id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
GHSA-hg23-gxg2-hr28
Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form.
[]
CVE-2014-9975
In all Qualcomm products with Android releases from CAF using the Linux kernel, a rollback vulnerability potentially exists in Full Disk Encryption.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
CVE-2003-0421
Apple QuickTime / Darwin Streaming Server before 4.1.3f allows remote attackers to cause a denial of service (crash) via an MS-DOS device name (e.g. AUX) in a request to HTTP port 1220, a different vulnerability than CVE-2003-0502.
[ "cpe:2.3:a:apple:darwin_streaming_server:4.1.3:*:*:*:*:*:*:*" ]
GHSA-vxrf-w6g3-6qr9
Non Privilege User can Enable or Disable Registered in GitHub repository openemr/openemr prior to 6.1.0.1.
[]
GHSA-w2w7-2p2r-c7xw
A vulnerability was found in PCMan FTP Server 2.0.7. It has been declared as critical. This vulnerability affects unknown code of the component SIZE Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2018-1000129
An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
[ "cpe:2.3:a:jolokia:jolokia:1.3.7:*:*:*:*:*:*:*" ]
CVE-2010-5222
Untrusted search path vulnerability in Ease Jukebox 1.40 allows local users to gain privileges via a Trojan horse wmaudsdk.dll file in the current working directory, as demonstrated by a directory that contains a .mp3 or .wav file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:audiotool:ease_jukebox:1.40:*:*:*:*:*:*:*" ]
GHSA-gwcr-j4wh-j3cq
Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability
Requests to the `ConcatServlet` and `WelcomeFilter` are able to access protected resources within the `WEB-INF` directory. For example a request to the `ConcatServlet` with a URI of `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.This occurs because both `ConcatServlet` and `WelcomeFilter` decode the supplied path to verify it is not within the `WEB-INF` or `META-INF` directories. It then uses this decoded path to call `RequestDispatcher` which will also do decoding of the path. This double decoding allows paths with a doubly encoded `WEB-INF` to bypass this security check.ImpactThis affects all versions of `ConcatServlet` and `WelcomeFilter` in versions before 9.4.41, 10.0.3 and 11.0.3.WorkaroundsIf you cannot update to the latest version of Jetty, you can instead deploy your own version of the [`ConcatServlet`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/ConcatServlet.java) and/or the [`WelcomeFilter`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/WelcomeFilter.java) by using the code from the latest version of Jetty.
[]
CVE-2020-25867
SoPlanning before 1.47 doesn't correctly check the security key used to publicly share plannings. It allows a bypass to get access without authentication.
[ "cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:*" ]
GHSA-wh9g-g4fv-429j
Multiple temporary file creation vulnerabilities in pki-core 10.2.0.
[]
GHSA-fq5p-x8r5-xjmq
Directory traversal vulnerability in action_admin/paysubscriptions.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote authenticated administrators to include and execute arbitrary local PHP files via a .. (dot dot) in the name parameter, preceded by enough backspace (%08) characters to erase the initial static portion of a filename.
[]
GHSA-8hxh-6wgq-hc28
IBM Security Guardium 10.6, 11.0, and 11.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174851.
[]
GHSA-q2rp-xfj8-r95h
Cross-site scripting (XSS) vulnerability in the Asset module's asset categories selector in Liferay Portal 7.3.3 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the name of a asset category.
[]
CVE-2024-13081
PHPGurukul Land Record System contactus.php cross site scripting
A vulnerability was found in PHPGurukul Land Record System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/contactus.php. The manipulation of the argument Page Description leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*" ]
CVE-2021-39196
Authenticated non-privileged user can request unfiltered data without adequate permissions in pcapture
pcapture is an open source dumpcap web service interface . In affected versions this vulnerability allows an authenticated but unprivileged user to use the REST API to capture and download packets with no capture filter and without adequate permissions. This is important because the capture filters can effectively limit the scope of information that a user can see in the data captures. If no filter is present, then all data on the local network segment where the program is running can be captured and downloaded. v3.12 fixes this problem. There is no workaround, you must upgrade to v3.12 or greater.
[ "cpe:2.3:a:pcapture_project:pcapture:*:*:*:*:*:*:*:*" ]
CVE-2024-2077
SourceCodester Simple Online Bidding System index.php sql injection
A vulnerability classified as critical has been found in SourceCodester Simple Online Bidding System 1.0. This affects an unknown part of the file index.php. The manipulation of the argument category_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255393 was assigned to this vulnerability.
[ "cpe:2.3:a:sourcecodester:simple_online_bidding_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:simple_online_bidding_system:1.0:*:*:*:*:*:*:*" ]
GHSA-r8hm-w595-qcj4
RSSFromParent in Plain Black WebGUI before 7.5.13 does not restrict view access to Collaboration System (CS) RSS feeds, which allows remote attackers to obtain sensitive information (CS data).
[]
GHSA-p38f-vh2f-mc7r
Cross-site Scripting (XSS) - Stored in GitHub repository linagora/twake prior to 2023.Q1.1200+.
[]
GHSA-h24r-m9qc-pvpg
Ansible-core information disclosure flaw
An information disclosure flaw was found in ansible-core due to a failure to respect the `ANSIBLE_NO_LOG` configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
[]
GHSA-vgpm-hvwj-9wc9
In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.
[]
GHSA-cxv6-gvcr-65jm
Static code injection vulnerability in edithistory.php in OxYProject OxYBox 0.85 allows remote attackers to inject arbitrary PHP code into oxyhistory.php via the oxymsg parameter.
[]
CVE-2015-6511
Cross-site scripting (XSS) vulnerability in pfSense before 2.2.3 allows remote attackers to inject arbitrary web script or HTML via the server[] parameter to services_ntpd.php.
[ "cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*" ]
CVE-2022-29431
Remove CPT base <= 5.8 - CSRF leads to CPT base deletion
Cross-Site Request Forgery (CSRF) vulnerability in KubiQ CPT base plugin <= 5.8 at WordPress allows an attacker to delete the CPT base.
[ "cpe:2.3:a:kubiq:cpt_base:*:*:*:*:*:wordpress:*:*" ]
CVE-2017-3407
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*" ]
GHSA-g7rg-76wx-hfgm
get2post.php in IDERA Uptime Monitor 7.8 has directory traversal in the file_name parameter.
[]
CVE-2012-0143
Microsoft Excel 2003 SP3 and Office 2008 for Mac do not properly handle memory during the opening of files, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Memory Corruption Using Various Modified Bytes Vulnerability."
[ "cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*" ]
GHSA-457g-f88f-3329
Directory traversal vulnerability in AttacheCase for Java 0.60 and earlier, AttacheCase Lite 1.4.6 and earlier, and AttacheCase Pro 1.5.7 and earlier allows remote attackers to read arbitrary files via specially crafted ATC file.
[]
CVE-2017-1482
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128620.
[ "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*" ]
CVE-2020-9519
HTTP methods reveled in Web services vulnerability in Micro Focus Service manager (server), affecting versions 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62, 9.63. The vulnerability could be exploited to allow exposure of configuration data.
[ "cpe:2.3:a:microfocus:service_manager:*:*:*:*:*:*:*:*" ]
CVE-2017-13748
There are lots of memory leaks in JasPer 2.0.12, triggered in the function jas_strdup() in base/jas_string.c, that will lead to a remote denial of service attack.
[ "cpe:2.3:a:jasper_project:jasper:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-v9pv-xw32-4774
The MediaTek drivers in Android before 2016-07-05 on Android One devices allow attackers to gain privileges via a crafted application, aka Android internal bug 29007611 and MediaTek internal bug ALPS02703102.
[]
CVE-2018-7117
A remote Cross-Site Scripting in HPE iLO 5 Web User Interface vulnerability was identified in HPE Integrated Lights-Out 5 (iLO 5) for Gen10 ProLiant Servers earlier than version v1.40.
[ "cpe:2.3:o:hp:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_bl460c_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl120_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl160_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl180_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl20_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl325_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl360_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl380_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl385_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl560_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl580_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_microserver_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_ml110_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_ml30_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_ml350_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl170r_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl190r_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl230k_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl450_gen10:-:*:*:*:*:*:*:*" ]
GHSA-gvpw-gp9p-m67j
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
CVE-2015-10047
KYUUBl school-register DBManager.java sql injection
A vulnerability was found in KYUUBl school-register. It has been classified as critical. This affects an unknown part of the file src/DBManager.java. The manipulation leads to sql injection. The patch is named 1cf7e01b878aee923f2b22cc2535c71a680e4c30. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218355.
[ "cpe:2.3:a:school-register_project:school-register:*:*:*:*:*:*:*:*" ]
CVE-2009-4976
Cross-site scripting (XSS) vulnerability in webkitpart.cpp in kwebkitpart allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a "universal XSS" issue, a similar vulnerability to CVE-2010-2536.
[ "cpe:2.3:a:urs_wolfer:kwebkitpart:*:*:*:*:*:*:*:*", "cpe:2.3:a:urs_wolfer:kwebkitpart:0.9.6:beta:*:*:*:*:*:*", "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*" ]
CVE-2021-41225
A use of uninitialized value vulnerability in Tensorflow
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's Grappler optimizer has a use of unitialized variable. If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*" ]
CVE-2016-7122
The avi_read_nikon function in libavformat/avidec.c in FFmpeg before 3.1.4 is vulnerable to infinite loop when it decodes an AVI file that has a crafted 'nctg' structure.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" ]
CVE-2019-18226
Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products.
[ "cpe:2.3:o:honeywell:h2w2pc1m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w2pc1m:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h2w2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h2w4per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w4per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w2per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w2per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w4per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w4per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w4per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w4per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w8pr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w8pr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbd2per1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbd2per1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw2per1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw2per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw2per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw4per1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw4per1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw4per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw4per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw4pgr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw4pgr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw8pr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw8pr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hed2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hed2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew2per2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew2per2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew2per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew2per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew4per3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew4per3:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hew4per3b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hew4per3b:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdzp252di_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdzp304di_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hpw2p1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h2w2gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h3w2gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h3w2gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h3w4gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h3w4gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h3w2gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h3w2gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h3w2gr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h3w2gr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h3w4gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h3w4gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4l2gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4l2gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w2gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w2gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w2gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w2gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w4gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w4gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4l2gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4l2gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w2gr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w2gr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4w4gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4w4gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4l6gr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4l6gr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hm4l8gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hm4l8gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:h4d8gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:h4d8gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbl2gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbl2gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw2gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw2gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw2gr3v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw2gr3v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbw4gr1v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbw4gr1v:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbl6gr2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbl6gr2:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hmbl8gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hmbl8gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hbd8gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hbd8gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hfd6gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hfd6gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hfd8gr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hfd8gr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdz302liw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdz302liw:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdz302lik_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdz302lik:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdz302de_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdz302de:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdz302d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdz302d:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdz302din-c1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdz302din-c1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hdz302din-s1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hdz302din-s1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hepz302w0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hepz302w0:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hcl2gv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hcl2gv:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hcl2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hcl2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hcw2g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hcw2g:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hcw4g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hcw4g:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hcd8g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hcd8g:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hsw2g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hsw2g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hswb2g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hswb2g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hcw2gv_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hcw2gv:-:*:*:*:*:*:*:*" ]
CVE-2023-41344
NCSIST ManageEngine MDM - Path Traversal
NCSIST ManageEngine Mobile Device Manager(MDM) APP's special function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and read arbitrary system files.
[ "cpe:2.3:a:ncsist:mobile_device_manager:1.4:*:*:*:*:*:*:*" ]
GHSA-9pg9-hg9f-fw5m
Use after free in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
GHSA-3xcx-j8jr-m5vv
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the unicode_decode_wcstombs function in xlstool.c:266.
[]
GHSA-r6h8-3hr3-v266
Fastream FUR HTTP server 1.0b allows remote attackers to cause a denial of service via a long GET request.
[]
GHSA-39x9-vxp8-rf3h
SQL injection vulnerability in ZAPms 1.41 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter to product.
[]
CVE-2016-9357
An issue was discovered in certain legacy Eaton ePDUs -- the affected products are past end-of-life (EoL) and no longer supported: EAMxxx prior to June 30, 2015, EMAxxx prior to January 31, 2014, EAMAxx prior to January 31, 2014, EMAAxx prior to January 31, 2014, and ESWAxx prior to January 31, 2014. An unauthenticated attacker may be able to access configuration files with a specially crafted URL (Path Traversal).
[ "cpe:2.3:o:eaton:eamxxx_series_epdu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eaton:eamxxx_series_epdu:-:*:*:*:*:*:*:*", "cpe:2.3:o:eaton:emaxxx_series_epdu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eaton:emaxxx_series_epdu:-:*:*:*:*:*:*:*", "cpe:2.3:o:eaton:eamaxx_series_epdu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eaton:eamaxx_series_epdu:-:*:*:*:*:*:*:*", "cpe:2.3:o:eaton:emaaxx_series_epdu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eaton:emaaxx_series_epdu:-:*:*:*:*:*:*:*", "cpe:2.3:o:eaton:eswaxx_series_epdu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:eaton:eswaxx_series_epdu:-:*:*:*:*:*:*:*" ]
GHSA-fgh6-j2hc-p23r
SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability.
[]
GHSA-xm6h-364j-437g
Cross-site scripting (XSS) vulnerability in the management interface in Palo Alto Networks PAN-OS 7.x before 7.0.8 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
GHSA-43h6-fgw9-r35m
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-8158, CVE-2018-8161.
[]
GHSA-74gr-74x4-wggv
In the Easel driver, there is possible memory corruption due to race conditions. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112312381
[]
CVE-2014-4762
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 8.0.0 through 8.0.0.1 CF13 and 8.5.0 before CF02 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf01:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf02:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf03:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf04:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf05:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf04:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf05:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf06:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf07:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf08:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf09:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf12:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.5.0.0:cf01:*:*:*:*:*:*" ]
CVE-2024-11099
code-projects Job Recruitment login.php sql injection
A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:code_projects:job_recruitement:*:*:*:*:*:*:*:*", "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*" ]
CVE-2007-1822
Alcatel-Lucent Lucent Technologies voice mail systems allow remote attackers to retrieve or remove messages, or reconfigure mailboxes, by spoofing Calling Number Identification (CNID, aka Caller ID).
[ "cpe:2.3:a:alcatel-lucent:voice_mail_system:*:*:*:*:*:*:*:*" ]
GHSA-gch6-mvxw-6r79
A vulnerability was found in SourceCodester Best House Rental Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument page leads to file inclusion. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-fjqq-wrxc-5qvx
The NAT implementation in Zonet ZSR1104WE Wireless Router Runtime Code Version 2.41 converts IP addresses of inbound connections to the IP address of the router, which allows remote attackers to bypass intended security restrictions.
[]
CVE-2020-1498
Microsoft Excel Remote Code Execution Vulnerability
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*" ]
GHSA-v547-ggh4-4xpf
Eaton 9000X DriveA versions 2.0.29 and prior has a stack-based buffer overflow vulnerability, which may allow remote code execution.
[]
CVE-2017-12155
A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
[ "cpe:2.3:a:ceph:ceph:-:*:*:*:*:openstack:*:*" ]
CVE-2008-5304
Cross-site scripting (XSS) vulnerability in TWiki before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via the %URLPARAM{}% variable.
[ "cpe:2.3:a:twiki:twiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2000-12-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2001-09-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2001-12-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2003-02-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-01:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-02:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-03:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:2004-09-04:*:*:*:*:*:*:*" ]
GHSA-fqg9-vmpf-88cg
The mint function of a smart contract implementation for CloutToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
CVE-2022-43500
Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script. The developer also provides new patched releases for all versions since 3.7.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
CVE-2024-0504
code-projects Simple Online Hotel Reservation System Make a Reservation Page add_reserve.php cross site scripting
A vulnerability has been found in code-projects Simple Online Hotel Reservation System 1.0 and classified as problematic. This vulnerability affects unknown code of the file add_reserve.php of the component Make a Reservation Page. The manipulation of the argument Firstname/Lastname with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250618 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:fabianros:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*" ]
GHSA-29j3-2446-5j4w
SaltStack Salt Improper Validation of eauth credentials and tokens in salt-netapi
In SaltStack the salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
[]
CVE-2015-1688
Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
CVE-2019-3465
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
[ "cpe:2.3:a:xmlseclibs_project:xmlseclibs:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*" ]
GHSA-wjqp-9vhf-cc8w
Zohocorp ManageEngine OpManager, NetFlow Analyzer, Network Configuration Manager, Firewall Analyzer and OpUtils versions 128565 and below are vulnerable to Reflected XSS on the login page.
[]
CVE-2022-26093
Null pointer dereference vulnerability in parser_irot function in libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attacker.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
GHSA-vcrr-6cpv-c8xh
Vulnerability in the Oracle Commerce Platform product of Oracle Commerce (component: Dynamo Application Framework). Supported versions that are affected are 11.3.0, 11.3.1 and 11.3.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Commerce Platform executes to compromise Oracle Commerce Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Commerce Platform accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
GHSA-fgxx-ch38-43gw
The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "<track>" tag refers to a file that does not exist if the source page is loaded locally. This vulnerability affects Firefox < 51.
[]
GHSA-pq82-hmr3-5jpv
Certain NETGEAR devices are affected by vertical privilege escalation. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.
[]
CVE-2024-20734
ZDI-CAN-22516: Adobe Acrobat Pro DC AcroForm Use-After-Free Information Disclosure Vulnerability
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:-:*:*:*:pro:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:-:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat:2020:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:2020:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
GHSA-w6f5-v479-3crq
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerability is due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device. Cisco Bug IDs: CSCve74432.
[]
CVE-2024-34714
Hoppscotch Extension responds to calls made by origins not in the domain list
The Hoppscotch Browser Extension is a browser extension for Hoppscotch, a community-driven end-to-end open-source API development ecosystem. Due to an oversight during a change made to the extension in the commit d4e8e4830326f46ba17acd1307977ecd32a85b58, a critical check for the origin list was missed and allowed for messages to be sent to the extension which the extension gladly processed and responded back with the results of, while this wasn't supposed to happen and be blocked by the origin not being present in the origin list. This vulnerability exposes Hoppscotch Extension users to sites which call into Hoppscotch Extension APIs internally. This fundamentally allows any site running on the browser with the extension installed to bypass CORS restrictions if the user is running extensions with the given version. This security hole was patched in the commit 7e364b928ab722dc682d0fcad713a96cc38477d6 which was released along with the extension version `0.35`. As a workaround, Chrome users can use the Extensions Settings to disable the extension access to only the origins that you want. Firefox doesn't have an alternative to upgrading to a fixed version.
[ "cpe:2.3:a:hoppscotch:hoppscotch_extension:*:*:*:*:*:*:*:*" ]
CVE-2024-1097
Stored XSS in craigk5n/webcalendar
A stored cross-site scripting (XSS) vulnerability exists in craigk5n/webcalendar version 1.3.0. The vulnerability occurs in the 'Report Name' input field while creating a new report. An attacker can inject malicious scripts, which are then executed in the context of other users who view the report, potentially leading to the theft of user accounts and cookies.
[ "cpe:2.3:a:webcalendar_project:webcalendar:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:k5n:webcalendar:1.3.0:*:*:*:*:*:*:*" ]
GHSA-vg7r-gjg3-v669
The Qualcomm Wi-Fi driver in Android before 2016-06-01 on Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 27773913.
[]
CVE-2006-6400
Buffer overflow in JustSystems Hanako 2004 through 2006, Hanako viewer 1.x, Ichitaro 2004, Ichitaro 2005, Ichitaro Lite2, Ichitaro viewer 4.x, and Sanshiro 2005 allows remote attackers to execute arbitrary code via the (1) Keyword and (2) Title fields, related to string length fields.
[ "cpe:2.3:a:justsystem:hanako:2004:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:hanako:2005:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:hanako:2006:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:hanako_viewer:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:ichitaro:*:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:ichitaro:2005:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:ichitaro:2006:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:ichitaro_lite2:*:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:ichitaro_lite2:r2:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:ichitaro_viewer:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:justsystem:sanshiro:2005:*:*:*:*:*:*:*" ]
GHSA-9vww-2cq4-q8xh
Missing authentication for critical function vulnerability exists in ID Link Manager and FUJITSU Software TIME CREATOR. If this vulnerability is exploited, sensitive information may be obtained and/or the information stored in the database may be altered by a remote authenticated attacker.
[]
GHSA-c499-4h79-p847
Stack-based buffer overflow in NPSpcSVR.exe in Larson Network Print Server (LstNPS) 9.4.2 build 105 and earlier allows remote attackers to execute arbitrary code via a long argument in a LICENSE command on TCP port 3114.
[]
CVE-2020-25687
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
[ "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
GHSA-4rqp-f36w-28hw
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2015-8864.
[]
CVE-2018-3097
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).
[ "cpe:2.3:a:oracle:outside_in_technology:8.5.3:*:*:*:*:*:*:*" ]
GHSA-f3j9-rq93-g9jv
IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
[]
GHSA-xc2r-2r8h-fqw9
NUUO NVRmini 2 1.0.0 through 3.0.0 and NUUO NVRsolo 1.0.0 through 3.0.0 have hardcoded root credentials, which allows remote attackers to obtain administrative access via unspecified vectors.
[]
GHSA-qpwc-4vhw-6x7f
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to determine kernel memory layout.
[]
CVE-2016-3686
The Single Sign-On (SSO) feature in F5 BIG-IP APM 11.x before 11.6.0 HF6 and BIG-IP Edge Gateway 11.0.0 through 11.3.0 might allow remote attackers to obtain sensitive SessionId information by leveraging access to the Location HTTP header in a redirect.
[ "cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:11.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*" ]
GHSA-8q4v-39jw-37mv
Windows Cursor in Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows improper elevation of privilege, aka "Windows Cursor Elevation of Privilege Vulnerability".
[]
CVE-2023-38949
An issue in a hidden API in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to arbitrarily reset the Administrator password via a crafted web request.
[ "cpe:2.3:a:zkteco:biotime:8.5.5:*:*:*:*:*:*:*" ]
CVE-2015-5812
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
GHSA-w4qj-wrcj-6hfm
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[]
CVE-2019-19194
The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices installs a zero long term key (LTK) if an out-of-order link-layer encryption request is received during Secure Connections pairing. An attacker in radio range can have arbitrary read/write access to protected GATT service data, cause a device crash, or possibly control a device's function by establishing an encrypted session with the zero LTK.
[ "cpe:2.3:a:telink-semi:tlsr8258_ble_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:h:telink-semi:tlsr8258:-:*:*:*:*:*:*:*", "cpe:2.3:a:telink-semi:tlsr8269_ble_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:h:telink-semi:tlsr8269:-:*:*:*:*:*:*:*", "cpe:2.3:a:telink-semi:tlsr8253_ble_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:h:telink-semi:tlsr8253:-:*:*:*:*:*:*:*", "cpe:2.3:a:telink-semi:tlsr8251_ble_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:h:telink-semi:tlsr8251:-:*:*:*:*:*:*:*", "cpe:2.3:a:telink-semi:tlsr8232_ble_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:h:telink-semi:tlsr8232:-:*:*:*:*:*:*:*" ]
GHSA-76pr-h99m-q4fj
In the Linux kernel, the following vulnerability has been resolved:binder: make sure fd closes completeDuring BC_FREE_BUFFER processing, the BINDER_TYPE_FDA object cleanup may close 1 or more fds. The close operations are completed using the task work mechanism -- which means the thread needs to return to userspace or the file object may never be dereferenced -- which can lead to hung processes.Force the binder thread back to userspace if an fd is closed during BC_FREE_BUFFER handling.
[]
CVE-2016-10791
cPanel before 60.0.15 does not ensure that system accounts lack a valid password, so that logins are impossible (CPANEL-9559).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
CVE-2010-3481
Multiple SQL injection vulnerabilities in login.php in ApPHP PHP MicroCMS 1.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) user_name and (2) password variables, possibly related to include/classes/Login.php. NOTE: some of these details are obtained from third party information. NOTE: the password vector might not be vulnerable.
[ "cpe:2.3:a:apphp:php_microcms:1.0.1:*:*:*:*:*:*:*" ]
GHSA-9354-6mjp-r2vv
Kerio Connect 8.0.0 through 9.2.2, and Kerio Connect Client desktop application for Windows and Mac 9.2.0 through 9.2.2, when e-mail preview is enabled, allows remote attackers to conduct clickjacking attacks via a crafted e-mail message.
[]
CVE-2021-0538
In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible exit of emergency callback mode due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-178821491
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
CVE-2024-37243
WordPress Vandana Lite theme <= 1.1.9 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Blossom Themes Vandana Lite allows Cross Site Request Forgery.This issue affects Vandana Lite: from n/a through 1.1.9.
[]
GHSA-cg49-hhrx-hw69
A PIN management problem was discovered on Yubico YubiKey 5 devices 5.2.0 to 5.2.6. OpenPGP has three passwords: Admin PIN, Reset Code, and User PIN. The Reset Code is used to reset the User PIN, but it is disabled by default. A flaw in the implementation of OpenPGP sets the Reset Code to a known value upon initialization. If the retry counter for the Reset Code is set to non-zero without changing the Reset Code, this known value can be used to reset the User PIN. To set the retry counters, the Admin PIN is required.
[]
GHSA-849h-8wj5-xmx8
A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.
[]
GHSA-g5hj-6p24-45c3
Canlineapp Online 1.1 is vulnerable to Broken Access Control and allows users with the Auditor role to create an audit template as a result of improper authorization checks. This feature is designated for supervisor role, but auditors have been able to successfully create audit templates from their account.
[]
CVE-2018-21250
An issue was discovered in Mattermost Server before 5.2.2, 5.1.2, and 4.10.4. It allows remote attackers to cause a denial of service (memory consumption) via crafted image dimensions.
[ "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*" ]
CVE-2023-35817
DevExpress before 23.1.3 allows AsyncDownloader SSRF.
[]
GHSA-q4jm-588w-2cpr
The google-document-embedder plugin before 2.6.1 for WordPress has XSS.
[]