id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2009-1895 | The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
] |
|
GHSA-cmcx-h36r-grrw | A Windows privilege change issue was discovered in Splashtop Software Updater before 1.5.6.16. Insecure permissions on the configuration file and named pipe allow for local privilege escalation to NT AUTHORITY/SYSTEM, by forcing a permission change to any Splashtop files and directories, with resultant DLL hijacking. This product is bundled with Splashtop Streamer (before 3.3.8.0) and Splashtop Business (before 3.3.8.0). | [] |
|
CVE-2025-26592 | WordPress Inset <= 1.18.0 - Local File Inclusion Vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Inset allows PHP Local File Inclusion. This issue affects Inset: from n/a through 1.18.0. | [] |
CVE-2006-7198 | Unspecified vulnerability in IBM WebSphere Application Server (WAS) before 5.1.1.14, and WAS for z/OS 601 before 6.0.2.13, has unknown impact and attack vectors, related to a "Potential security exposure," aka PK26123. | [
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:racf:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-2351 | Use-after-free vulnerability in Google Chrome before 12.0.742.112 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG use elements. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-1397 | Cross-site request forgery (CSRF) vulnerability in the Labor Reporting page in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5; IBM Tivoli Asset Management for IT 6.2, 7.1, and 7.2; IBM Tivoli Service Request Manager 7.1 and 7.2; IBM Maximo Service Desk 6.2; and IBM Tivoli Change and Configuration Management Database (CCMDB) 6.2, 7.1, and 7.2 allows remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_asset_management_for_it:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_asset_management_for_it:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:trivoli_service_request_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:trivoli_service_request_manager:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_service_desk:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_change_and_configuration_management_database:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_change_and_configuration_management_database:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_change_and_configuration_management_database:7.2:*:*:*:*:*:*:*"
] |
|
CVE-2019-2699 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL). The supported version that is affected is Java SE: 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:jdk:1.8.0:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update202:*:*:*:*:*:*"
] |
|
GHSA-wxg8-cr3q-q5c8 | Out of bound write can occur in playready while processing command due to lack of input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music | [] |
|
CVE-2018-15844 | An issue was discovered in DamiCMS 6.0.0. There is an CSRF vulnerability that can revise the administrator account's password via /admin.php?s=/Admin/doedit. | [
"cpe:2.3:a:damicms:damicms:6.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-wqrq-32pw-4wj8 | An issue was discovered in LibreNMS through 1.47. Several of the scripts perform dynamic script inclusion via the include() function on user supplied input without sanitizing the values by calling basename() or a similar function. An attacker can leverage this to execute PHP code from the included file. Exploitation of these scripts is made difficult by additional text being appended (typically .inc.php), which means an attacker would need to be able to control both a filename and its content on the server. However, exploitation can be achieved as demonstrated by the csv.php?report=../ substring. | [] |
|
GHSA-8v5x-5rvv-5j4v | Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list. | [] |
|
GHSA-9x85-h23c-m9jh | Unspecified vulnerability in HP StoreOnce D2D Backup System 1.x before 1.2.19 and 2.x before 2.3.0 allows remote attackers to cause a denial of service via unknown vectors. | [] |
|
CVE-2020-21506 | waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?m=Config&a=add. | [
"cpe:2.3:a:waimai_super_cms_project:waimai_super_cms:20150505:*:*:*:*:*:*:*"
] |
|
CVE-2016-6149 | SAP HANA SPS09 1.00.091.00.14186593 allows local users to obtain sensitive information by leveraging the EXPORT statement to export files, aka SAP Security Note 2252941. | [
"cpe:2.3:a:sap:hana_sps09:1.00.091.00.14186593:*:*:*:*:*:*:*"
] |
|
GHSA-whhh-xg23-hxcw | In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2023-25889 | ZDI-CAN-19466: Adobe Dimension USD File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-hh96-2mpv-7jr8 | There is a data processing error vulnerability in Leia-B29 2.0.0.49(M03). Successful exploitation could bypass lock screen authentication. | [] |
|
CVE-2020-17011 | Windows Port Class Library Elevation of Privilege Vulnerability | Windows Port Class Library Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] |
GHSA-69q2-4j65-gwmx | Buffer overflow in rwrite for HP-UX 11.0 could allow local users to execute arbitrary code via a long argument. NOTE: the vendor was unable to reproduce the problem on a system that had been patched for an lp vulnerability (CVE-2002-1473). | [] |
|
CVE-2019-4043 | IBM Sterling B2B Integrator Standard Edition 5.2.0 snf 6.0.0.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 156239. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-qp4c-cv95-gwhh | In FLAC__bitreader_read_rice_signed_block of bitreader.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156076070 | [] |
|
GHSA-jfgp-q2hg-w285 | WSO2 API Manager vulnerable to SSRF | WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet. | [] |
GHSA-966j-fc7p-8925 | ** DISPUTED ** The libfsntfs_security_descriptor_values_free function in libfsntfs_security_descriptor_values.c in libfsntfs through 2018-04-20 allows remote attackers to cause a denial of service (double-free) via a crafted ntfs file. NOTE: the vendor has disputed this as described in libyal/libfsntfs issue 8 on GitHub. | [] |
|
GHSA-w697-9m8x-pc8c | Microsoft Windows Media Format Runtime 9.0, 9.5, and 11 and Windows Media Services 9.1 and 2008 do not properly parse malformed headers in Advanced Systems Format (ASF) files, which allows remote attackers to execute arbitrary code via a crafted (1) .asf, (2) .wmv, or (3) .wma file, aka "Windows Media Header Parsing Invalid Free Vulnerability." | [] |
|
CVE-2008-0211 | Unspecified vulnerability in the BIOS F.04 through F.11 for the HP Compaq Business Notebook PC allows local users to cause a denial of service via unspecified vectors. | [
"cpe:2.3:h:compaq:2210_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:2510_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:2710_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6510_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6515_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6520_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6710_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6715_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6720_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6820_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:6910_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:8510_series_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compaq:8710_series_bios:*:*:*:*:*:*:*:*"
] |
|
GHSA-gq9f-wp2w-q86x | SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c. | [] |
|
CVE-2023-7164 | BackWPup < 4.0.4 - Unauthenticated Backup Download | The BackWPup WordPress plugin before 4.0.4 does not prevent Directory Listing in its temporary backup folder, allowing unauthenticated attackers to download backups of a site's database. | [
"cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-14838 | TeamWork Job Links allows Arbitrary File Upload in profileChange and coverChange. | [
"cpe:2.3:a:teamworktec:job_links:-:*:*:*:*:*:*:*"
] |
|
GHSA-x99j-h38h-9frx | A vulnerability in the web-based user interface of the Cisco Secure Access Control Server prior to 5.8 patch 9 could allow an unauthenticated, remote attacker to gain read access to certain information in the affected system. The vulnerability is due to improper handling of XML External Entities (XXEs) when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file. Cisco Bug IDs: CSCve70595. | [] |
|
CVE-2005-2034 | Cross-site scripting (XSS) vulnerability in folderview.asp for BlueCollar iGallery 3.3 allows remote attackers to inject arbitrary web script or HTML via the folder parameter. | [
"cpe:2.3:a:blue-collar_productions:i-gallery:3.3:*:*:*:*:*:*:*"
] |
|
GHSA-cm2r-2mx3-6fv2 | The Rank Math SEO plugin 1.0.27 for WordPress allows non-admin users to reset the settings via the wp-admin/admin-post.php reset-cmb parameter. | [] |
|
GHSA-w8rq-hhvc-jrj9 | Mate10 Pro Huawei smart phones with the versions before 8.1.0.326(C00) have a FRP bypass vulnerability. During the mobile phone reseting process, an attacker could bypass "Find My Phone" protect after a series of voice and keyboard operations. Successful exploit could allow an attacker to bypass FRP. | [] |
|
CVE-2022-22959 | VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability. A malicious actor can trick a user through a cross site request forgery to unintentionally validate a malicious JDBC URI. | [
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_automation:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:20.10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:20.10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
CVE-2002-2015 | PHP file inclusion vulnerability in user.php in PostNuke 0.703 allows remote attackers to include arbitrary files and possibly execute code via the caselist parameter. | [
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.703:*:*:*:*:*:*:*"
] |
|
CVE-2023-50422 | Escalation of Privileges in SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) | SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) - versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. | [
"cpe:2.3:a:sap:cloud-security-services-integration-library:*:*:*:*:*:java:*:*"
] |
CVE-2007-2071 | Multiple cross-site scripting (XSS) vulnerabilities in Open-gorotto 2.0a 2006/02/08 edition, 2006/03/19 edition, and 2006/04/07 edition before 20070416 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) pub/modules/d/_top.html; (2) /pub/modules/a/_access.html; (3) _circletop.html or (4) _cir66.html in pub/modules/ci/; or (5) _fri66.html, (6) _inv66.html, (7) _top.html, (8) _friends.html, or (9) _fri33.html in pub/modules/f/. | [
"cpe:2.3:a:open-gorotto:open-gorotto:2.0_a:*:*:*:*:*:*:*"
] |
|
CVE-2008-3760 | Cross-site request forgery (CSRF) vulnerability in the sign-out page in Vanilla 1.1.4 and earlier allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout via a SignOutNow action to people.php. | [
"cpe:2.3:a:lussumo:vanilla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lussumo:vanilla:1.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-x52f-h74p-9jh8 | node-sqlite is malware | The `node-sqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationAs this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.If you have found this installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [] |
CVE-2024-5882 | Ultimate Classified Listings < 1.3 - Unauthenticated LFI | The Ultimate Classified Listings WordPress plugin before 1.3 does not validate the `ucl_page` and `layout` parameters allowing unauthenticated users to access PHP files on the server from the listings page | [
"cpe:2.3:a:webcodingplace:ultimate_classified_listings:*:*:*:*:*:*:*:*"
] |
CVE-2003-0168 | Buffer overflow in Apple QuickTime Player 5.x and 6.0 for Windows allows remote attackers to execute arbitrary code via a long QuickTime URL. | [
"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-7jr2-g9j6-qc7j | Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764. | [] |
|
CVE-2007-5170 | Unspecified vulnerability in the embedded service processor (SP) before 3.09 in Sun Fire X2100 M2 and X2200 M2 Embedded Lights Out Manager (ELOM) allows remote attackers to send arbitrary network traffic and use ELOM as a spam proxy. | [
"cpe:2.3:h:sun:sun_fire:x2100m2:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sun_fire:x2200m2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:embedded_lights_out_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-wg7m-6ff7-7pcj | libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian. | [] |
|
CVE-2022-1379 | URL Restriction Bypass in plantuml/plantuml | URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers. | [
"cpe:2.3:a:plantuml:plantuml:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] |
CVE-2024-40848 | A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An attacker may be able to read sensitive information. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-25150 | In Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges. | [
"cpe:2.3:a:malwarebytes:binisoft_windows_firewall_control:*:*:*:*:*:*:*:*"
] |
|
GHSA-2jjj-q6r5-r2xp | Cross-site scripting (XSS) vulnerability in shopadmin.asp in VP-ASP Shopping Cart 5.50 allows remote attackers to inject arbitrary web script or HTML via the UserName parameter. | [] |
|
GHSA-vhgh-3352-gh24 | Reflected XSS in wordpress plugin tidio-form v1.0 | [] |
|
CVE-2015-7109 | IOAcceleratorFamily in Apple OS X before 10.11.2 and tvOS before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-qqq7-68c5-p37w | The AFI WordPress plugin before 1.100.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] |
|
GHSA-w67p-c8fh-jmjw | Cross-Site Request Forgery (CSRF) vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin <= 7.5.14 versions. | [] |
|
CVE-2013-6634 | The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*"
] |
|
CVE-2024-6416 | SeaCMS sql injection | A vulnerability was found in SeaCMS 12.9. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /js/player/dmplayer/dmku/?ac=edit. The manipulation of the argument cid with the input (select(0)from(select(sleep(10)))v) leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270007. | [] |
GHSA-c54p-f6g4-xg5h | Unrestricted file upload vulnerability in upload.php in Page Manager 2006-02-04 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. | [] |
|
CVE-2007-0925 | Cross-site scripting (XSS) vulnerability in search/SearchResults.aspx in Community Server allows remote attackers to inject arbitrary web script or HTML via the q parameter. | [
"cpe:2.3:a:communityserver.org:community_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-2091 | admin.php in Virtual War (VWar) 1.5 and versions before 1.2 allows remote attackers to obtain sensitive information via an invalid vwar_root parameter, which reveals the path in an error message. | [
"cpe:2.3:a:vwar:virtual_war:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.5:*:*:*:*:*:*:*"
] |
|
GHSA-6v6j-rx2m-q9mw | Cisco Unified MeetingPlace Web Conferencing Server 7.x before 7.1MR1 Patch 2, 8.0 before 8.0MR1 Patch 2, and 8.5 before 8.5MR3 Patch 1, when the Remember Me option is used, does not properly verify cookies, which allows remote attackers to impersonate users via a crafted login request, aka Bug ID CSCuc64846. | [] |
|
GHSA-hp6r-93x9-m75r | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629. | [] |
|
CVE-2021-25864 | node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file. | [
"cpe:2.3:a:dgtl:huemagic:3.0.0:*:*:*:*:node.js:*:*"
] |
|
CVE-2019-13498 | One Identity Cloud Access Manager 8.1.3 does not use HTTP Strict Transport Security (HSTS), which may allow man-in-the-middle (MITM) attacks. This issue is fixed in version 8.1.4. | [
"cpe:2.3:a:oneidentity:cloud_access_manager:8.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2017-17436 | An issue was discovered in the software on Vaultek Gun Safe VT20i products. There is no encryption of the session between the Android application and the safe. The website and marketing materials advertise that this communication channel is encrypted with "Highest Level Bluetooth Encryption" and "Data transmissions are secure via AES256 bit encryption." These claims, however, are not true. Moreover, AES256 bit encryption is not supported in the Bluetooth Low Energy (BLE) standard, so it would have to be at the application level. This lack of encryption allows an individual to learn the passcode by eavesdropping on the communications between the application and the safe. | [
"cpe:2.3:o:vaulteksafe:vt20i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:vaulteksafe:vt20i:-:*:*:*:*:*:*:*"
] |
|
GHSA-j379-9jr9-w5cq | XML External Entity (XXE) vulnerability in Square Retrofit | Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437. | [] |
CVE-2017-9806 | A vulnerability in the OpenOffice Writer DOC file parser before 4.1.4, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution. | [
"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-2056 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-6631 | On BIG-IP 11.5.1-11.6.4, iRules performing HTTP header manipulation may cause an interruption to service when processing traffic handled by a Virtual Server with an associated HTTP profile, in specific circumstances, when the requests do not strictly conform to RFCs. | [
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*"
] |
|
GHSA-rw86-cvx5-q4pj | There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser. | [] |
|
GHSA-9wc4-3f6c-f7pc | RIFARTEK IOT Wall has a vulnerability of incorrect authorization. An authenticated remote attacker with general user privilege is allowed to perform specific privileged function to access and modify all sensitive data. | [] |
|
GHSA-89p2-cvfx-5rv6 | Animate versions 24.0, 23.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-mh38-x4mv-9qfc | An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves CFPreferences in the "System Preferences" component. It allows attackers to bypass intended access restrictions by leveraging incorrect configuration-profile persistence. | [] |
|
GHSA-5mxp-4f79-c8g9 | In the Linux kernel, the following vulnerability has been resolved:netmem: prevent TX of unreadable skbsCurrently on stable trees we have support for netmem/devmem RX but not
TX. It is not safe to forward/redirect an RX unreadable netmem packet
into the device's TX path, as the device may call dma-mapping APIs on
dma addrs that should not be passed to it.Fix this by preventing the xmit of unreadable skbs.Tested by configuring tc redirect:sudo tc qdisc add dev eth1 ingress
sudo tc filter add dev eth1 ingress protocol ip prio 1 flower ip_proto \
tcp src_ip 192.168.1.12 action mirred egress redirect dev eth1Before, I see unreadable skbs in the driver's TX path passed to dma
mapping APIs.After, I don't see unreadable skbs in the driver's TX path passed to dma
mapping APIs. | [] |
|
GHSA-3w5r-4r6f-6xx4 | IBM Cloud Private 3.1.1 could alllow a local user with administrator privileges to intercept highly sensitive unencrypted data. IBM X-Force ID: 153317. | [] |
|
CVE-2018-7247 | An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact. | [
"cpe:2.3:a:leptonica:leptonica:*:*:*:*:*:*:*:*"
] |
|
GHSA-r2j9-gh64-cp47 | The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 12.3.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-jpp9-f2x8-r6f2 | Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access. | [] |
|
CVE-2025-35978 | Improper restriction of communication channel to intended endpoints issue exists in UpdateNavi V1.4 L10 to L33 and UpdateNaviInstallService Service 1.2.0091 to 1.2.0125. If a local authenticated attacker send malicious data, an arbitrary registry value may be modified or arbitrary code may be executed. | [] |
|
CVE-2024-10354 | SourceCodester Petrol Pump Management Software print.php sql injection | A vulnerability classified as critical was found in SourceCodester Petrol Pump Management Software 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/print.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*"
] |
CVE-2023-2951 | code-projects Bus Dispatch and Information System delete_bus.php sql injection | A vulnerability classified as critical has been found in code-projects Bus Dispatch and Information System 1.0. Affected is an unknown function of the file delete_bus.php. The manipulation of the argument busid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230112. | [
"cpe:2.3:a:bus_dispatch_and_information_system_project:bus_dispatch_and_information_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-ccfj-vhr9-fqvq | SQL injection vulnerability in dropbase.php in MitriDAT Web Calendar Pro allows remote attackers to modify internal SQL queries and cause a denial of service (inaccessible database) via the tabls parameter. | [] |
|
CVE-2020-27348 | snapcraft may build snaps with incorrect LD_LIBRARY_PATH | In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1. | [
"cpe:2.3:a:canonical:snapcraft:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*"
] |
CVE-2018-11299 | In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, when WLAN FW has not filled the vdev id correctly in stats events then WLAN host driver tries to access interface array without proper bound check which can lead to invalid memory access and as a side effect kernel panic or page fault. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-58g2-q7jf-hhpw | IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 162886. | [] |
|
GHSA-7332-j628-x48x | Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] |
|
GHSA-3gj3-p68v-v295 | The instalinker plugin before 1.1.2 for WordPress has includes/instalinker-admin-preview.php?client_id= XSS. | [] |
|
CVE-2019-14400 | cPanel before 78.0.18 allows local users to escalate to root access because of userdata cache misparsing (SEC-479). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-5631 | SQL injection vulnerability in start.asp in Active eWebquiz 8.0 allows remote attackers to execute arbitrary SQL commands via the (1) useremail parameter (aka username field) or the (2) password parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:activewebsoftwares:active_ewebquiz:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-qc7x-3jmj-82m2 | The Who-is-it? Lite name caller time limited free (aka de.profiler.android.whoisit) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-wrf2-7gmj-mf6g | The HTML5 chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'HTML5CHAT' shortcode in all versions up to, and including, 1.04 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-x9rw-3x6c-c4h9 | librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive. | [] |
|
GHSA-4m4v-vqhc-mhjp | The Windows 2000 telnet client attempts to perform NTLM authentication by default, which allows remote attackers to capture and replay the NTLM challenge/response via a telnet:// URL that points to the malicious server, aka the "Windows 2000 Telnet Client NTLM Authentication" vulnerability. | [] |
|
GHSA-x6jw-674q-3wx8 | Improper Access Control in Jfinal CMS v4.7.1 and earlier allows remote attackers to obtain sensitive information or cause a denial of service via the 'FileManager.delete()' function in the component 'modules/filemanager/FileManagerController.java'. | [] |
|
CVE-2008-4779 | Stack-based buffer overflow in TUGzip 3.5.0.0 allows remote attackers to denial of service (crash) or execute arbitrary code via a long filename in a .zip file. | [
"cpe:2.3:a:tguzip:tguzip:3.5.5.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-vqc7-p7p7-97wf | A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly. | [] |
|
CVE-2008-3943 | SQL injection vulnerability in listtest.php in eZoneScripts Living Local 1.1 allows remote attackers to execute arbitrary SQL commands via the r parameter. | [
"cpe:2.3:a:ezonescripts:living_local:1.1:*:*:*:*:*:*:*"
] |
|
GHSA-phmx-3wr6-q2h6 | BisonWare FTP Server 4.1 and earlier allows remote attackers to cause a denial of service via a malformed PORT command that contains a non-numeric character and a large number of carriage returns. | [] |
|
CVE-2024-5967 | Keycloak: leak of configured ldap bind credentials through the keycloak admin console | A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain. | [
"cpe:/a:redhat:build_keycloak:22",
"cpe:/a:redhat:build_keycloak:22::el9",
"cpe:/a:redhat:red_hat_single_sign_on:7.6",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9",
"cpe:/a:redhat:rhosemc:1.0::el8"
] |
CVE-2021-31887 | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). FTP server does not properly validate the length of the “PWD/XPWD” command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0016) | [
"cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_source_code:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_modular_equiment_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_modular_equiment_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:p2_ethernet:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:bacnet:*:*:*",
"cpe:2.3:h:siemens:apogee_pxc_compact:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:p2_ethernet:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:bacnet:*:*:*",
"cpe:2.3:h:siemens:apogee_pxc_modular:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:talon_tc_compact_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:talon_tc_compact:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:talon_tc_modular_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:talon_tc_modular:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc00-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc00-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc00-u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc00-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc001-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc001-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc12-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc12-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc22-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc22-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc22.1-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc22.1-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc36.1-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc36.1-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc50-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc50-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc64-u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc64-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc100-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc100-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc128-u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc128-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc200-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc200-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxm20-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxm20-e:-:*:*:*:*:*:*:*"
] |
|
GHSA-m8v5-qxvp-fxpf | Lack of MBN header size verification against input buffer can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables | [] |
|
GHSA-3f54-w53c-9jjr | CRLF injection vulnerability in goform/formWlSiteSurvey on the Conceptronic C54APM access point with runtime code 1.26 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the submit-url parameter in a Refresh action. | [] |
|
CVE-2023-1081 | Cross-site Scripting (XSS) - Stored in microweber/microweber | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.3. | [
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] |
CVE-2017-9326 | The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed. | [
"cpe:2.3:a:cloudera:cloudera_manager:5.11.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.