id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
CVE-2006-3271
Multiple SQL injection vulnerabilities in Softbiz Dating 1.0 allow remote attackers to execute SQL commands via the (1) country and (2) sort_by parameters in (a) search_results.php; (3) browse parameter in (b) featured_photos.php; (4) cid parameter in (c) products.php, (d) index.php, and (e) news_desc.php.
[ "cpe:2.3:a:softbiz:dating_script:1.0:*:*:*:*:*:*:*" ]
GHSA-9h2h-gpqp-6qgg
The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 4.5.2 due to insufficient input sanitization and output escaping on user supplied attributes such as listStyle. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2021-24527
Profile Builder < 3.4.9 - Admin Access via Password Reset
The User Registration & User Profile – Profile Builder WordPress plugin before 3.4.9 has a bug allowing any user to reset the password of the admin of the blog, and gain unauthorised access, due to a bypass in the way the reset key is checked. Furthermore, the admin will not be notified of such change by email for example.
[ "cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*" ]
CVE-2003-0338
Directory traversal vulnerability in WsMp3 daemon (WsMp3d) 0.0.10 and earlier allows remote attackers to read and execute arbitrary files via .. (dot dot) sequences in HTTP GET or POST requests.
[ "cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.7:*:*:*:*:*:*:*" ]
CVE-2021-47397
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
In the Linux kernel, the following vulnerability has been resolved: sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb We should always check if skb_header_pointer's return is NULL before using it, otherwise it may cause null-ptr-deref, as syzbot reported: KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline] RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196 Call Trace: <IRQ> sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109 ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422 ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472 dst_input include/net/dst.h:460 [inline] ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline] NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*" ]
GHSA-jcc8-9r23-vj32
An arbitrary file upload vulnerability in the component /admin/cmsTemplate/savePlace of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file.
[]
CVE-2007-3971
Integer overflow in ESET NOD32 Antivirus before 2.2289 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted ASPACK packed file, which triggers an infinite loop.
[ "cpe:2.3:a:eset_software:nod32_antivirus:*:*:*:*:*:*:*:*" ]
CVE-2007-0840
Cross-site scripting (XSS) vulnerability in HLstats before 1.35 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in the search class. NOTE: it is possible that this issue overlaps CVE-2006-4543.3 or CVE-2006-4454.
[ "cpe:2.3:a:hlstats:hlstats:1.34:*:*:*:*:*:*:*" ]
GHSA-f2r6-p94g-v5c4
The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an "Info Box" to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation.
[]
GHSA-vr4g-746h-f4jg
In V5 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291406; Issue ID: MSV-2070.
[]
CVE-2023-5117
Exposure of Sensitive Information Due to Incompatible Policies in GitLab
An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware that files uploaded to comments on confidential issues and epics of public projects could be accessed without authentication via a direct link to the uploaded file URL.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ]
CVE-2024-56752
drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new()
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() When the call to gf100_grctx_generate() fails, unlock gr->fecs.mutex before returning the error. Fixes smatch warning: drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c:480 gf100_gr_chan_new() warn: inconsistent returns '&gr->fecs.mutex'.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-gw29-2hc7-pv7h
In the Linux kernel, the following vulnerability has been resolved:virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()KMSAN reported the following uninit-value access issue:===================================================== BUG: KMSAN: uninit-value in virtio_transport_recv_pkt+0x1dfb/0x26a0 net/vmw_vsock/virtio_transport_common.c:1421 virtio_transport_recv_pkt+0x1dfb/0x26a0 net/vmw_vsock/virtio_transport_common.c:1421 vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120 process_one_work kernel/workqueue.c:2630 [inline] process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703 worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784 kthread+0x3cc/0x520 kernel/kthread.c:388 ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304Uninit was stored to memory at: virtio_transport_space_update net/vmw_vsock/virtio_transport_common.c:1274 [inline] virtio_transport_recv_pkt+0x1ee8/0x26a0 net/vmw_vsock/virtio_transport_common.c:1415 vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120 process_one_work kernel/workqueue.c:2630 [inline] process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703 worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784 kthread+0x3cc/0x520 kernel/kthread.c:388 ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304Uninit was created at: slab_post_alloc_hook+0x105/0xad0 mm/slab.h:767 slab_alloc_node mm/slub.c:3478 [inline] kmem_cache_alloc_node+0x5a2/0xaf0 mm/slub.c:3523 kmalloc_reserve+0x13c/0x4a0 net/core/skbuff.c:559 __alloc_skb+0x2fd/0x770 net/core/skbuff.c:650 alloc_skb include/linux/skbuff.h:1286 [inline] virtio_vsock_alloc_skb include/linux/virtio_vsock.h:66 [inline] virtio_transport_alloc_skb+0x90/0x11e0 net/vmw_vsock/virtio_transport_common.c:58 virtio_transport_reset_no_sock net/vmw_vsock/virtio_transport_common.c:957 [inline] virtio_transport_recv_pkt+0x1279/0x26a0 net/vmw_vsock/virtio_transport_common.c:1387 vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120 process_one_work kernel/workqueue.c:2630 [inline] process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703 worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784 kthread+0x3cc/0x520 kernel/kthread.c:388 ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304CPU: 1 PID: 10664 Comm: kworker/1:5 Not tainted 6.6.0-rc3-00146-g9f3ebbef746f #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-1.fc38 04/01/2014 Workqueue: vsock-loopback vsock_loopback_workThe following simple reproducer can cause the issue described above:int main(void) { int sock; struct sockaddr_vm addr = { .svm_family = AF_VSOCK, .svm_cid = VMADDR_CID_ANY, .svm_port = 1234, };sock = socket(AF_VSOCK, SOCK_STREAM, 0); connect(sock, (struct sockaddr *)&addr, sizeof(addr)); return 0; }This issue occurs because the `buf_alloc` and `fwd_cnt` fields of the `struct virtio_vsock_hdr` are not initialized when a new skb is allocated in `virtio_transport_init_hdr()`. This patch resolves the issue by initializing these fields during allocation.
[]
GHSA-2rrp-mjwj-c49q
Directory traversal vulnerability in includes/startmodules.inc.php in FreeWebshop.org 2.2.9 R2, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang_file parameter.
[]
CVE-2005-1754
JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products.
[ "cpe:2.3:a:apache_tomcat:apache_tomcat:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.3.2:*:*:*:*:*:*:*" ]
GHSA-hr96-qfvm-52r6
Maven Integration Plugin did not mask sensitive values in module build logs
Jenkins Maven Integration Plugin 3.3 and earlier did not apply build log decorators to module builds, potentially revealing sensitive build variables in the build log.
[]
CVE-2021-3462
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
[ "cpe:2.3:a:lenovo:power_management_driver:*:*:*:*:*:windows_10:*:*", "cpe:2.3:h:lenovo:thinkpad_11e_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_11e_yoga_gen_6:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_13_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_25:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a275:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a285:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a475:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a485:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e14:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e14_gen2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e15:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e15_gen2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e470:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e470c:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e475:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e490:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e495:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e570:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e570c:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e575:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e590:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e595:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l13:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l13_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l13_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l13_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l13_yoga_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l13_yoga_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l14_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l14_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l15_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l15_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l380_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l390:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l390_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l470:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l490:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l570:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l590:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p1_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p1_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p14s_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p14s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15s_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15s_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p15v_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p17_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p43s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p51:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p52:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p52s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p53:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p53s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p72:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p73:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_r14:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_r14_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_r480:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s1_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s2_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s2_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s2_gen_6:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s2_yoga_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s2_yoga_gen_6:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s3_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s5_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14s_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t14s_gen_2i:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15g_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t15p_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t470s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t480:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t480s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t490:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t490s:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t495:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t570:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t580:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t590:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_6:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_7:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_8:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_9:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_extreme_2nd:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_extreme_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_nano_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_tablet_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_tablet_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_titanium_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_3:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_4:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_6:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x12:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_gen_2i:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x280:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x390:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x390_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x395:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_yoga_11e_gen_5:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_yoga_370:-:*:*:*:*:*:*:*" ]
CVE-2020-35913
An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness.
[ "cpe:2.3:a:lock_api_project:lock_api:*:*:*:*:*:rust:*:*" ]
CVE-2022-22006
HEVC Video Extensions Remote Code Execution Vulnerability
HEVC Video Extensions Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" ]
CVE-2020-8614
An issue was discovered on Askey AP4000W TDC_V1.01.003 devices. An attacker can perform Remote Code Execution (RCE) by sending a specially crafted network packer to the bd_svr service listening on TCP port 54188.
[ "cpe:2.3:o:askey:ap4000w_firmware:tdc_v1.01.003:*:*:*:*:*:*:*", "cpe:2.3:h:askey:ap4000w:-:*:*:*:*:*:*:*" ]
CVE-2022-46580
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the user_edit_page parameter in the wifi_captive_portal function.
[ "cpe:2.3:o:trendnet:tew-755ap_firmware:1.13b01:*:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-755ap:-:*:*:*:*:*:*:*" ]
CVE-2023-43846
Incorrect access control in logs management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote attackers to get the device logs via HTTP GET request. The logs contain such information as user names and IP addresses used in the infrastructure. This information may help the attackers to conduct further attacks in the infrastructure.
[ "cpe:2.3:o:aten:pe6208_firmware:2.3.228:*:*:*:*:*:*:*", "cpe:2.3:o:aten:pe6208_firmware:2.4.232:*:*:*:*:*:*:*" ]
CVE-2014-2950
Datum Systems SnIP on PSM-500 and PSM-4500 devices does not require authentication for FTP sessions, which allows remote attackers to obtain sensitive information via RETR commands.
[ "cpe:2.3:o:datumsystems:snip:-:*:*:*:*:*:psm-4500:*", "cpe:2.3:o:datumsystems:snip:-:*:*:*:*:*:psm-500:*" ]
CVE-2019-13568
CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image.
[ "cpe:2.3:a:cimg:cimg:*:*:*:*:*:*:*:*" ]
GHSA-cjh8-4rc2-q72f
Microsoft Internet Explorer 7.0 on Windows XP and Vista allows remote attackers to conduct phishing attacks and possibly execute arbitrary code via a res: URI to navcancl.htm with an arbitrary URL as an argument, which displays the URL in the location bar of the "Navigation Canceled" page and injects the script into the "Refresh the page" link, aka Navigation Cancel Page Spoofing Vulnerability."
[]
CVE-2005-1348
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
[ "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*" ]
CVE-2016-3199
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3214.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*" ]
GHSA-2m84-5h7m-hv52
The Tor Browser the Short Guide (aka com.wTorShortUserManual) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-xw67-vhv2-m2p4
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
[]
GHSA-v7jj-p23v-hq9f
A vulnerability, which was classified as critical, was found in SourceCodester Simple To-Do List System 1.0. Affected is an unknown function of the file /delete_task.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-956j-9x9f-hjj8
Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs Paid Member Subscriptions.This issue affects Paid Member Subscriptions: from n/a through 2.11.0.
[]
GHSA-rgjj-vq6w-2826
Unspecified vulnerability in Spey 0.3.3 has unknown impact and attack vectors related to "A number of security holes which could lead to compromise," a different issue than CVE-2005-4846.
[]
CVE-2013-4280
Insecure temporary file vulnerability in RedHat vsdm 4.9.6.
[ "cpe:2.3:a:redhat:virtual_desktop_server_manager:4.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*" ]
GHSA-22x5-xjpj-vgh2
novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability.
[]
CVE-2015-4221
Cisco Unified Communications Manager IM and Presence Service 9.1(1) does not properly restrict access to encrypted passwords, which allows remote attackers to determine cleartext passwords, and consequently execute arbitrary commands, by visiting an unspecified web page and then conducting a decryption attack, aka Bug ID CSCuq46194.
[ "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:9.1\\(1\\):*:*:*:*:*:*:*" ]
CVE-2019-20670
Certain NETGEAR devices are affected by stored XSS. This affects RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
[ "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*" ]
CVE-2024-48223
Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/fieldlist.
[ "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*" ]
GHSA-v525-vvmv-fh2m
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_customer.php.
[]
CVE-2023-26333
ZDI-CAN-20214: Adobe Dimension USDC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-qpjm-j8ww-v798
Cisco Prime Data Center Network Manager (DCNM) before 6.1(1) does not properly restrict access to certain JBoss MainDeployer functionality, which allows remote attackers to execute arbitrary commands via JBoss Application Server Remote Method Invocation (RMI) services, aka Bug ID CSCtz44924.
[]
CVE-2017-8448
An error was found in the permission model used by X-Pack Alerting 5.0.0 to 5.6.0 whereby users mapped to certain built-in roles could create a watch that results in that user gaining elevated privileges.
[ "cpe:2.3:a:elastic:x-pack:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:elastic:x-pack:5.6.0:*:*:*:*:*:*:*" ]
GHSA-7pc7-hfxf-c22q
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Rashid87 WPSection allows PHP Local File Inclusion.This issue affects WPSection: from n/a through 1.3.8.
[]
GHSA-9926-q94j-c3rc
The Danfoss AK-EM100 web applications allow for Reflected Cross-Site Scripting.
[]
CVE-2020-9350
Graph Builder in SAS Visual Analytics 8.5 allows XSS via a graph template that is accessed directly.
[ "cpe:2.3:a:sas:visual_analytics:8.5:*:*:*:*:*:*:*" ]
GHSA-4m8f-fmhm-mchq
Ellucian (formerly SunGard) Banner Student 8.5.1.2 through 8.7 allow remote attackers to enumerate user accounts via a series of requests.
[]
GHSA-v45r-m2rh-mpv3
Cross-site scripting (XSS) vulnerability in the Process Inspector in IBM Business Process Manager (BPM) 8.0.x through 8.0.1.3 and 8.5.x through 8.5.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[]
CVE-2018-11255
An issue was discovered in PoDoFo 0.9.5. The function PdfPage::GetPageNumber() in PdfPage.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document.
[ "cpe:2.3:a:podofo_project:podofo:0.9.5:*:*:*:*:*:*:*" ]
GHSA-3rjx-wj56-x9pm
When BIG-IP APM Guided Configurations are configured, undisclosed sensitive information may be logged in restnoded log.Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
GHSA-9mx8-5rcr-64g4
The kernel in IBM AIX 5.2 and 5.3 does not properly handle resizing JFS2 filesystems on concurrent volume groups spread across multiple nodes, which allows local users of one node to cause a denial of service (remote node crash) by using chfs or lreducelv to reduce a filesystem's size.
[]
CVE-2023-22095
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). The supported version that is affected is 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" ]
CVE-2022-42711
In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.
[ "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*" ]
GHSA-w632-rj9m-jxp2
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14881.
[]
CVE-2016-10043
An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user).
[ "cpe:2.3:a:mrf:web_panel:9.0.1:*:*:*:*:*:*:*" ]
GHSA-9pqq-q9h6-282w
Integer overflow in the WebGL implementation in Google Chrome before 22.0.1229.79 on Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
CVE-2019-6117
The wpape APE GALLERY plugin 1.6.14 for WordPress has stored XSS via the classGallery.php getCategories function.
[ "cpe:2.3:a:wpape:ape_gallery:1.6.14:*:*:*:*:wordpress:*:*" ]
CVE-2004-2172
EarlyImpact ProductCart uses a weak encryption scheme to encrypt passwords, which allows remote attackers to obtain the password via a chosen plaintext attack.
[ "cpe:2.3:a:netsourcecommerce:productcart:*:*:*:*:*:*:*:*" ]
CVE-2024-6447
FULL <= 3.1.12 - Unauthenticated Stored Cross-Site Scripting via License Plan Parameter
The FULL – Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever an administrative user accesses wp-admin dashboard
[]
CVE-2005-1680
D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.
[ "cpe:2.3:h:d-link:dsl-502t:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:dsl-504t:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:dsl-562t:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:dsl-g604t:*:*:*:*:*:*:*:*" ]
GHSA-9frf-r7c7-j2vg
Out of bounds write in stackvector
StackVec::extend used the lower and upper bounds from an Iterator's size_hint to determine how many items to push into the stack based vector. If the size_hint implementation returned a lower bound that was larger than the upper bound, StackVec would write out of bounds and overwrite memory on the stack. As mentioned by the size_hint documentation, size_hint is mainly for optimization and incorrect implementations should not lead to memory safety issues.
[]
GHSA-pjj8-w7g3-6hwq
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive.
[]
GHSA-3rm9-rm94-6p3r
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
[]
GHSA-5vq4-c62g-74hv
IBM Watson Knowledge Catalog on Cloud Pak for Data 4.0 could allow an authenticated user send a specially crafted request that could cause a denial of service. IBM X-Force ID: 251704.
[]
CVE-2022-50215
scsi: sg: Allow waiting for commands to complete on removed device
In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Allow waiting for commands to complete on removed device When a SCSI device is removed while in active use, currently sg will immediately return -ENODEV on any attempt to wait for active commands that were sent before the removal. This is problematic for commands that use SG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel when userspace frees or reuses it after getting ENODEV, leading to corrupted userspace memory (in the case of READ-type commands) or corrupted data being sent to the device (in the case of WRITE-type commands). This has been seen in practice when logging out of a iscsi_tcp session, where the iSCSI driver may still be processing commands after the device has been marked for removal. Change the policy to allow userspace to wait for active sg commands even when the device is being removed. Return -ENODEV only when there are no more responses to read.
[]
GHSA-897f-hr6q-h5f4
In Proget MDM, a low-privileged user can access information about changes contained in backups of all devices managed by the MDM (Mobile Device Management). This information include user ids, email addresses, first names, last names and device UUIDs. The last one can be used for exploitation of CVE-2025-1416.Successful exploitation requires UUID of a targeted backup, which cannot be brute forced.This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
[]
GHSA-4w26-p3x4-j4mv
An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2.
[]
GHSA-hvh3-v3c3-3rmj
The Better Font Awesome WordPress plugin before 2.0.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
CVE-2024-31612
Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information.
[ "cpe:2.3:a:emlog:emlog:*:*:*:*:*:*:*:*", "cpe:2.3:a:emlog:emlog:2.3.0:*:*:*:pro:*:*:*" ]
GHSA-hc4h-qxrx-4g37
The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13, watchOS 9. An app may be able to execute arbitrary code with kernel privileges.
[]
CVE-2022-24107
Xpdf prior to 4.04 lacked an integer overflow check in JPXStream.cc.
[ "cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*" ]
CVE-2013-4101
Cryptocat before 2.0.22 Link Markup Decorator HTML Handling Weakness
[ "cpe:2.3:a:cryptocat_project:cryptocat:*:*:*:*:*:*:*:*" ]
CVE-2013-4027
IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 through 7.1.1.12, and 7.5 before 7.5.0.5 allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*" ]
GHSA-86r4-66c9-2rvr
An Authentication Bypass vulnerability in Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication using "Javascript debugging."
[]
GHSA-f4xc-j3pp-mcpj
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
[]
GHSA-qgmq-76m4-c2jv
In the Linux kernel, the following vulnerability has been resolved:media: uvcvideo: Fix deadlock during uvc_probeIf uvc_probe() fails, it can end up calling uvc_status_unregister() before uvc_status_init() is called.Fix this by checking if dev->status is NULL or not in uvc_status_unregister().
[]
CVE-2024-3058
ENL Newsletter <= 1.0.1 - Stored XSS via CSRF
The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
[]
GHSA-fhc4-5jch-gg65
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378.
[]
GHSA-62hr-jq8p-r596
Substance3D - Modeler versions 1.14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2023-46761
Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ]
CVE-2015-5281
The grub2 package before 2.02-0.29 in Red Hat Enterprise Linux (RHEL) 7, when used on UEFI systems, allows local users to bypass intended Secure Boot restrictions and execute non-verified code via a crafted (1) multiboot or (2) multiboot2 module in the configuration file or physically proximate attackers to bypass intended Secure Boot restrictions and execute non-verified code via the (3) boot menu.
[ "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ]
GHSA-xxv2-p56v-rf8g
Unspecified vulnerability in FreeSSHD 1.2.4 allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
[]
CVE-2024-39661
WordPress Kubio AI Page Builder plugin <= 2.2.4 - Authenticated Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ExtendThemes Kubio AI Page Builder.This issue affects Kubio AI Page Builder: from n/a through 2.2.4.
[]
GHSA-gjrc-x48f-9w6j
SQL injection vulnerability in classifide_ad.php in AJ Auction 6.2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the item_id parameter.
[]
CVE-2024-5574
WP Magazine Modules Lite <= 1.1.2 - Authenticated (Contributor+) Local File Inclusion
The WP Magazine Modules Lite plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.2 via the 'blockLayout' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
[ "cpe:2.3:a:codevibrant:wp-magazine-modules:*:*:*:*:*:*:*:*" ]
GHSA-p9vq-4r9p-r387
Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
[]
CVE-2018-19796
An open redirect in the Ninja Forms plugin before 3.3.19.1 for WordPress allows Remote Attackers to redirect a user via the lib/StepProcessing/step-processing.php (aka submissions download page) redirect parameter.
[ "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*" ]
GHSA-vcwh-ghpm-79h9
qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
[]
CVE-2025-48340
WordPress User Profile Meta Manager plugin <= 1.02 - CSRF to Privilege Escalation vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Danny Vink User Profile Meta Manager allows Privilege Escalation.This issue affects User Profile Meta Manager: from n/a through 1.02.
[]
CVE-2021-22675
The affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior).
[ "cpe:2.3:a:ti:cc3100_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:ti:cc3200_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:ti:simplelink_cc13x0_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:ti:simplelink_cc13x2_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:ti:simplelink_cc26xx_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:ti:simplelink_cc32xx_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:ti:simplelink_msp432e4_software_development_kit:*:*:*:*:*:*:*:*" ]
CVE-2022-23488
BigBlueButton vulnerable to Insertion of Sensitive Information Into Sent Data
BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6 are vulnerable to Insertion of Sensitive Information Into Sent Data. The moderators-only webcams lock setting is not enforced on the backend, which allows an attacker to subscribe to viewers' webcams, even when the lock setting is applied. (The required streamId was being sent to all users even with lock setting applied). This issue is fixed in version 2.4-rc-6. There are no workarounds.
[ "cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:alpha1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:alpha2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta3:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta4:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc4:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc5:*:*:*:*:*:*" ]
CVE-2020-11702
An issue was discovered in ProVide (formerly zFTPServer) through 13.1. The User Web Interface has Multiple Stored and Reflected XSS issues. Collaborate is Reflected via the filename parameter. Collaborate is Stored via the displayname parameter. Deletemultiple is Reflected via the files parameter. Share is Reflected via the target parameter. Share is Stored via the displayname parameter. Waitedit is Reflected via the Host header.
[ "cpe:2.3:a:provideserver:provide_ftp_server:*:*:*:*:*:windows:*:*" ]
GHSA-7r46-x7fj-jf8c
Multiple cross-site scripting (XSS) vulnerabilities in usercp.php in MyBulletinBoard (MyBB) 1.02 allow remote attackers to inject arbitrary web script or HTML via the (1) notepad parameter in a notepad action and (2) signature parameter in an editsig action. NOTE: These are different attack vectors, and probably a different vulnerability, than CVE-2006-0218 and CVE-2006-0219.
[]
GHSA-wmrg-883r-jcp6
A stored cross-site scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the course "Title" and "Content" fields.
[]
GHSA-prq2-qj2r-jcgv
In the Linux kernel, the following vulnerability has been resolved:net: rds: fix memory leak in rds_recvmsgSyzbot reported memory leak in rds. The problem was in unputted refcount in case of error.int rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size, int msg_flags) { ...After this "if" inc refcount incremented and... out: return ret; }in case of rds_cmsg_recv() fail the refcount won't be decremented. And it's easy to see from ftrace log, that rds_inc_addref() don't have rds_inc_put() pair in rds_recvmsg() after rds_cmsg_recv()3.721 us | rds_inc_addref();3.853 us | rds_message_inc_copy_to_user();10.395 us | rds_cmsg_recv();34.260 us | }
[]
GHSA-f38r-jrwh-28gc
Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'category' parameter of the category.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
CVE-2007-5621
Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames.
[ "cpe:2.3:a:drupal:asin_field_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:e-commerce_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:fullname_field_for_cck:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:invite_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:node_relativity_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:pathauto_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:paypal_node_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:token_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:ubercart_module:*:*:*:*:*:*:*:*" ]
CVE-2014-3021
IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.35, 8.0 before 8.0.0.10, and 8.5 before 8.5.5.4 does not properly handle HTTP headers, which allows remote attackers to obtain sensitive cookie and authentication data via an unspecified HTTP method.
[ "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.0.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:-:liberty_profile:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:-:*:*:liberty_profile:*:*:*" ]
GHSA-7456-jpq8-24rh
Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.
[]
CVE-2023-42932
A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.2, macOS Ventura 13.6.3, macOS Monterey 12.7.2. An app may be able to access protected user data.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-4r9f-9cvp-xjm7
iManager Admin Console in NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 was vulnerable to iFrame manipulation attacks, which could allow remote users to gain access to authentication credentials.
[]
GHSA-c56c-hf5f-5xjh
iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference.
[]