id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
GHSA-3m7c-r5mh-w5f4 | An XSS issue was discovered in the Threads to Link plugin 1.3 for MyBB. When editing a thread, the user is given the option to convert the thread to a link. The thread link input box is not properly sanitized. | []
|
|
GHSA-hprv-64x7-q4c8 | The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print(). | []
|
|
CVE-2008-2271 | The Site Documentation Drupal module 5.x before 5.x-1.8 and 6.x before 6.x-1.1 allows remote authenticated users to gain privileges of other users by leveraging the "access content" permission to list tables and obtain session IDs from the database. | [
"cpe:2.3:a:site_documentation_project:site_documentation:*:*:*:*:*:drupal:*:*"
]
|
|
CVE-2023-42573 | PendingIntent hijacking vulnerability in Search Widget prior to version 3.4 in China models allows local attackers to access data. | [
"cpe:2.3:a:samsung:search_widget:*:*:*:*:*:*:*:*"
]
|
|
GHSA-7gwq-xm24-vx8r | A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/admin_login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
|
|
GHSA-qjmc-wwmw-cq9r | Tryton Directory Traversal vulnerability | Directory traversal vulnerability in the client in Tryton 3.0.0, as distributed before 20131104 and earlier, allows remote servers to write arbitrary files via path separators in the extension of a report. | []
|
GHSA-7pg3-r4wv-7xmh | The Cost Calculator WordPress plugin through 1.4 allows users with a role as low as Contributor to perform path traversal and local PHP file inclusion on Windows Web Servers via the Cost Calculator post's Layout | []
|
|
GHSA-5vcc-86wm-547q | Improper Privilege Management in djangorestframework-simplejwt | djangorestframework-simplejwt version 5.3.1 and before is vulnerable to information disclosure. A user can access web application resources even after their account has been disabled due to missing user validation checks via the for_user method. | []
|
GHSA-j785-x57f-22x3 | login in HP-UX 10.26 does not record failed login attempts in /var/adm/btmp, which could allow attackers to conduct brute force password guessing attacks without being detected or observed using the lastb program. | []
|
|
GHSA-9gg2-wj6f-29qm | A CWE-306: Missing Authentication for Critical Function vulnerability exists in Easergy T200 ((Modbus) SC2-04MOD-07000100 and earlier), Easergy T200 ((IEC104) SC2-04IEC-07000100 and earlier), and Easergy T200 ((DNP3) SC2-04DNP-07000102 and earlier) that could cause unauthorized operation when authentication is bypassed. | []
|
|
GHSA-3fv4-6wvg-x83x | Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence. | []
|
|
GHSA-j95v-2qpj-v897 | A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session. | []
|
|
GHSA-6w9r-jpj4-8wmc | Untrusted search path vulnerability in JustSystems Ichitaro 2011 Sou, Ichitaro 2006 through 2011, Ichitaro Government 2006 through 2010, Ichitaro Portable with oreplug, Ichitaro Viewer, JUST School, JUST School 2009 and 2010, JUST Jump 4, JUST Frontier, and oreplug allows local users to gain privileges via a Trojan horse DLL in the current working directory. | []
|
|
CVE-2016-0053 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*"
]
|
|
GHSA-hqmq-gf3p-rvf7 | Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp. | []
|
|
CVE-2019-18261 | In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, all versions, the software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks. | [
"cpe:2.3:o:omron:plc_cj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:plc_cs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:omron:plc_nj_firmware:*:*:*:*:*:*:*:*"
]
|
|
GHSA-pv7h-c97m-6hrh | Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability discovered in Ultimate Reviews WordPress plugin (versions <= 3.0.15). | []
|
|
GHSA-9fj8-q94p-vwc3 | Multiple SQL injection vulnerabilities in Eclime 1.1.2b allow remote attackers to execute arbitrary SQL commands via the (1) ref or (2) poll_id parameter to index.php, or the (3) country parameter to create_account.php. | []
|
|
CVE-2015-7399 | IBM WebSphere Message Broker 7 before 7.0.0.8 and 8 before 8.0.0.6 and IBM Integration Bus 9 before 9.0.0.3 and 10 before 10.0.0.0 allow remote attackers to obtain sensitive information about the HTTP server via unspecified vectors. | [
"cpe:2.3:a:ibm:integration_bus:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.5:*:*:*:*:*:*:*"
]
|
|
GHSA-q658-rvwc-wq3g | NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which the software reads from a buffer by using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer, which may lead to code execution, denial of service, escalation of privileges, or information disclosure. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3). | []
|
|
GHSA-rv56-w27c-3229 | An issue was discovered in Skybox Platform before 7.5.201. Stored cross-site scripting vulnerabilities exist in the title, Comments, or Description field to /skyboxview/webskybox/tickets in Change Manager. | []
|
|
GHSA-mgh8-h8qf-wr9q | A denial of service vulnerability in Tremolo/dpen.s in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31647370. | []
|
|
GHSA-9m3p-jcwj-fgwg | Windows Peer Name Resolution Protocol Denial of Service Vulnerability | []
|
|
CVE-2016-3329 | Microsoft Internet Explorer 9 through 11 and Edge allow remote attackers to determine the existence of files via a crafted webpage, aka "Internet Explorer Information Disclosure Vulnerability." | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
]
|
|
GHSA-8fgw-wvm8-3x84 | It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium. | []
|
|
CVE-2021-30543 | Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
|
|
CVE-2006-7082 | Rigter Portal System (RPS) 1.0, 2.0, and 3.0 allows remote attackers to bypass authentication and upload arbitrary files via direct requests to (1) adm/photos/images.php and (2) adm/down/files.php. | [
"cpe:2.3:a:rigter_portal_system:rigter_portal_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rigter_portal_system:rigter_portal_system:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rigter_portal_system:rigter_portal_system:3.0:*:*:*:*:*:*:*"
]
|
|
CVE-2024-38824 | CVE-2024-38824 salt advisory | Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory. | []
|
GHSA-jxp3-8j73-7x4p | A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D45; 12.3X48 prior to 12.3X48-D30; 14.1 prior to 14.1R4-S9, 14.1R8; 14.2 prior to 14.2R6; 15.1 prior to 15.1F5, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D232, 15.1X53-D47. | []
|
|
CVE-2020-14838 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
]
|
|
CVE-2010-0766 | Integer overflow in the Swap4 function in valet4.dll in Luxology Modo 401 allows user-assisted remote attackers to execute arbitrary code via a .LXO file containing a CHNL subchunk associated with an invalid length. | [
"cpe:2.3:a:luxology:modo:401:*:*:*:*:*:*:*"
]
|
|
GHSA-f5m9-r5hc-4gww | A vulnerability in Cisco Webex Training could allow an authenticated, remote attacker to join a password-protected meeting without providing the meeting password. The vulnerability is due to improper validation of input to API requests that are a part of meeting join flow. An attacker could exploit this vulnerability by sending an API request to the application, which would return a URL that includes a meeting join page that is prepopulated with the meeting username and password. A successful exploit could allow the attacker to join the password-protected meeting. The attacker would be visible in the attendee list of the meeting. | []
|
|
GHSA-8g4v-c2f9-p89g | Arctera eDiscovery Platform before 10.3.2, when Enterprise Vault Collection Module is used, places a cleartext password on a command line in EVSearcher. | []
|
|
GHSA-f8wx-h5g6-hjg3 | Multiple SQL injection vulnerabilities in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allow remote administrators to execute arbitrary SQL commands via the (1) select_invitaion_code_bulk_option or (2) invi_del_id parameter in the pie-invitation-codes page to wp-admin/admin.php. | []
|
|
CVE-2023-36704 | Windows Setup Files Cleanup Remote Code Execution Vulnerability | Windows Setup Files Cleanup Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
|
CVE-2022-41282 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains an out of bounds read vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:jt2go:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
]
|
|
CVE-2005-2008 | Yaws Webserver 1.55 and earlier allows remote attackers to obtain the source code for yaws scripts via a request to a yaw script with a trailing %00 (null). | [
"cpe:2.3:a:yaws:webserver:1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:yaws:webserver:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:yaws:webserver:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:yaws:webserver:1.53:*:*:*:*:*:*:*",
"cpe:2.3:a:yaws:webserver:1.54:*:*:*:*:*:*:*",
"cpe:2.3:a:yaws:webserver:1.55:*:*:*:*:*:*:*"
]
|
|
GHSA-v326-937j-3p86 | Mattermost WelcomeBot plugin fails to to validate the membership status when inviting or adding users to channels allowing guest accounts to be added or invited to channels by default. | []
|
|
CVE-2025-53121 | Stored XSS in multiple 33.0.8files in opennms/opennms | Multiple stored XSS were found on different nodes with unsanitized parameters in OpenMNS Horizon 33.0.8 and versions earlier than 33.1.6 on multiple platforms that allow an attacker to store on database and then inject HTML and/or Javascript on the page. The solution is to upgrade to Horizon 33.1.6, 33.1.7 or Meridian 2024.2.6, 2024.2.7 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Fábio Tomé for reporting this issue. | []
|
GHSA-rh4q-6p8f-jm89 | A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33351708. | []
|
|
GHSA-v67r-3f67-cvcj | Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. | []
|
|
CVE-2024-44308 | The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. | [
"cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:iphone:*",
"cpe:2.3:o:apple:ipad_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*"
]
|
|
GHSA-7547-299x-4pmv | Improper session management vulnerability in Samsung Health prior to 6.20.1.005 prevents logging out from Samsung Health App. | []
|
|
CVE-2021-27187 | The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 stores authentication credentials in cleartext in login.sav when the Save Password box is checked. | [
"cpe:2.3:a:xn--b1agzlht:fx_aggregator_terminal_client:1.0:*:*:*:*:*:*:*"
]
|
|
GHSA-5wf9-7h86-fgr8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HTML Forms allows Reflected XSS.This issue affects HTML Forms: from n/a through 1.4.1. | []
|
|
GHSA-w2w4-j48p-h5j9 | A vulnerability, which was classified as critical, was found in PHPGurukul BP Monitoring Management System 1.0. Affected is an unknown function of the file change-password.php of the component Change Password Handler. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225336. | []
|
|
GHSA-3v83-crv9-cf9p | In the Linux kernel, the following vulnerability has been resolved:gtp: fix use-after-free and null-ptr-deref in gtp_newlink()The gtp_link_ops operations structure for the subsystem must be
registered after registering the gtp_net_ops pernet operations structure.Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:[ 1010.702740] gtp: GTP module unloaded
[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI
[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1
[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00
[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203
[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000
[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282
[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000
[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80
[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400
[ 1010.715953] FS: 00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000
[ 1010.715958] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0
[ 1010.715968] PKRU: 55555554
[ 1010.715972] Call Trace:
[ 1010.715985] ? __die_body.cold+0x1a/0x1f
[ 1010.715995] ? die_addr+0x43/0x70
[ 1010.716002] ? exc_general_protection+0x199/0x2f0
[ 1010.716016] ? asm_exc_general_protection+0x1e/0x30
[ 1010.716026] ? gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.716034] ? gtp_net_exit+0x150/0x150 [gtp]
[ 1010.716042] __rtnl_newlink+0x1063/0x1700
[ 1010.716051] ? rtnl_setlink+0x3c0/0x3c0
[ 1010.716063] ? is_bpf_text_address+0xc0/0x1f0
[ 1010.716070] ? kernel_text_address.part.0+0xbb/0xd0
[ 1010.716076] ? __kernel_text_address+0x56/0xa0
[ 1010.716084] ? unwind_get_return_address+0x5a/0xa0
[ 1010.716091] ? create_prof_cpu_mask+0x30/0x30
[ 1010.716098] ? arch_stack_walk+0x9e/0xf0
[ 1010.716106] ? stack_trace_save+0x91/0xd0
[ 1010.716113] ? stack_trace_consume_entry+0x170/0x170
[ 1010.716121] ? __lock_acquire+0x15c5/0x5380
[ 1010.716139] ? mark_held_locks+0x9e/0xe0
[ 1010.716148] ? kmem_cache_alloc_trace+0x35f/0x3c0
[ 1010.716155] ? __rtnl_newlink+0x1700/0x1700
[ 1010.716160] rtnl_newlink+0x69/0xa0
[ 1010.716166] rtnetlink_rcv_msg+0x43b/0xc50
[ 1010.716172] ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716179] ? lock_acquire+0x1fe/0x560
[ 1010.716188] ? netlink_deliver_tap+0x12f/0xd50
[ 1010.716196] netlink_rcv_skb+0x14d/0x440
[ 1010.716202] ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716208] ? netlink_ack+0xab0/0xab0
[ 1010.716213] ? netlink_deliver_tap+0x202/0xd50
[ 1010.716220] ? netlink_deliver_tap+0x218/0xd50
[ 1010.716226] ? __virt_addr_valid+0x30b/0x590
[ 1010.716233] netlink_unicast+0x54b/0x800
[ 1010.716240] ? netlink_attachskb+0x870/0x870
[ 1010.716248] ? __check_object_size+0x2de/0x3b0
[ 1010.716254] netlink_sendmsg+0x938/0xe40
[ 1010.716261] ? netlink_unicast+0x800/0x800
[ 1010.716269] ? __import_iovec+0x292/0x510
[ 1010.716276] ? netlink_unicast+0x800/0x800
[ 1010.716284] __sock_sendmsg+0x159/0x190
[ 1010.716290] ____sys_sendmsg+0x712/0x880
[ 1010.716297] ? sock_write_iter+0x3d0/0x3d0
[ 1010.716304] ? __ia32_sys_recvmmsg+0x270/0x270
[ 1010.716309] ? lock_acquire+0x1fe/0x560
[ 1010.716315] ? drain_array_locked+0x90/0x90
[ 1010.716324] ___sys_sendmsg+0xf8/0x170
[ 1010.716331] ? sendmsg_copy_msghdr+0x170/0x170
[ 1010.716337] ? lockdep_init_map
---truncated--- | []
|
|
GHSA-h5rh-9xr7-mqj3 | Exposure of sensitive information to an unauthorized actor in Power Automate allows an unauthorized attacker to elevate privileges over a network. | []
|
|
CVE-2025-1463 | Spreadsheet Integration <= 3.8.2 - Cross-Site Request Forgery to Arbitrary Post Publish | The Spreadsheet Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.2. This is due to improper nonce validation within the class-wpgsi-show.php script. This makes it possible for unauthenticated attackers to publish arbitrary posts, including private, granted they can trick a site administrator into performing an action such as clicking on a link. | []
|
CVE-2006-4070 | Format string vulnerability in Imendio Planner 0.13 allows user-assisted attackers to execute arbitrary code via format string specifiers in a filename. | [
"cpe:2.3:a:imendio_planner:imendio_planner:0.13:*:*:*:*:*:*:*"
]
|
|
CVE-2018-4020 | An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_ac_mode` POST parameter parameter. | [
"cpe:2.3:a:netgate:pfsense:2.4.4:*:*:*:*:*:*:*"
]
|
|
CVE-2018-13009 | An issue was discovered in gpmf-parser 1.1.2. There is a heap-based buffer over-read in GPMF_parser.c in the function GPMF_Next, related to certain checks for GPMF_KEY_END and nest_level (conditional on a buffer_size_longs check). | [
"cpe:2.3:a:gopro:gpmf-parser:1.1.2:*:*:*:*:*:*:*"
]
|
|
CVE-2025-47463 | WordPress Stock Locations for WooCommerce <= 2.8.6 - Broken Access Control Vulnerability | Missing Authorization vulnerability in Fahad Mahmood Stock Locations for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Stock Locations for WooCommerce: from n/a through 2.8.6. | []
|
CVE-2023-3208 | RoadFlow Visual Process Engine .NET Core Mvc Login sql injection | A vulnerability, which was classified as critical, has been found in RoadFlow Visual Process Engine .NET Core Mvc 2.13.3. Affected by this issue is some unknown functionality of the file /Log/Query?appid=0B736354-9473-4D66-B9C0-15CAC149EB05&tabid=tab_0B73635494734D66B9C015CAC149EB05 of the component Login. The manipulation of the argument sidx/sord leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231230 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:roadflow:roadflow:2.13.3:*:*:*:*:*:*:*"
]
|
GHSA-x26p-4qc2-77fw | The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 due to lack of randomization of a user controlled key. This makes it possible for unauthenticated attackers to access customer shopping carts and edit product links, add or delete products, and discover coupon codes. | []
|
|
GHSA-xjxg-cjfr-wxm6 | Network Policy Server (NPS) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 misparses username queries, which allows remote attackers to cause a denial of service (RADIUS authentication outage) via crafted requests, aka "Network Policy Server RADIUS Implementation Denial of Service Vulnerability." | []
|
|
GHSA-7rwq-85qc-qq76 | Tor before 0.1.2.15 does not properly distinguish "streamids from different exits," which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams. | []
|
|
GHSA-pvrv-v6wr-f2vv | Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history. | []
|
|
CVE-2001-1236 | myphpPagetool PHP script 0.4.3-1 and earlier allows remote attackers to execute arbitrary code by including files from remote web sites, using an HTTP request that modifies the includedir variable. | [
"cpe:2.3:a:sebastian_bunka:myphppagetool:0.4.3.1:*:*:*:*:*:*:*"
]
|
|
GHSA-j279-7379-x7mj | NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2. | []
|
|
CVE-2023-43646 | Inefficient Regular Expression Complexity in get-func-name | get-func-name is a module to retrieve a function's name securely and consistently both in NodeJS and the browser. Versions prior to 2.0.1 are subject to a regular expression denial of service (redos) vulnerability which may lead to a denial of service when parsing malicious input. This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input: '\t'.repeat(54773) + '\t/function/i'. This issue has been addressed in commit `f934b228b` which has been included in releases from 2.0.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:chaijs:get-func-name:*:*:*:*:*:node.js:*:*"
]
|
GHSA-gxrc-xc5x-p823 | An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file. | []
|
|
GHSA-mqqj-fx8h-437j | PrivateBin allows shortening of URLs for other domains | In [v1.5](https://github.com/PrivateBin/PrivateBin/blob/master/CHANGELOG.md#15-2022-12-11) we introduced the YOURLS server-side proxy. The idea was to allow using the YOURLs URL shortener without running the YOURLs instance without authentication and/or exposing the authentication token to the public, allowing anyone to shorten any URL. With the proxy mechanism, anyone can shorten any URL pointing to the configured PrivateBin instance. The vulnerability allowed other URLs to be shortened, as long as they contain the PrivateBin instance, defeating the limit imposed by the proxy.Neither the confidentially of existing pastes on the server nor the configuration options including the YOURLs token are affected.ImpactThis issue only affects non-standard configurations of PrivateBin. Instances are affected if all of the following conditions are met:The PrivateBin instance enables URL shortening.A YOURLs URL shortener is used and it is configured not to be public and require authentication to shorten URLs.A basepath, the YOURLs proxy mechanism and an authentication token is configured in PrivateBin to use the non-public YOURLs instance.A crafted URL is sent to PrivateBins' YOURLs proxy endpoint with a URL that contains the PrivateBin instance URL as a GET-parameter or as part of the URL-fragment, but doesn't start with the instance URL (a third-party URL)The root cause is, [that the guard clause checking whether the URL to be shortened belongs to your own PrivateBin domain only checks if the PrivateBin instance is contained in the URL](https://github.com/PrivateBin/PrivateBin/blob/3cba170f3255de21bbebb77f6c565519ef33e8c1/lib/YourlsProxy.php#L50-L53) but not if it starts with it.This is a kind of authentication bypass due to incomplete filtering. This [has a similar impact like an open redirect](https://cwe.mitre.org/data/definitions/601.html) except it does not directly redirect, but allows a further hiding of the target URL as is common and known for URL shorteners. If the URL shortener domain used is trusted by it's users, this allows hiding a malicious URL.The highest impact may be that this can be used for phishing campaigns, by routing users to some kind of fake site mimicking the trusted shortener or PrivateBin domain, which could then extract sensitive data from entered data or similar. That said, this is a general concern with URL shorteners and users are advised to follow general phishing prevention attempts like verifying the domain of the site they are using and [using a trusted PrivateBin instance](https://github.com/PrivateBin/PrivateBin?tab=readme-ov-file#what-it-doesnt-provide).Indicators of exploitationCheck your YOURLs proxy for shortened domains that do not start with your own PrivateBin instance. Also note, that for this to be a result of an exploitation of this vulnerability, somewhere in the URL the `base path + ?` e.g. `https://privatebin.example/?` has to appear in the destination URL, as this is what the guard checked for.PatchesThe problem has been patched in version 1.7.4 of PrivateBin. In addition to upgrading, users of the YOURLs proxy feature should check for the indicators of exploitation, as outlined above.WorkaroundsDisable URL shortening, if you have been using it.Only the YOURLs proxy is affected. Other URL shortening options either require a public, un-authenticated shortener, or expose the token to the client, which by design allows shortening any URL.Proof of conceptSee [the unit test that got introduced](https://github.com/PrivateBin/PrivateBin/blob/2c711e9d3ca21230fc68f5b4dba2a7a0592b963b/tst/YourlsProxyTest.php#L57-L62) to prevent similar regressions for an example of a URL that would circumvent the configured basepath.Here is an example of how a manual exploitation would work:In a PrivateBin instance hosted on `https://privatebin.example/`, with a valid URL YOURLs shortening proxy configuration using a token to prevent un-authenticated short-URL creation, send a URL shortening request for the domain `https://attacker.example.com/?q=https://privatebin.example/?foo#bar`. `attacker.example.com` is any attacker controlled, arbitrary domain.You can do this by sending a GET request to `https://privatebin.example/shortenviayourls?link=https%3A%2F%2Fattacker.example.com%2F%3Fq%3Dhttps%3A%2F%2Fprivatebin.example%2F%3Ffoo%23bar`, without URL encoding this looks as follows: `https://privatebin.example/shortenviayourls?link=https://attacker.example.com/?q=https://privatebin.example/?foo#bar`.On an affected setup, you will get a valid short URL, which when accessed, leads to `https://attacker.example.com/?foo#bar`, the attackers domain. On a patched system your request will get rejected and only URLs starting with `https://privatebin.example/?[...]` are allowed for shortening.Post-mortemFrom our limited analysis, the issue [has been introduced in commit `0dc9ab7` while refactoring](https://github.com/PrivateBin/PrivateBin/commit/0dc9ab7576d5a1296debeb788afb2ae9c72d137c). The use of [`substr`](http://php.net/manual/function.substr.php) got replaced by [`strpos`](https://www.php.net/manual/function.strpos). The [initial contribution](https://github.com/PrivateBin/PrivateBin/commit/b0f17f0a91cdebbfd6732781943f1e04ce3311f7) contained no tests, but an implementation without this flaw. All these changes got introduced [in a single pull request](https://github.com/PrivateBin/PrivateBin/pull/997). This follows many best practices, as tests were added and the refactoring was done in close collaboration with the original author.In the future, [we plan to switch to the more obvious, readable and understandable](https://github.com/PrivateBin/PrivateBin/issues/1373) [`str_starts_with`](https://www.php.net/manual/function.str-starts-with.php), which is available since PHP v8. Such a better function naming and insisting on using modern functions would not only result in a better code quality, but would possibly have prevented the issue, but for backwards-compatibility with PHP 7.3, we stay on the old function for now.Final ThoughtsThe project maintainers have always discouraged the use of URL shorteners and **users are always safer sharing the complete, long URL to a paste**, see [our FAQ](https://github.com/PrivateBin/PrivateBin/wiki/FAQ#the-url-is-so-long-cant-i-just-use-an-url-shortener).If you need or want to provide a URL shortener option as a PrivateBin instance administrator, YOURLs is the _best option_ available to use with PrivateBin, because it is the only shortener supported, through the proxy mechanism, preventing arbitrarily shortening any URLs. Running a public URL shortener instance and allowing anonymous users shortening arbitrary domains invites the shortener getting abused.ReferencesPR to fix the vulnerability: https://github.com/PrivateBin/PrivateBin/pull/1370Timeline2024-06-28 Issue report by @nbxiglk via email2024-06-29 Vulnerability reproduced by @elrido, mitigation created and shared with maintainers and issue reporter for review2024-07-06 Pull request with mitigation raised | []
|
GHSA-4prh-gqw8-rgh5 | Apache Tomcat Directory Traversal | Directory traversal vulnerability in Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a `..` (dot dot) sequence with combinations of (1) `/` (slash), (2) `\` (backslash), and (3) URL-encoded backslash (`%5C`) characters in the URL, which are valid separators in Tomcat but not in Apache. | []
|
CVE-2019-8898 | An information disclosure issue existed in the handling of the Storage Access API. This issue was addressed with improved logic. This issue is fixed in iOS 13.3 and iPadOS 13.3, tvOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows. Visiting a maliciously crafted website may reveal sites a user has visited. | [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
]
|
|
GHSA-rcq2-f9v3-rfv8 | Windows Kerberos Elevation of Privilege Vulnerability. | []
|
|
GHSA-w398-xm3m-xwv3 | Add announcement function in the 101EIP system does not filter special characters, which allows authenticated users to inject JavaScript and perform a stored XSS attack. | []
|
|
GHSA-hc93-58pv-v5gr | Unrestricted file upload vulnerability in the file manager module in DotNetNuke before 4.8.2 allows remote administrators to upload arbitrary files and gain privileges to the server via unspecified vectors. | []
|
|
CVE-2001-0581 | Spytech Spynet Chat Server 6.5 allows a remote attacker to create a denial of service (crash) via a large number of connections to port 6387. | [
"cpe:2.3:a:spytech:spynet_chat:*:*:*:*:*:*:*:*"
]
|
|
GHSA-279h-w9gh-fpvc | In Youngzsoft CCFile (aka CC File Transfer) 3.6, by sending a crafted HTTP request, it is possible for a malicious user to remotely crash the affected software. No authentication is required. An example payload is a malformed request header with many '|' characters. NOTE: some sources use this ID for a NoviWare issue, but the correct ID for that issue is CVE-2017-12787. | []
|
|
CVE-2022-29255 | Multiple evaluation of contract address in call in vyper | Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4. | [
"cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*"
]
|
CVE-2024-45115 | Adobe Commerce | Improper Authentication (CWE-287) | Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction. | [
"cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*"
]
|
CVE-2021-38305 | 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. | [
"cpe:2.3:a:23andme:yamale:*:*:*:*:*:*:*:*"
]
|
|
GHSA-98fp-7v67-4v3q | PyTorch Lightning denial of service vulnerability | A vulnerability in lightning-ai/pytorch-lightning version 2.3.2 allows an attacker to cause a denial of service by sending an unexpected POST request to the `/api/v1/state` endpoint of `LightningApp`. This issue occurs due to improper handling of unexpected state values, which results in the server shutting down. | []
|
CVE-2023-21449 | Improper access control vulnerability in Call application prior to SMR Mar-2023 Release 1 allows local attackers to access sensitive information without proper permission. | [
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*"
]
|
|
CVE-2020-12265 | The decompress package before 4.2.1 for Node.js is vulnerable to Arbitrary File Write via ../ in an archive member, when a symlink is used, because of Directory Traversal. | [
"cpe:2.3:a:decompress_project:decompress:*:*:*:*:*:node.js:*:*"
]
|
|
GHSA-8c55-f8rh-4fh4 | cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call. | []
|
|
GHSA-95r5-mmf3-59p3 | An improper absolute path traversal vulnerability was reported for the Ready For application allowing a local application access to files without authorization. | []
|
|
CVE-2023-1566 | SourceCodester Medical Certificate Generator App action.php sql injection | A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been declared as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223558 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:medical_certificate_generator_app_project:medical_certificate_generator_app:1.0:*:*:*:*:*:*:*"
]
|
GHSA-mxpr-25c4-rq7w | A local privilege escalation vulnerability in the ThinkPad Hybrid USB-C with USB-A Dock Firmware Update Tool could allow an attacker with local access to execute code with elevated privileges during the package upgrade or installation. | []
|
|
GHSA-j2hf-jfff-fhwj | This issue was addressed with improved entitlements. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4. A malicious application may be able to modify protected parts of the file system. | []
|
|
CVE-2021-43295 | Zoho ManageEngine SupportCenter Plus before 11016 is vulnerable to Reflected XSS in the Accounts module. | [
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11006:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11007:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11009:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11012:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11013:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11014:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11015:*:*:*:*:*:*"
]
|
|
CVE-2014-1860 | Contao CMS through 3.2.4 has PHP Object Injection Vulnerabilities | [
"cpe:2.3:a:contao:contao_cms:*:*:*:*:*:*:*:*"
]
|
|
CVE-2003-1377 | Buffer overflow in the reverse DNS lookup of Smart IRC Daemon (SIRCD) 0.4.0 and 0.4.4 allows remote attackers to execute arbitrary code via a client with a long hostname. | [
"cpe:2.3:a:sircd:sircd:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sircd:sircd:0.4.4:*:*:*:*:*:*:*"
]
|
|
CVE-2024-34572 | WordPress Fancy Elementor Flipbox plugin <= 2.4.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemePrix Fancy Elementor Flipbox fancy-elementor-flipbox allows Stored XSS.This issue affects Fancy Elementor Flipbox: from n/a through 2.4.2.
| []
|
GHSA-3jx4-3grj-xm5w | Vulnerability CVE-2024-22021 allows a Veeam Recovery Orchestrator user with a low privileged role (Plan Author) to retrieve plans from a Scope other than the one they are assigned to. | []
|
|
CVE-2014-3679 | The Monitoring plugin before 1.53.0 for Jenkins allows remote attackers to obtain sensitive information by accessing unspecified pages. | [
"cpe:2.3:a:jenkins-ci:monitoring_plugin:*:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.40.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.41.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.42.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.43.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.44.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.45.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.46.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.47.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.48.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.49.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.50.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.51.0:*:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:monitoring_plugin:1.52.0:*:*:*:*:cloudbees_jenkins:*:*"
]
|
|
GHSA-rm37-r67v-9m9w | An issue was discovered in certain Apple products. macOS before 10.13.4 is affected. The issue involves the "Notes" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app. | []
|
|
CVE-2009-3194 | Cross-site scripting (XSS) vulnerability in index.php in JCE-Tech SearchFeed Script allows remote attackers to inject arbitrary web script or HTML via the search parameter. | [
"cpe:2.3:a:jce-tech:searchfeed_script:*:*:*:*:*:*:*:*"
]
|
|
GHSA-mx49-v6wc-9vxf | SAP Financial Consolidation allows data to enter
a Web application through an untrusted source. These endpoints are exposed over
the network and it allows the user to modify the content from the web site. On
successful exploitation, an attacker can cause significant impact to
confidentiality and integrity of the application. | []
|
|
CVE-2022-34361 | IBM Sterling Secure Proxy information disclosure |
IBM Sterling Secure Proxy 6.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 230522.
| [
"cpe:2.3:a:ibm:sterling_secure_proxy:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:linux_on_ibm_z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
CVE-2010-1636 | The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the btrfs functionality in the Linux kernel 2.6.29 through 2.6.32, and possibly other versions, does not ensure that a cloned file descriptor has been opened for reading, which allows local users to read sensitive information from a write-only file descriptor. | [
"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*"
]
|
|
CVE-2009-2177 | code/display.php in fuzzylime (cms) 3.03a and earlier, when magic_quotes_gpc is disabled, allows remote attackers to conduct directory traversal attacks and overwrite arbitrary files via a "....//" (dot dot) in the s parameter, which is collapsed into a "../" value. | [
"cpe:2.3:a:fuzzylime:fuzzylime_cms:3.03a:*:*:*:*:*:*:*"
]
|
|
CVE-2002-0112 | Etype Eserv 2.97 allows remote attackers to view password protected files via /./ in the URL. | [
"cpe:2.3:a:etype:eserv:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.93:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.94:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.95_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.96:*:*:*:*:*:*:*",
"cpe:2.3:a:etype:eserv:2.97:*:*:*:*:*:*:*"
]
|
|
CVE-2018-14650 | It was discovered that sos-collector does not properly set the default permissions of newly created files, making all files created by the tool readable by any local user. A local attacker may use this flaw by waiting for a legit user to run sos-collector and steal the collected data in the /var/tmp directory. | [
"cpe:2.3:a:sos-collector_project:sos-collector:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*"
]
|
|
GHSA-hg4v-vm5j-rq45 | User is allowed to set an email as a notification email even without verifying the new email in all previous GitLab CE/EE versions through 13.0.1 | []
|
|
CVE-2002-0675 | Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 does not require administrative privileges to perform a firmware upgrade, which allows unauthorized users to upgrade the phone. | [
"cpe:2.3:h:pingtel:xpressa:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:h:pingtel:xpressa:1.2.7.4:*:*:*:*:*:*:*"
]
|
|
GHSA-gqjw-c3j9-r345 | Multiple PHP remote file inclusion vulnerabilities in Web Server Creator - Web Portal (WSC-WebPortal) 0.1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) l parameter to customize.php or the (2) pg parameter to index.php. | []
|
|
GHSA-mrq3-m48q-67j2 | The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation. | []
|
|
GHSA-hvf8-35gm-22pj | Tenda W20E V16.01.0.6(3392) is vulnerable to Buffer Overflow. | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.