id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2023-33359 | Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function. | [
"cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*"
]
|
|
CVE-2004-1085 | Human Interface Toolbox (HIToolBox) for Apple Mac 0S X 10.3.6 allows local users to exit applications via the force-quit key combination, even when the system is running in kiosk mode. | [
"cpe:2.3:a:apple:darwin_streaming_server:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:darwin_streaming_server:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime_streaming_server:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*"
]
|
|
GHSA-4q58-qpcg-q4vf | Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information. | []
|
|
GHSA-v2hj-v7hg-p8cx | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: ASSERT when failing to find index by plane/stream id[WHY]
find_disp_cfg_idx_by_plane_id and find_disp_cfg_idx_by_stream_id returns
an array index and they return -1 when not found; however, -1 is not a
valid index number.[HOW]
When this happens, call ASSERT(), and return a positive number (which is
fewer than callers' array size) instead.This fixes 4 OVERRUN and 2 NEGATIVE_RETURNS issues reported by Coverity. | []
|
|
GHSA-gc7q-jgjv-vjr2 | Keycloak Services has a potential bypass of brute force protection | If an attacker launches many login attempts in parallel then the attacker can have more guesses at a password than the brute force protection configuration permits. This is due to the brute force check occurring before the brute force protector has locked the user.**Acknowledgements:**
Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project. | []
|
GHSA-p8vr-4r2c-fpx3 | Cross-site scripting (XSS) vulnerability in the RootCandy theme 6.x before 6.x-1.5 for Drupal allows remote attackers to inject arbitrary web script or HTML via the URI. | []
|
|
CVE-2016-8567 | An issue was discovered in Siemens SICAM PAS before 8.00. A factory account with hard-coded passwords is present in the SICAM PAS installations. Attackers might gain privileged access to the database over Port 2638/TCP. | [
"cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*"
]
|
|
CVE-2013-4078 | epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
]
|
|
CVE-2023-21387 | In User Backup Manager, there is a possible way to leak a token to bypass user confirmation for backup due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
|
|
CVE-2023-52168 | The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains a heap-based buffer overflow that allows an attacker to overwrite two bytes at multiple offsets beyond the allocated buffer size: buffer+512*i-2, for i=9, i=10, i=11, etc. | [
"cpe:2.3:a:7-zip:7zip:*:*:*:*:*:*:*:*"
]
|
|
GHSA-643c-pwr2-wq99 | The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem. | []
|
|
GHSA-ghmx-jqp7-vfvf | A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to obtain secret data or modify memory.We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later | []
|
|
CVE-2010-3584 | Unspecified vulnerability in the Oracle VM component in Oracle VM 2.2.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to ovs-agent. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a third party researcher that this is related to the storage of passwords and password hashes in cleartext in files with insecure permissions. | [
"cpe:2.3:a:oracle:vm:2.2.1:*:*:*:*:*:*:*"
]
|
|
CVE-2022-26639 | TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the DNSServers parameter. | [
"cpe:2.3:o:tp-link:tl-wr840n_firmware:0.9.1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr840n:6.20:*:*:*:*:*:*:*"
]
|
|
CVE-2017-1000209 | The Java WebSocket client nv-websocket-client does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL/TLS servers via an arbitrary valid certificate. | [
"cpe:2.3:a:nv-websocket-client_project:nv-websocket-client:*:*:*:*:*:*:*:*"
]
|
|
GHSA-44vc-fpcg-5cc5 | Moderate severity vulnerability that affects safemode | Withdrawn, accidental duplicate publish.The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method. | []
|
CVE-2024-52288 | RMAC revert to the beginning of the session in libosdp | libosdp is an implementation of IEC 60839-11-5 OSDP (Open Supervised Device Protocol) and provides a C library with support for C++, Rust and Python3. In affected versions an unexpected `REPLY_CCRYPT` or `REPLY_RMAC_I` may be introduced into an active stream when they should not be. Once RMAC_I message can be sent during a session, attacker with MITM access to the communication may intercept the original RMAC_I reply and save it. While the session continues, the attacker will record all of the replies and save them, till capturing the message to be replied (can be detected by ID, length or time based on inspection of visual activity next to the reader) Once attacker captures a session with the message to be replayed, he stops resetting the connection and waits for signal to perform the replay to of the PD to CP message (ex: by signaling remotely to the MIMT device or setting a specific timing). In order to replay, the attacker will craft a specific RMAC_I message in the proper seq of the execution, which will result in reverting the RMAC to the beginning of the session. At that phase - attacker can replay all the messages from the beginning of the session. This issue has been addressed in commit `298576d9` which is included in release version 3.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | []
|
GHSA-733g-66fc-5c3v | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Overnight Quick/Bulk Order Form for WooCommerce plugin <= 3.5.7 versions. | []
|
|
CVE-2023-35745 | D-Link DAP-2622 DDP Configuration Restore Filename Stack-based Buffer Overflow Remote Code Execution Vulnerability | D-Link DAP-2622 DDP Configuration Restore Filename Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20073. | [
"cpe:2.3:o:dlink:dap_2622_firmware:*:*:*:*:*:*:*:*"
]
|
CVE-2024-29777 | WordPress Forminator plugin <= 1.29.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Forminator allows Reflected XSS.This issue affects Forminator: from n/a through 1.29.0.
| []
|
CVE-2018-1337 | In Apache Directory LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request). | [
"cpe:2.3:a:apache:directory_ldap_api:*:*:*:*:*:*:*:*"
]
|
|
GHSA-8525-w6f6-22rc | Wavlink WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability via the function obtw. This vulnerability allows attackers to execute arbitrary commands via a crafted POST request. | []
|
|
GHSA-423w-pcwr-hw6q | EMC Network Configuration Manager (NCM) 9.3.x, EMC Network Configuration Manager (NCM) 9.4.0.x, EMC Network Configuration Manager (NCM) 9.4.1.x, EMC Network Configuration Manager (NCM) 9.4.2.x contains an Improper Authentication vulnerability that could potentially be exploited by malicious users to compromise the affected system. | []
|
|
CVE-2016-0054 | Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 SP1, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_designer:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*"
]
|
|
CVE-2011-3512 | Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*"
]
|
|
GHSA-wjwh-xprm-35wv | The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.5.8 does not properly validate images, allowing high privilege users such as administrators to upload PHP files disguised as images and containing malicious PHP code | []
|
|
GHSA-8rq3-vrr9-22c3 | An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into the tracker comments page. | []
|
|
CVE-2019-14959 | JetBrains Toolbox before 1.15.5605 was resolving an internal URL via a cleartext http connection. | [
"cpe:2.3:a:jetbrains:toolbox:*:*:*:*:*:*:*:*"
]
|
|
CVE-2023-29126 | Insecure loose comparison in Enel X JuiceBox | The Waybox Enel X web management application contains a PHP-type juggling vulnerability that may allow a brute force process and under certain conditions bypass authentication. | [
"cpe:2.3:o:enelx:waybox_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:enelx:waybox_pro:3.0:*:*:*:*:*:*:*"
]
|
GHSA-cv8c-hh5w-6j6h | Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "Drawing Exception Handling Vulnerability." | []
|
|
GHSA-f3c4-7m99-h392 | Palo Alto Networks PAN-OS 6.1, 7.1, and 8.0.x before 8.0.7, when an interface implements SSL decryption with RSA enabled or hosts a GlobalProtect portal or gateway, might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack. | []
|
|
CVE-2022-2289 | Use After Free in vim/vim | Use After Free in GitHub repository vim/vim prior to 9.0. | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
]
|
CVE-2023-42844 | This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. A website may be able to access sensitive user data when resolving symlinks. | [
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
|
|
CVE-2018-17704 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the textColor property of RadioButton objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7254. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
GHSA-rc7h-8qp4-9939 | Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | []
|
|
GHSA-c422-m9j6-9g96 | Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3092. | []
|
|
CVE-2014-3559 | The oVirt storage backend in Red Hat Enterprise Virtualization 3.4 does not wipe memory snapshots when deleting a VM, even when wipe-after-delete (WAD) is configured for the VM's disk, which allows remote authenticated users with certain credentials to read portions of the deleted VM's memory and obtain sensitive information via an uninitialized storage volume. | [
"cpe:2.3:a:redhat:enterprise_virtualization:3.4:*:*:*:*:*:*:*"
]
|
|
CVE-2007-5710 | Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter. | [
"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*"
]
|
|
CVE-2021-30939 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
|
|
GHSA-63gw-hff3-vv3w | Microsoft Windows 10 Gold and 1511 allows attackers to cause a denial of service via unspecified vectors, aka "Windows Denial of Service Vulnerability." | []
|
|
CVE-2020-26260 | Server Side Request Forgery in BookStack | BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade. | [
"cpe:2.3:a:bookstackapp:bookstack:*:*:*:*:*:*:*:*"
]
|
GHSA-v3hc-v42h-rp66 | The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges. | []
|
|
GHSA-26vg-2p3j-9wv3 | A vulnerability in TCP port management in Cisco ONS 15454 Series Multiservice Provisioning Platforms could allow an unauthenticated, remote attacker to cause the controller card to unexpectedly reload. More Information: CSCuw26032. Known Affected Releases: 10.51. | []
|
|
CVE-2024-34413 | WordPress SliceWP Affiliates plugin <= 1.1.10 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SliceWP allows Stored XSS.This issue affects SliceWP: from n/a through 1.1.10.
| []
|
CVE-2017-12741 | Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affected devices must be restarted manually. | [
"cpe:2.3:o:siemens:simatic_s7-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-400pn_v6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400pn_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-400h_v6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400h_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-400pn\\/dp_v7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400pn\\/dp_v7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-410_v8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-410_v8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_controller_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_winac_rtx_f_2010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_winac_rtx_f_2010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200al_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200al:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200ecopn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200ecopn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200mp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200pro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200sp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200sp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:dk_standard_ethernet_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:dk_standard_ethernet_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ek-ertec_200p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ek-ertec_200p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ek-ertec_200pn_io_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ek-ertec_200pn_io:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotion_p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotion_p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_dcm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_dcm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_dcp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_dcp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_g110m\\/g120pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_g110m\\/g120pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_g130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_g130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_g150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_g150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_s110pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_s110pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_s120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_s120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_s150_v4.7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_s150_v4.7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_s150_v4.8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_s150_v4.8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinamics_v90pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinamics_v90pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sinumerik_840d_sl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sinumerik_840d_sl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_compact_field_unit_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_compact_field_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_pn\\/pn_coupler_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_pn\\/pn_coupler:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simocode_pro_v_profinet_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simocode_pro_v_profinet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sirius_soft_starter_3rw44pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sirius_soft_starter_3rw44pn:-:*:*:*:*:*:*:*"
]
|
|
CVE-2025-23776 | WordPress Cache Sniper for Nginx plugin <= 1.0.4.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in Thorn Technologies LLC Cache Sniper for Nginx allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cache Sniper for Nginx: from n/a through 1.0.4.2. | []
|
CVE-2025-6879 | SourceCodester Best Salon Management System add-tax.php sql injection | A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /panel/add-tax.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
|
GHSA-w9p3-2qgf-68g5 | Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote attackers to gain privileges. | []
|
|
CVE-2019-7159 | OX App Suite 7.10.1 and earlier allows Information Exposure. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
]
|
|
GHSA-fp82-2h99-3fpp | Prototype Pollution in async merge-object | The utilities function in all versions of the merge-object node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects. | []
|
CVE-2021-0480 | In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-174493336 | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
|
|
GHSA-h68g-hh49-6c53 | X server (Xsco) in OpenUNIX 8.0.0 and UnixWare 7.1.1 does not drop privileges before calling programs such as xkbcomp using popen, which could allow local users to gain privileges. | []
|
|
CVE-2018-1077 | Spacewalk 2.6 contains an API which has an XXE flaw allowing for the disclosure of potentially sensitive information from the server. | [
"cpe:2.3:a:redhat:spacewalk:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.0:*:*:*:*:*:*:*"
]
|
|
CVE-2023-40151 | Red Lion Controls Sixnet RTU Exposed Dangerous Method Or Function |
When user authentication is not enabled the shell can execute commands with the highest privileges. Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message comes over TCP/IP the RTU will simply accept the message with no authentication challenge.
| [
"cpe:2.3:o:redlioncontrols:st-ipm-6350_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:st-ipm-6350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:st-ipm-8460_firmware:6.0.202:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:st-ipm-8460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-mipm-135-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-mipm-135-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-mipm-245-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-mipm-245-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-ipm2m-213-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-ipm2m-213-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-ipm2m-113-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-ipm2m-113-d:-:*:*:*:*:*:*:*"
]
|
GHSA-v5x9-p45c-rxpc | A use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0 allows an attacker to access Fortinet private testing data via the use of static credentials. | []
|
|
GHSA-xf5j-xpj6-5xhm | A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-services.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257604. | []
|
|
CVE-2022-47542 | Red Gate SQL Monitor 11.0.14 through 12.1.46 has Incorrect Access Control, exploitable remotely for Escalation of Privileges. | [
"cpe:2.3:a:red-gate:sql_monitor:*:*:*:*:*:*:*:*"
]
|
|
GHSA-78xf-x743-mmc6 | In the Linux kernel, the following vulnerability has been resolved:media: s5p-jpeg: prevent buffer overflowsThe current logic allows word to be less than 2. If this happens,
there will be buffer overflows, as reported by smatch. Add extra
checks to prevent it.While here, remove an unused word = 0 assignment. | []
|
|
CVE-2021-38321 | Custom Menu Plugin <= 1.3.3 Reflected Cross-Site Scripting | The Custom Menu Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selected_menu parameter found in the ~/custom-menus.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.3. | [
"cpe:2.3:a:custom-sub-menus_project:custom-sub-menus:*:*:*:*:*:wordpress:*:*"
]
|
GHSA-vhcx-wrgv-8hv9 | Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof." | []
|
|
CVE-2024-31958 | An issue was discovered in Samsung Mobile Processor EExynos 2200, Exynos 1480, Exynos 2400. It lacks a check for the validation of native handles, which can result in an Out-of-Bounds Write. | []
|
|
CVE-2014-2376 | SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:ecava:integraxor:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:ecava:integraxor:*:*:*:*:*:*:*:*"
]
|
|
CVE-2024-4835 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | A XSS condition exists within GitLab in versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1. By leveraging this condition, an attacker can craft a malicious page to exfiltrate sensitive user information. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:17.0.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:17.0.0:*:*:*:enterprise:*:*:*"
]
|
GHSA-m2wh-gpjv-j5rm | Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4448, CVE-2015-5095, CVE-2015-5101, CVE-2015-5111, CVE-2015-5113, and CVE-2015-5114. | []
|
|
GHSA-x8qc-qf2g-j5w3 | The Planning Center Online Giving WordPress plugin through 1.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | []
|
|
CVE-2018-3191 | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
]
|
|
CVE-2002-0827 | Vulnerability in pppd on UnixWare 7.1.1 and Open UNIX 8.0.0 allows local users to gain root privileges via (1) ppptalk or (2) ppp, a different vulnerability than CVE-2002-0824. | [
"cpe:2.3:a:caldera:unixware:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openunix:8.0:*:*:*:*:*:*:*"
]
|
|
CVE-2008-2425 | SQL injection vulnerability in index.php in FicHive 1.0 allows remote attackers to execute arbitrary SQL commands via the letter parameter in a Search action, a different vector than CVE-2008-2416. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:fichive:fichive:1.0:*:*:*:*:*:*:*"
]
|
|
CVE-2021-4368 | The Frontend File Manager plugin for WordPress is vulnerable to Authenticated Settings Change in versions up to, and including, 18.2. This is due to lacking capability checks and a security nonce, all on the wpfm_save_settings AJAX action. This makes it possible for subscriber-level attackers to edit the plugin settings, such as the allowed upload file types. This can lead to remote code execution through other vulnerabilities. | [
"cpe:2.3:a:najeebmedia:frontend_file_manager_plugin:*:*:*:*:*:wordpress:*:*"
]
|
|
CVE-2001-1390 | Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
|
|
CVE-2022-27374 | Tenda AX12 V22.03.01.21_CN was discovered to contain a Cross-Site Request Forgery (CSRF) via the function sub_42E328 at /goform/SysToolReboot. | [
"cpe:2.3:o:tenda:ax12_firmware:22.03.01.21_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax12:-:*:*:*:*:*:*:*"
]
|
|
GHSA-hwhm-x7h4-2284 | The Sitekit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sitekit_iframe' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
|
|
CVE-2023-5386 | The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_delete_posts function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts, including administrator posts, and posts not related to the Funnelforms Free plugin. | [
"cpe:2.3:a:funnelforms:funnelforms:*:*:*:*:free:wordpress:*:*"
]
|
|
GHSA-x2jx-w3wm-9p3p | nadesiko3 allows remote attacker to inject invalid value to decodeURIComponent of nako3edit | Nako3edit is the editor component of Nadeshiko 3, a programming language developed based on Japanese. Improper check or handling of exceptional conditions in Nako3edit v3.3.74 and earlier allows a remote attacker to inject an invalid value to decodeURIComponent of nako3edit, which may lead the server to crash. | []
|
CVE-2018-14974 | An issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/news.php has XSS. | [
"cpe:2.3:a:q-cms:qcms:3.0.1:*:*:*:*:*:*:*"
]
|
|
GHSA-chrp-f2pw-4x7x | Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments. | []
|
|
CVE-2005-4619 | SQL injection vulnerability in index.php in phpoutsourcing Zorum Forum 3.5 and earlier allows remote attackers to execute arbitrary SQL commands via the rollid parameter in the showhtmllist method. | [
"cpe:2.3:a:phpoutsourcing:zorum:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpoutsourcing:zorum:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpoutsourcing:zorum:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpoutsourcing:zorum:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpoutsourcing:zorum:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpoutsourcing:zorum:3.5:*:*:*:*:*:*:*"
]
|
|
CVE-2025-27607 | Python JSON Logger has a Potential RCE via missing `msgspec-python313-pre` dependency | Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0. | []
|
GHSA-g59c-cwqr-686c | Chamilo 1.9.4 has XSS due to improper validation of user-supplied input by the chat.php script. | []
|
|
GHSA-j3vg-5xcr-9g3j | D-Link DCS-900 Internet Camera listens on UDP port 62976 for an IP address, which allows remote attackers to change the IP address of the camera via a UDP broadcast packet. | []
|
|
CVE-2021-27232 | The RTSPLive555.dll ActiveX control in Pelco Digital Sentry Server 7.18.72.11464 has a SetCameraConnectionParameter stack-based buffer overflow. This can be exploited by a remote attacker to potentially execute arbitrary attacker-supplied code. The victim would have to visit a malicious webpage using Internet Explorer where the exploit could be triggered. | [
"cpe:2.3:a:pelco:digital_sentry_server:7.18.72.11464:*:*:*:*:*:*:*"
]
|
|
CVE-2024-2988 | Tenda FH1203 fromRouteStatic fromSetRouteStatic stack-based overflow | A vulnerability classified as critical was found in Tenda FH1203 2.0.1.6. Affected by this vulnerability is the function fromSetRouteStatic of the file /goform/fromRouteStatic. The manipulation of the argument entrys leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*"
]
|
CVE-2017-14261 | In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file. | [
"cpe:2.3:a:bento4:bento4:1.5.0-616:*:*:*:*:*:*:*"
]
|
|
CVE-2022-3217 | When logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a login session can obtain the login credentials. | [
"cpe:2.3:a:visam:vbase:11.7.0.2:*:*:*:*:*:*:*"
]
|
|
CVE-2024-50204 | fs: don't try and remove empty rbtree node | In the Linux kernel, the following vulnerability has been resolved:
fs: don't try and remove empty rbtree node
When copying a namespace we won't have added the new copy into the
namespace rbtree until after the copy succeeded. Calling free_mnt_ns()
will try to remove the copy from the rbtree which is invalid. Simply
free the namespace skeleton directly. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
]
|
GHSA-8hwp-gqff-c4f8 | Unrestricted file upload vulnerability in Collabtive 0.4.8 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension and using a text/plain MIME type, then accessing it via a direct request to the file in files/, related to (1) the showproject action in managefile.php or (2) the Messages feature. | []
|
|
GHSA-c97g-x65q-5xr4 | In AutomationDirect CLICK Programming Software (Part Number C0-PGMSW) Versions 2.10 and prior; C-More Programming Software (Part Number EA9-PGMSW) Versions 6.30 and prior; C-More Micro (Part Number EA-PGMSW) Versions 4.20.01.0 and prior; Do-more Designer Software (Part Number DM-PGMSW) Versions 2.0.3 and prior; GS Drives Configuration Software (Part Number GSOFT) Versions 4.0.6 and prior; SL-SOFT SOLO Temperature Controller Configuration Software (Part Number SL-SOFT) Versions 1.1.0.5 and prior; and DirectSOFT Programming Software Versions 6.1 and prior, an uncontrolled search path element (DLL Hijacking) vulnerability has been identified. To exploit this vulnerability, an attacker could rename a malicious DLL to meet the criteria of the application, and the application would not verify that the DLL is correct. Once loaded by the application, the DLL could run malicious code at the privilege level of the application. | []
|
|
CVE-2018-0144 | A vulnerability in the web-based management interface of Cisco Prime Data Center Network Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvg81051. | [
"cpe:2.3:a:cisco:prime_data_center_network_manager:10.4\\(1.109\\):*:*:*:*:*:*:*"
]
|
|
CVE-2024-32126 | WordPress Navigation menu as dropdown Widget plugin <= 1.3.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Peters Navigation menu as Dropdown Widget allows Stored XSS.This issue affects Navigation menu as Dropdown Widget: from n/a through 1.3.4.
| [
"cpe:2.3:a:jeroen_peters:navigation_menu_as_dropdown_widget:*:*:*:*:*:*:*:*"
]
|
CVE-2004-1818 | Cross-site scripting (XSS) vulnerability in nmimage.php in 4nalbum 0.92 for PHP-Nuke 6.5 through 7.0 allows remote attackers to execute arbitrary script as other users by injecting arbitrary script into the z parameter. | [
"cpe:2.3:a:warpspeed:4nalbum_module:0.92:*:*:*:*:*:*:*"
]
|
|
GHSA-c463-rcwh-797m | Multiple SQL injection vulnerabilities in RoomPHPlanning 1.6 allow remote attackers to execute arbitrary SQL commands via (1) the loginus parameter to Login.php or (2) the Old Password field to changepwd.php, and allow (3) remote authenticated administrators to execute arbitrary SQL commands via the id parameter to admin/userform.php. | []
|
|
CVE-2025-6552 | java-aodeng Hope-Boot Login WebController.java doLogin redirect | A vulnerability was found in java-aodeng Hope-Boot 1.0.0. It has been classified as problematic. Affected is the function doLogin of the file /src/main/java/com/hope/controller/WebController.java of the component Login. The manipulation of the argument redirect_url leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
|
CVE-2021-23388 | Regular Expression Denial of Service (ReDoS) | The package forms before 1.2.1, from 1.3.0 and before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation. | [
"cpe:2.3:a:forms_project:forms:*:*:*:*:*:node.js:*:*"
]
|
CVE-2022-36622 | Samsung Electronics mTower v0.3.0 and earlier was discovered to contain a NULL pointer dereference via the function TEE_GetObjectInfo1. | [
"cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*"
]
|
|
GHSA-7qm9-jrj9-97qm | Cross-Site Request Forgery (CSRF) vulnerability in Rara Theme JobScout allows Cross Site Request Forgery.This issue affects JobScout: from n/a through 1.1.4. | []
|
|
CVE-2023-1810 | Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
|
|
CVE-2023-39279 | SonicOS post-authentication Stack-Based Buffer Overflow vulnerability in the getPacketReplayData.json URL endpoint leads to a firewall crash. | [
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*"
]
|
|
CVE-2019-16719 | WTCMS 1.0 allows index.php?g=admin&m=index&a=index CSRF with resultant XSS. | [
"cpe:2.3:a:wtcms_project:wtcms:1.0:*:*:*:*:*:*:*"
]
|
|
GHSA-cxp9-fwx5-389x | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.50, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.0.54, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64. | []
|
|
CVE-2022-42071 | Online Birth Certificate Management System version 1.0 suffers from a Cross Site Scripting (XSS) Vulnerability. | [
"cpe:2.3:a:online_birth_certificate_management_system_project:online_birth_certificate_management_system:1.0:*:*:*:*:*:*:*"
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.