-21643 | Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:config_file_provider:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2020-2729 | Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: Advanced Console). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Identity Manager accessible data as well as unauthorized read access to a subset of Identity Manager accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:identity_manager:11.1.2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:*"
] |
|
GHSA-vhrf-w875-h9vr | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401When users run the command:cat /sys/kernel/debug/dri/0/amdgpu_dm_dtn_logThe following NULL pointer dereference happens:[ +0.000003] BUG: kernel NULL pointer dereference, address: NULL
[ +0.000005] #PF: supervisor instruction fetch in kernel mode
[ +0.000002] #PF: error_code(0x0010) - not-present page
[ +0.000002] PGD 0 P4D 0
[ +0.000004] Oops: 0010 [#1] PREEMPT SMP NOPTI
[ +0.000003] RIP: 0010:0x0
[ +0.000008] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[...]
[ +0.000002] PKRU: 55555554
[ +0.000002] Call Trace:
[ +0.000002] <TASK>
[ +0.000003] ? show_regs+0x65/0x70
[ +0.000006] ? __die+0x24/0x70
[ +0.000004] ? page_fault_oops+0x160/0x470
[ +0.000006] ? do_user_addr_fault+0x2b5/0x690
[ +0.000003] ? prb_read_valid+0x1c/0x30
[ +0.000005] ? exc_page_fault+0x8c/0x1a0
[ +0.000005] ? asm_exc_page_fault+0x27/0x30
[ +0.000012] dcn10_log_color_state+0xf9/0x510 [amdgpu]
[ +0.000306] ? srso_alias_return_thunk+0x5/0xfbef5
[ +0.000003] ? vsnprintf+0x2fb/0x600
[ +0.000009] dcn10_log_hw_state+0xfd0/0xfe0 [amdgpu]
[ +0.000218] ? __mod_memcg_lruvec_state+0xe8/0x170
[ +0.000008] ? srso_alias_return_thunk+0x5/0xfbef5
[ +0.000002] ? debug_smp_processor_id+0x17/0x20
[ +0.000003] ? srso_alias_return_thunk+0x5/0xfbef5
[ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5
[ +0.000002] ? set_ptes.isra.0+0x2b/0x90
[ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5
[ +0.000002] ? _raw_spin_unlock+0x19/0x40
[ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5
[ +0.000002] ? do_anonymous_page+0x337/0x700
[ +0.000004] dtn_log_read+0x82/0x120 [amdgpu]
[ +0.000207] full_proxy_read+0x66/0x90
[ +0.000007] vfs_read+0xb0/0x340
[ +0.000005] ? __count_memcg_events+0x79/0xe0
[ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5
[ +0.000003] ? count_memcg_events.constprop.0+0x1e/0x40
[ +0.000003] ? handle_mm_fault+0xb2/0x370
[ +0.000003] ksys_read+0x6b/0xf0
[ +0.000004] __x64_sys_read+0x19/0x20
[ +0.000003] do_syscall_64+0x60/0x130
[ +0.000004] entry_SYSCALL_64_after_hwframe+0x6e/0x76
[ +0.000003] RIP: 0033:0x7fdf32f147e2
[...]This error happens when the color log tries to read the gamut remap
information from DCN401 which is not initialized in the dcn401_dpp_funcs
which leads to a null pointer dereference. This commit addresses this
issue by adding a proper guard to access the gamut_remap callback in
case the specific ASIC did not implement this function. | [] |
|
CVE-2022-46322 | Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-x45w-xc46-348w | IBM MQ 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.3 LTS, 9.2 CD, and 9.3 CD and IBM MQ Appliance 9.2 LTS, 9.3 LTS, 9.2 CD, and 9.2 LTS, under certain configurations, is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 250397. | [] |
|
GHSA-4v59-chwx-688h | Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index. | [] |
|
CVE-2013-5771 | Unspecified vulnerability in the XML Parser component in Oracle Database Server 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote attackers to affect confidentiality and availability via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2017-20084 | JUNG Smart Visu Server KNX Group Address backdoor | A vulnerability has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832 and classified as critical. Affected by this vulnerability is an unknown functionality of the component KNX Group Address. The manipulation leads to backdoor. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component. | [
"cpe:2.3:o:jung-group:smart_visu_server_firmware:1.0.804:*:*:*:*:*:*:*",
"cpe:2.3:o:jung-group:smart_visu_server_firmware:1.0.830:*:*:*:*:*:*:*",
"cpe:2.3:o:jung-group:smart_visu_server_firmware:1.0.832:*:*:*:*:*:*:*",
"cpe:2.3:h:jung-group:smart_visu_server:-:*:*:*:*:*:*:*"
] |
CVE-2005-4683 | PADL MigrationTools 46, when a failure occurs, stores contents of /etc/shadow in a world-readable /tmp/nis.$$.ldif file, and possibly other sensitive information in other temporary files, which are not properly managed by (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh, and (8) migrate_all_nisplus_offline.sh. | [
"cpe:2.3:a:padl_software:migrationtools:46:*:*:*:*:*:*:*"
] |
|
CVE-2001-0065 | Buffer overflow in bftpd 1.0.13 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long SITE CHOWN command. | [
"cpe:2.3:a:max-wilhelm_bruker:bftpd:1.0.13:*:*:*:*:*:*:*"
] |
|
GHSA-75wr-7cmg-f792 | YoruFukurou (NightOwl) before 2.85 relies on support for emoji skin-tone modifiers even though this support is missing from the CoreText CTFramesetter API on OS X 10.9, which allows remote attackers to cause a denial of service (application crash) via a crafted emoji character sequence. | [] |
|
CVE-2020-13999 | ScaleViewPortExtEx in libemf.cpp in libEMF (aka ECMA-234 Metafile Library) 1.0.12 allows an integer overflow and denial of service via a crafted EMF file. | [
"cpe:2.3:a:libemf_project:libemf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
] |
|
GHSA-r3qm-7q4q-jc3r | OX App Suite 7.10.3 and earlier allows XSS via text/x-javascript, text/rdf, or a PDF document. | [] |
|
CVE-2025-1243 | Field in api-go proxy not transformed before version 1.44.1 | The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025) with a proxy leveraging the api-go library before version 1.44.1.
Other data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted. | [] |
GHSA-j27h-7jg7-4q9j | Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2012-5078. | [] |
|
CVE-2018-19519 | In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization. | [
"cpe:2.3:a:tcpdump:tcpdump:4.9.2:*:*:*:*:*:*:*"
] |
|
GHSA-cp67-8w3w-6h9c | Path Traversal | A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.