id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2006-3271 | Multiple SQL injection vulnerabilities in Softbiz Dating 1.0 allow remote attackers to execute SQL commands via the (1) country and (2) sort_by parameters in (a) search_results.php; (3) browse parameter in (b) featured_photos.php; (4) cid parameter in (c) products.php, (d) index.php, and (e) news_desc.php. | [
"cpe:2.3:a:softbiz:dating_script:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-9h2h-gpqp-6qgg | The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 4.5.2 due to insufficient input sanitization and output escaping on user supplied attributes such as listStyle. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2021-24527 | Profile Builder < 3.4.9 - Admin Access via Password Reset | The User Registration & User Profile – Profile Builder WordPress plugin before 3.4.9 has a bug allowing any user to reset the password of the admin of the blog, and gain unauthorised access, due to a bypass in the way the reset key is checked. Furthermore, the admin will not be notified of such change by email for example. | [
"cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*"
] |
CVE-2003-0338 | Directory traversal vulnerability in WsMp3 daemon (WsMp3d) 0.0.10 and earlier allows remote attackers to read and execute arbitrary files via .. (dot dot) sequences in HTTP GET or POST requests. | [
"cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.7:*:*:*:*:*:*:*"
] |
|
CVE-2021-47397 | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb | In the Linux kernel, the following vulnerability has been resolved:
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
We should always check if skb_header_pointer's return is NULL before
using it, otherwise it may cause null-ptr-deref, as syzbot reported:
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]
RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196
Call Trace:
<IRQ>
sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109
ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422
ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472
dst_input include/net/dst.h:460 [inline]
ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*"
] |
GHSA-jcc8-9r23-vj32 | An arbitrary file upload vulnerability in the component /admin/cmsTemplate/savePlace of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. | [] |
|
CVE-2007-3971 | Integer overflow in ESET NOD32 Antivirus before 2.2289 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted ASPACK packed file, which triggers an infinite loop. | [
"cpe:2.3:a:eset_software:nod32_antivirus:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-0840 | Cross-site scripting (XSS) vulnerability in HLstats before 1.35 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in the search class. NOTE: it is possible that this issue overlaps CVE-2006-4543.3 or CVE-2006-4454. | [
"cpe:2.3:a:hlstats:hlstats:1.34:*:*:*:*:*:*:*"
] |
|
GHSA-f2r6-p94g-v5c4 | The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an "Info Box" to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation. | [] |
|
GHSA-vr4g-746h-f4jg | In V5 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291406; Issue ID: MSV-2070. | [] |
|
CVE-2023-5117 | Exposure of Sensitive Information Due to Incompatible Policies in GitLab | An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware that files uploaded to comments on confidential issues and epics of public projects could be accessed without authentication via a direct link to the uploaded file URL. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] |
CVE-2024-56752 | drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() | In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new()
When the call to gf100_grctx_generate() fails, unlock gr->fecs.mutex
before returning the error.
Fixes smatch warning:
drivers/gpu/drm/nouveau/nvkm/engine/gr/gf100.c:480 gf100_gr_chan_new() warn: inconsistent returns '&gr->fecs.mutex'. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-gw29-2hc7-pv7h | In the Linux kernel, the following vulnerability has been resolved:virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()KMSAN reported the following uninit-value access issue:=====================================================
BUG: KMSAN: uninit-value in virtio_transport_recv_pkt+0x1dfb/0x26a0 net/vmw_vsock/virtio_transport_common.c:1421
virtio_transport_recv_pkt+0x1dfb/0x26a0 net/vmw_vsock/virtio_transport_common.c:1421
vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120
process_one_work kernel/workqueue.c:2630 [inline]
process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703
worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784
kthread+0x3cc/0x520 kernel/kthread.c:388
ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304Uninit was stored to memory at:
virtio_transport_space_update net/vmw_vsock/virtio_transport_common.c:1274 [inline]
virtio_transport_recv_pkt+0x1ee8/0x26a0 net/vmw_vsock/virtio_transport_common.c:1415
vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120
process_one_work kernel/workqueue.c:2630 [inline]
process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703
worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784
kthread+0x3cc/0x520 kernel/kthread.c:388
ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304Uninit was created at:
slab_post_alloc_hook+0x105/0xad0 mm/slab.h:767
slab_alloc_node mm/slub.c:3478 [inline]
kmem_cache_alloc_node+0x5a2/0xaf0 mm/slub.c:3523
kmalloc_reserve+0x13c/0x4a0 net/core/skbuff.c:559
__alloc_skb+0x2fd/0x770 net/core/skbuff.c:650
alloc_skb include/linux/skbuff.h:1286 [inline]
virtio_vsock_alloc_skb include/linux/virtio_vsock.h:66 [inline]
virtio_transport_alloc_skb+0x90/0x11e0 net/vmw_vsock/virtio_transport_common.c:58
virtio_transport_reset_no_sock net/vmw_vsock/virtio_transport_common.c:957 [inline]
virtio_transport_recv_pkt+0x1279/0x26a0 net/vmw_vsock/virtio_transport_common.c:1387
vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120
process_one_work kernel/workqueue.c:2630 [inline]
process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703
worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784
kthread+0x3cc/0x520 kernel/kthread.c:388
ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304CPU: 1 PID: 10664 Comm: kworker/1:5 Not tainted 6.6.0-rc3-00146-g9f3ebbef746f #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-1.fc38 04/01/2014
Workqueue: vsock-loopback vsock_loopback_workThe following simple reproducer can cause the issue described above:int main(void)
{
int sock;
struct sockaddr_vm addr = {
.svm_family = AF_VSOCK,
.svm_cid = VMADDR_CID_ANY,
.svm_port = 1234,
};sock = socket(AF_VSOCK, SOCK_STREAM, 0);
connect(sock, (struct sockaddr *)&addr, sizeof(addr));
return 0;
}This issue occurs because the `buf_alloc` and `fwd_cnt` fields of the
`struct virtio_vsock_hdr` are not initialized when a new skb is allocated
in `virtio_transport_init_hdr()`. This patch resolves the issue by
initializing these fields during allocation. | [] |
|
GHSA-2rrp-mjwj-c49q | Directory traversal vulnerability in includes/startmodules.inc.php in FreeWebshop.org 2.2.9 R2, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang_file parameter. | [] |
|
CVE-2005-1754 | JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products. | [
"cpe:2.3:a:apache_tomcat:apache_tomcat:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:javamail:1.3.2:*:*:*:*:*:*:*"
] |
|
GHSA-hr96-qfvm-52r6 | Maven Integration Plugin did not mask sensitive values in module build logs | Jenkins Maven Integration Plugin 3.3 and earlier did not apply build log decorators to module builds, potentially revealing sensitive build variables in the build log. | [] |
CVE-2021-3462 | A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object. | [
"cpe:2.3:a:lenovo:power_management_driver:*:*:*:*:*:windows_10:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_13_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a275:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a285:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a475:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a485:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e14:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e14_gen2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e15:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e15_gen2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e470c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e475:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e495:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e570c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e575:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e595:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_yoga_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_yoga_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l14_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l15_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l15_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p14s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p14s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15v_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p17_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p43s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p72:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p73:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r14:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14s_gen_2i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15g_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15p_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t495:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme_2nd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_nano_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_tablet_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_tablet_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_titanium_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_gen_2i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_370:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-35913 | An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness. | [
"cpe:2.3:a:lock_api_project:lock_api:*:*:*:*:*:rust:*:*"
] |
|
CVE-2022-22006 | HEVC Video Extensions Remote Code Execution Vulnerability | HEVC Video Extensions Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*"
] |
CVE-2020-8614 | An issue was discovered on Askey AP4000W TDC_V1.01.003 devices. An attacker can perform Remote Code Execution (RCE) by sending a specially crafted network packer to the bd_svr service listening on TCP port 54188. | [
"cpe:2.3:o:askey:ap4000w_firmware:tdc_v1.01.003:*:*:*:*:*:*:*",
"cpe:2.3:h:askey:ap4000w:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-46580 | TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the user_edit_page parameter in the wifi_captive_portal function. | [
"cpe:2.3:o:trendnet:tew-755ap_firmware:1.13b01:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-755ap:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-43846 | Incorrect access control in logs management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote attackers to get the device logs via HTTP GET request. The logs contain such information as user names and IP addresses used in the infrastructure. This information may help the attackers to conduct further attacks in the infrastructure. | [
"cpe:2.3:o:aten:pe6208_firmware:2.3.228:*:*:*:*:*:*:*",
"cpe:2.3:o:aten:pe6208_firmware:2.4.232:*:*:*:*:*:*:*"
] |
|
CVE-2014-2950 | Datum Systems SnIP on PSM-500 and PSM-4500 devices does not require authentication for FTP sessions, which allows remote attackers to obtain sensitive information via RETR commands. | [
"cpe:2.3:o:datumsystems:snip:-:*:*:*:*:*:psm-4500:*",
"cpe:2.3:o:datumsystems:snip:-:*:*:*:*:*:psm-500:*"
] |
|
CVE-2019-13568 | CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image. | [
"cpe:2.3:a:cimg:cimg:*:*:*:*:*:*:*:*"
] |
|
GHSA-cjh8-4rc2-q72f | Microsoft Internet Explorer 7.0 on Windows XP and Vista allows remote attackers to conduct phishing attacks and possibly execute arbitrary code via a res: URI to navcancl.htm with an arbitrary URL as an argument, which displays the URL in the location bar of the "Navigation Canceled" page and injects the script into the "Refresh the page" link, aka Navigation Cancel Page Spoofing Vulnerability." | [] |
|
CVE-2005-1348 | Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header. | [
"cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-3199 | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3214. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
] |
|
GHSA-2m84-5h7m-hv52 | The Tor Browser the Short Guide (aka com.wTorShortUserManual) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-xw67-vhv2-m2p4 | CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel. | [] |
|
GHSA-v7jj-p23v-hq9f | A vulnerability, which was classified as critical, was found in SourceCodester Simple To-Do List System 1.0. Affected is an unknown function of the file /delete_task.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-956j-9x9f-hjj8 | Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs Paid Member Subscriptions.This issue affects Paid Member Subscriptions: from n/a through 2.11.0. | [] |
|
GHSA-rgjj-vq6w-2826 | Unspecified vulnerability in Spey 0.3.3 has unknown impact and attack vectors related to "A number of security holes which could lead to compromise," a different issue than CVE-2005-4846. | [] |
|
CVE-2013-4280 | Insecure temporary file vulnerability in RedHat vsdm 4.9.6. | [
"cpe:2.3:a:redhat:virtual_desktop_server_manager:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*"
] |
|
GHSA-22x5-xjpj-vgh2 | novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability. | [] |
|
CVE-2015-4221 | Cisco Unified Communications Manager IM and Presence Service 9.1(1) does not properly restrict access to encrypted passwords, which allows remote attackers to determine cleartext passwords, and consequently execute arbitrary commands, by visiting an unspecified web page and then conducting a decryption attack, aka Bug ID CSCuq46194. | [
"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:9.1\\(1\\):*:*:*:*:*:*:*"
] |
|
CVE-2019-20670 | Certain NETGEAR devices are affected by stored XSS. This affects RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30. | [
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-48223 | Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/fieldlist. | [
"cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-v525-vvmv-fh2m | Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_customer.php. | [] |
|
CVE-2023-26333 | ZDI-CAN-20214: Adobe Dimension USDC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-qpjm-j8ww-v798 | Cisco Prime Data Center Network Manager (DCNM) before 6.1(1) does not properly restrict access to certain JBoss MainDeployer functionality, which allows remote attackers to execute arbitrary commands via JBoss Application Server Remote Method Invocation (RMI) services, aka Bug ID CSCtz44924. | [] |
|
CVE-2017-8448 | An error was found in the permission model used by X-Pack Alerting 5.0.0 to 5.6.0 whereby users mapped to certain built-in roles could create a watch that results in that user gaining elevated privileges. | [
"cpe:2.3:a:elastic:x-pack:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elastic:x-pack:5.6.0:*:*:*:*:*:*:*"
] |
|
GHSA-7pc7-hfxf-c22q | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Rashid87 WPSection allows PHP Local File Inclusion.This issue affects WPSection: from n/a through 1.3.8. | [] |
|
GHSA-9926-q94j-c3rc | The Danfoss AK-EM100 web applications allow for Reflected Cross-Site Scripting. | [] |
|
CVE-2020-9350 | Graph Builder in SAS Visual Analytics 8.5 allows XSS via a graph template that is accessed directly. | [
"cpe:2.3:a:sas:visual_analytics:8.5:*:*:*:*:*:*:*"
] |
|
GHSA-4m8f-fmhm-mchq | Ellucian (formerly SunGard) Banner Student 8.5.1.2 through 8.7 allow remote attackers to enumerate user accounts via a series of requests. | [] |
|
GHSA-v45r-m2rh-mpv3 | Cross-site scripting (XSS) vulnerability in the Process Inspector in IBM Business Process Manager (BPM) 8.0.x through 8.0.1.3 and 8.5.x through 8.5.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [] |
|
CVE-2018-11255 | An issue was discovered in PoDoFo 0.9.5. The function PdfPage::GetPageNumber() in PdfPage.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document. | [
"cpe:2.3:a:podofo_project:podofo:0.9.5:*:*:*:*:*:*:*"
] |
|
GHSA-3rjx-wj56-x9pm | When BIG-IP APM Guided Configurations are configured, undisclosed sensitive information may be logged in restnoded log.Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [] |
|
GHSA-9mx8-5rcr-64g4 | The kernel in IBM AIX 5.2 and 5.3 does not properly handle resizing JFS2 filesystems on concurrent volume groups spread across multiple nodes, which allows local users of one node to cause a denial of service (remote node crash) by using chfs or lreducelv to reduce a filesystem's size. | [] |
|
CVE-2023-22095 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). The supported version that is affected is 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-42711 | In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser. | [
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*"
] |
|
GHSA-w632-rj9m-jxp2 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14881. | [] |
|
CVE-2016-10043 | An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi was discovered to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands and retrieve the output in the application's responses. Attackers could execute unauthorized commands, which could then be used to disable the software, or read, write, and modify data for which the attacker does not have permissions to access directly. Since the targeted application is directly executing the commands instead of the attacker, any malicious activities may appear to come from the application or the application's owner (apache user). | [
"cpe:2.3:a:mrf:web_panel:9.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-9pqq-q9h6-282w | Integer overflow in the WebGL implementation in Google Chrome before 22.0.1229.79 on Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | [] |
|
CVE-2019-6117 | The wpape APE GALLERY plugin 1.6.14 for WordPress has stored XSS via the classGallery.php getCategories function. | [
"cpe:2.3:a:wpape:ape_gallery:1.6.14:*:*:*:*:wordpress:*:*"
] |
|
CVE-2004-2172 | EarlyImpact ProductCart uses a weak encryption scheme to encrypt passwords, which allows remote attackers to obtain the password via a chosen plaintext attack. | [
"cpe:2.3:a:netsourcecommerce:productcart:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-6447 | FULL <= 3.1.12 - Unauthenticated Stored Cross-Site Scripting via License Plan Parameter | The FULL – Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever an administrative user accesses wp-admin dashboard | [] |
CVE-2005-1680 | D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address. | [
"cpe:2.3:h:d-link:dsl-502t:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:dsl-504t:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:dsl-562t:*:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:dsl-g604t:*:*:*:*:*:*:*:*"
] |
|
GHSA-9frf-r7c7-j2vg | Out of bounds write in stackvector | StackVec::extend used the lower and upper bounds from an Iterator's size_hint to determine how many items to push into the stack based vector. If the size_hint implementation returned a lower bound that was larger than the upper bound, StackVec would write out of bounds and overwrite memory on the stack. As mentioned by the size_hint documentation, size_hint is mainly for optimization and incorrect implementations should not lead to memory safety issues. | [] |
GHSA-pjj8-w7g3-6hwq | Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive. | [] |
|
GHSA-3rm9-rm94-6p3r | The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666. | [] |
|
GHSA-5vq4-c62g-74hv | IBM Watson Knowledge Catalog on Cloud Pak for Data 4.0 could allow an authenticated user send a specially crafted request that could cause a denial of service. IBM X-Force ID: 251704. | [] |
|
CVE-2022-50215 | scsi: sg: Allow waiting for commands to complete on removed device | In the Linux kernel, the following vulnerability has been resolved:
scsi: sg: Allow waiting for commands to complete on removed device
When a SCSI device is removed while in active use, currently sg will
immediately return -ENODEV on any attempt to wait for active commands that
were sent before the removal. This is problematic for commands that use
SG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel
when userspace frees or reuses it after getting ENODEV, leading to
corrupted userspace memory (in the case of READ-type commands) or corrupted
data being sent to the device (in the case of WRITE-type commands). This
has been seen in practice when logging out of a iscsi_tcp session, where
the iSCSI driver may still be processing commands after the device has been
marked for removal.
Change the policy to allow userspace to wait for active sg commands even
when the device is being removed. Return -ENODEV only when there are no
more responses to read. | [] |
GHSA-897f-hr6q-h5f4 | In Proget MDM, a low-privileged user can access information about changes contained in backups of all devices managed by the MDM (Mobile Device Management). This information include user ids, email addresses, first names, last names and device UUIDs. The last one can be used for exploitation of CVE-2025-1416.Successful exploitation requires UUID of a targeted backup, which cannot be brute forced.This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite). | [] |
|
GHSA-4w26-p3x4-j4mv | An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. | [] |
|
GHSA-hvh3-v3c3-3rmj | The Better Font Awesome WordPress plugin before 2.0.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] |
|
CVE-2024-31612 | Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information. | [
"cpe:2.3:a:emlog:emlog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emlog:emlog:2.3.0:*:*:*:pro:*:*:*"
] |
|
GHSA-hc4h-qxrx-4g37 | The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13, watchOS 9. An app may be able to execute arbitrary code with kernel privileges. | [] |
|
CVE-2022-24107 | Xpdf prior to 4.04 lacked an integer overflow check in JPXStream.cc. | [
"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-4101 | Cryptocat before 2.0.22 Link Markup Decorator HTML Handling Weakness | [
"cpe:2.3:a:cryptocat_project:cryptocat:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-4027 | IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 through 7.1.1.12, and 7.5 before 7.5.0.5 allows remote authenticated users to bypass intended access restrictions via unspecified vectors. | [
"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*"
] |
|
GHSA-86r4-66c9-2rvr | An Authentication Bypass vulnerability in Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication using "Javascript debugging." | [] |
|
GHSA-f4xc-j3pp-mcpj | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). | [] |
|
GHSA-qgmq-76m4-c2jv | In the Linux kernel, the following vulnerability has been resolved:media: uvcvideo: Fix deadlock during uvc_probeIf uvc_probe() fails, it can end up calling uvc_status_unregister() before
uvc_status_init() is called.Fix this by checking if dev->status is NULL or not in
uvc_status_unregister(). | [] |
|
CVE-2024-3058 | ENL Newsletter <= 1.0.1 - Stored XSS via CSRF | The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | [] |
GHSA-fhc4-5jch-gg65 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | [] |
|
GHSA-62hr-jq8p-r596 | Substance3D - Modeler versions 1.14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2023-46761 | Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-5281 | The grub2 package before 2.02-0.29 in Red Hat Enterprise Linux (RHEL) 7, when used on UEFI systems, allows local users to bypass intended Secure Boot restrictions and execute non-verified code via a crafted (1) multiboot or (2) multiboot2 module in the configuration file or physically proximate attackers to bypass intended Secure Boot restrictions and execute non-verified code via the (3) boot menu. | [
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-xxv2-p56v-rf8g | Unspecified vulnerability in FreeSSHD 1.2.4 allows remote attackers to cause a denial of service via unknown vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | [] |
|
CVE-2024-39661 | WordPress Kubio AI Page Builder plugin <= 2.2.4 - Authenticated Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ExtendThemes Kubio AI Page Builder.This issue affects Kubio AI Page Builder: from n/a through 2.2.4. | [] |
GHSA-gjrc-x48f-9w6j | SQL injection vulnerability in classifide_ad.php in AJ Auction 6.2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the item_id parameter. | [] |
|
CVE-2024-5574 | WP Magazine Modules Lite <= 1.1.2 - Authenticated (Contributor+) Local File Inclusion | The WP Magazine Modules Lite plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.2 via the 'blockLayout' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | [
"cpe:2.3:a:codevibrant:wp-magazine-modules:*:*:*:*:*:*:*:*"
] |
GHSA-p9vq-4r9p-r387 | Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors. | [] |
|
CVE-2018-19796 | An open redirect in the Ninja Forms plugin before 3.3.19.1 for WordPress allows Remote Attackers to redirect a user via the lib/StepProcessing/step-processing.php (aka submissions download page) redirect parameter. | [
"cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-vcwh-ghpm-79h9 | qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket. | [] |
|
CVE-2025-48340 | WordPress User Profile Meta Manager plugin <= 1.02 - CSRF to Privilege Escalation vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Danny Vink User Profile Meta Manager allows Privilege Escalation.This issue affects User Profile Meta Manager: from n/a through 1.02. | [] |
CVE-2021-22675 | The affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior). | [
"cpe:2.3:a:ti:cc3100_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ti:cc3200_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ti:simplelink_cc13x0_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ti:simplelink_cc13x2_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ti:simplelink_cc26xx_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ti:simplelink_cc32xx_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ti:simplelink_msp432e4_software_development_kit:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-23488 | BigBlueButton vulnerable to Insertion of Sensitive Information Into Sent Data | BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6 are vulnerable to Insertion of Sensitive Information Into Sent Data. The moderators-only webcams lock setting is not enforced on the backend, which allows an attacker to subscribe to viewers' webcams, even when the lock setting is applied. (The required streamId was being sent to all users even with lock setting applied). This issue is fixed in version 2.4-rc-6. There are no workarounds. | [
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:beta4:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bigbluebutton:bigbluebutton:2.4:rc5:*:*:*:*:*:*"
] |
CVE-2020-11702 | An issue was discovered in ProVide (formerly zFTPServer) through 13.1. The User Web Interface has Multiple Stored and Reflected XSS issues. Collaborate is Reflected via the filename parameter. Collaborate is Stored via the displayname parameter. Deletemultiple is Reflected via the files parameter. Share is Reflected via the target parameter. Share is Stored via the displayname parameter. Waitedit is Reflected via the Host header. | [
"cpe:2.3:a:provideserver:provide_ftp_server:*:*:*:*:*:windows:*:*"
] |
|
GHSA-7r46-x7fj-jf8c | Multiple cross-site scripting (XSS) vulnerabilities in usercp.php in MyBulletinBoard (MyBB) 1.02 allow remote attackers to inject arbitrary web script or HTML via the (1) notepad parameter in a notepad action and (2) signature parameter in an editsig action. NOTE: These are different attack vectors, and probably a different vulnerability, than CVE-2006-0218 and CVE-2006-0219. | [] |
|
GHSA-wmrg-883r-jcp6 | A stored cross-site scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the course "Title" and "Content" fields. | [] |
|
GHSA-prq2-qj2r-jcgv | In the Linux kernel, the following vulnerability has been resolved:net: rds: fix memory leak in rds_recvmsgSyzbot reported memory leak in rds. The problem
was in unputted refcount in case of error.int rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
int msg_flags)
{
...After this "if" inc refcount incremented and...
out:
return ret;
}in case of rds_cmsg_recv() fail the refcount won't be
decremented. And it's easy to see from ftrace log, that
rds_inc_addref() don't have rds_inc_put() pair in
rds_recvmsg() after rds_cmsg_recv()3.721 us | rds_inc_addref();3.853 us | rds_message_inc_copy_to_user();10.395 us | rds_cmsg_recv();34.260 us | } | [] |
|
GHSA-f38r-jrwh-28gc | Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'category' parameter of the category.php resource does not validate the characters received and they are sent unfiltered to the database. | [] |
|
CVE-2007-5621 | Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames. | [
"cpe:2.3:a:drupal:asin_field_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:e-commerce_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:fullname_field_for_cck:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:invite_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:node_relativity_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:pathauto_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:paypal_node_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:token_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:ubercart_module:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-3021 | IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.35, 8.0 before 8.0.0.10, and 8.5 before 8.5.5.4 does not properly handle HTTP headers, which allows remote attackers to obtain sensitive cookie and authentication data via an unspecified HTTP method. | [
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:-:*:*:liberty_profile:*:*:*"
] |
|
GHSA-7456-jpq8-24rh | Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow. | [] |
|
CVE-2023-42932 | A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.2, macOS Ventura 13.6.3, macOS Monterey 12.7.2. An app may be able to access protected user data. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-4r9f-9cvp-xjm7 | iManager Admin Console in NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 was vulnerable to iFrame manipulation attacks, which could allow remote users to gain access to authentication credentials. | [] |
|
GHSA-c56c-hf5f-5xjh | iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.