id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
GHSA-v4q2-mprg-284p | Certain NETGEAR devices are affected by CSRF. This affects RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. | [] |
|
CVE-2024-8249 | Unauthenticated Denial of Service (DoS) in mintplex-labs/anything-llm | mintplex-labs/anything-llm version git 6dc3642 contains an unauthenticated Denial of Service (DoS) vulnerability in the API for the embeddable chat functionality. An attacker can exploit this vulnerability by sending a malformed JSON payload to the API endpoint, causing a server crash due to an uncaught exception. This issue is fixed in version 1.2.2. | [] |
CVE-2013-4307 | Multiple cross-site scripting (XSS) vulnerabilities in repo/includes/EntityView.php in the Wikibase extension for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow (1) remote attackers to inject arbitrary web script or HTML via a label in the "In other languages" section or (2) remote administrators to inject arbitrary web script or HTML via a description. | [
"cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-1987 | The WP-Members Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.4.9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-qxrq-376q-p39h | LibreNMS Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 23.9.0. | [] |
GHSA-g3fm-rgq3-h9w3 | MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette. | [] |
|
GHSA-g783-p3gp-4q89 | : Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows : Command Injection.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.121. | [] |
|
GHSA-gv84-hwh2-8qh7 | Dell PowerScale OneFS 9.1.0.x-9.4.0.x contain an insertion of sensitive information into log file vulnerability in change password api. A low privilege local attacker could potentially exploit this vulnerability, leading to system takeover. | [] |
|
GHSA-mfqx-8929-rf3c | In the Linux kernel, the following vulnerability has been resolved:usb: dwc2: host: Fix dereference issue in DDMA completion flow.Fixed variable dereference issue in DDMA completion flow. | [] |
|
CVE-2014-1742 | Use-after-free vulnerability in the FrameSelection::updateAppearance function in core/editing/FrameSelection.cpp in Blink, as used in Google Chrome before 34.0.1847.137, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper RenderObject handling. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.94:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.97:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.98:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.99:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.100:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.101:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.102:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.103:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.109:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.111:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.112:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.113:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.114:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.115:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.116:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.118:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.120:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.130:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.131:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.132:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.133:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.134:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:34.0.1847.135:*:*:*:*:*:*:*"
] |
|
CVE-2019-14364 | An XSS vulnerability in the "Email Subscribers & Newsletters" plugin 4.1.6 for WordPress allows an attacker to inject malicious JavaScript code through a publicly available subscription form using the esfpx_name wp-admin/admin-ajax.php POST parameter. | [
"cpe:2.3:a:icegram:email_subscribers_\\&_newsletters:4.1.6:*:*:*:*:wordpress:*:*"
] |
|
CVE-2012-3325 | IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.45, 7.0.x before 7.0.0.25, 8.0.x before 8.0.0.5, and 8.5.x Full Profile before 8.5.0.1, when the PM44303 fix is installed, does not properly validate credentials, which allows remote authenticated users to obtain administrative access via unspecified vectors. | [
"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2000-1215 | The default configuration of Lotus Domino server 5.0.8 includes system information (version, operating system, and build date) in the HTTP headers of replies, which allows remote attackers to obtain sensitive information. | [
"cpe:2.3:a:ibm:lotus_domino:5.0.8:*:*:*:*:*:*:*"
] |
|
GHSA-m2v2-8227-59f5 | Exposure of sensitive information in concrete5/core | In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in "add / edit message”. | [] |
CVE-2023-52385 | Out-of-bounds write vulnerability in the RSMC module.
Impact: Successful exploitation of this vulnerability will affect availability. | [] |
|
GHSA-wpqp-q775-rc59 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] |
|
CVE-2018-17620 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Calculate events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6353. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-3r3v-7p48-rwmv | EMC M&R (aka Watch4Net) before 6.5u1 and ViPR SRM before 3.6.1 might allow remote attackers to obtain cleartext data-center discovery credentials by leveraging certain SRM access to conduct a decryption attack. | [] |
|
GHSA-q64m-983f-x364 | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability." | [] |
|
CVE-2023-5971 | Save as PDF < 3.2.0 - Admin+ Stored XSS | The Save as PDF Plugin by Pdfcrowd WordPress plugin before 3.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*"
] |
CVE-2004-2107 | Finjan SurfinGate 6.0 and 7.0, when running in proxy mode, does not authenticate FHTTP commands on TCP port 3141, which allows remote attackers to use the finjan-parameter-type header to (1) restart the service, (2) use the getlastmsg command to view log information, or (3) use the online command to force a policy update from the database server. | [
"cpe:2.3:a:finjan_software:surfingate:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:finjan_software:surfingate:6.0_1:*:*:*:*:*:*:*",
"cpe:2.3:a:finjan_software:surfingate:6.0_5:*:*:*:*:*:*:*",
"cpe:2.3:a:finjan_software:surfingate:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2004-0694 | Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries. | [
"cpe:2.3:a:tsugio_okamoto:lha:*:*:*:*:*:*:*:*"
] |
|
GHSA-wmgg-3q6m-rjp9 | A vulnerability classified as critical has been found in ESAFENET CDG 5. Affected is the function actionViewCDGRenewFile of the file /com/esafenet/servlet/client/CDGRenewApplicationService.java. The manipulation of the argument CDGRenewFileId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-jhp7-5v8q-5544 | Backup file without encryption vulnerability is found in Hitachi ABB Power Grids System Data Manager – SDM600 allows attacker to gain access to sensitive information. This issue affects: Hitachi ABB Power Grids System Data Manager – SDM600 1.2 versions prior to FP2 HF6 (Build Nr. 1.2.14002.257). | [] |
|
GHSA-j2w9-9v56-q925 | User enumeration is found in in PHPJabbers Appointment Scheduler 3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. | [] |
|
GHSA-prc6-6v5h-g8v2 | A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sn_package/sn_https. The manipulation of the argument https_enable leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-m878-3vfv-wgvc | Due to a lack of authentication, an unauthenticated user who knows the Eview EV-07S GPS Tracker's phone number can revert the device to a factory default configuration with an SMS command, "RESET!" | [] |
|
CVE-2005-3955 | Multiple cross-site scripting (XSS) vulnerabilities in MagpieRSS 7.1, as used in (a) blogBuddiesv 0.3, (b) Jaws 0.6.2, and possibly other products, allow remote attackers to inject arbitrary web script or HTML via the (1) url parameter to (a) magpie_debug.php and (2) rss_url parameter to (b) magpie_slashbox.php and (c) simple_smarty.php. | [
"cpe:2.3:a:blogbuddies:blogbuddies:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jaws:jaws:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:magpierss:magpierss:7.1:*:*:*:*:*:*:*"
] |
|
CVE-2011-3545 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. | [
"cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update31:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update31:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_27:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_28:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_29:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_30:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_31:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.4.2_32:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*"
] |
|
GHSA-2q7q-p2pj-49m2 | The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. | [] |
|
GHSA-jjqr-925q-xr8x | The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. | [] |
|
CVE-2018-7239 | A DLL hijacking vulnerability exists in Schneider Electric's SoMove Software and associated DTM software components in all versions prior to 2.6.2 which could allow an attacker to execute arbitrary code. | [
"cpe:2.3:a:schneider-electric:atv_lift_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv12_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv212_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv31_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv312_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv32_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv320_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv340_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv600_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv61_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv71_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:atv900_dtm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:somove:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-0510 | Buffer overflow in epg search result viewer (kkcald) 0.7.19 and earlier allows remote attackers to perform unintended operations or execute DoS (denial of service) attacks via unspecified vectors. | [
"cpe:2.3:a:kkcald_project:kkcald:*:*:*:*:*:*:*:*"
] |
|
GHSA-xp35-9crr-2x99 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. watchOS before 3.2.3 is affected. The issue involves the "Messages" component. It allows remote attackers to cause a denial of service (memory consumption and application crash). | [] |
|
GHSA-wgf6-42x8-3826 | A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php?page=manage_questionnaire. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227644. | [] |
|
GHSA-mr95-9rr4-668f | Cryptographically Weak Pseudo-Random Number Generator (PRNG) in akka-actor | Lightbend Akka 2.5.x before 2.5.16 allows message disclosure and modification because of an RNG error. A random number generator is used in Akka Remoting for TLS (both classic and Artery Remoting). Akka allows configuration of custom random number generators. For historical reasons, Akka included the AES128CounterSecureRNG and AES256CounterSecureRNG random number generators. The implementations had a bug that caused the generated numbers to be repeated after only a few bytes. The custom RNG implementations were not configured by default but examples in the documentation showed (and therefore implicitly recommended) using the custom ones. This can be used by an attacker to compromise the communication if these random number generators are enabled in configuration. It would be possible to eavesdrop, replay, or modify the messages sent with Akka Remoting/Cluster. | [] |
CVE-2024-45296 | path-to-regexp outputs backtracking regular expressions | path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0. | [
"cpe:2.3:a:pillarjs:path-to-regexp:*:*:*:*:*:*:*:*"
] |
GHSA-q8xc-c77q-483p | Multiple stack-based buffer overflows in the (1) LoadTree, (2) ReadHeader, and (3) LoadXBOXTree functions in the ISO (iso_wincmd) plugin 1.7.3.3 and earlier for Total Commander allow user-assisted remote attackers to execute arbitrary code via a long pathname in an ISO image. | [] |
|
GHSA-5cm2-g3j8-28r2 | INFOR EAM V11.0 Build 201410 has XSS via comment fields. | [] |
|
CVE-1999-0380 | SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user. | [
"cpe:2.3:a:seattle_lab_software:slmail:3.0.2421:*:*:*:*:*:*:*"
] |
|
GHSA-f927-92rh-rff4 | In FM service , there is a possible missing params check. This could lead to local denial of service in FM service . | [] |
|
CVE-2019-18450 | An issue was discovered in GitLab Community and Enterprise Edition before 12.4 in the Project labels feature. It has Insecure Permissions. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-qffc-rj73-gmmj | Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached. | [] |
|
CVE-2021-33767 | Open Enclave SDK Elevation of Privilege Vulnerability | Open Enclave SDK Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:open_enclave_software_development_kit:*:*:*:*:*:*:*:*"
] |
GHSA-4vfj-c2xf-8r48 | Directory Traversal in looppake | Affected versions of `looppake` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] |
GHSA-4395-qwxq-qcc7 | A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as problematic. Affected by this issue is the function get_student of the file student_form.php. The manipulation of the argument id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269276. | [] |
|
CVE-2025-37898 | powerpc64/ftrace: fix module loading without patchable function entries | In the Linux kernel, the following vulnerability has been resolved:
powerpc64/ftrace: fix module loading without patchable function entries
get_stubs_size assumes that there must always be at least one patchable
function entry, which is not always the case (modules that export data
but no code), otherwise it returns -ENOEXEC and thus the section header
sh_size is set to that value. During module_memory_alloc() the size is
passed to execmem_alloc() after being page-aligned and thus set to zero
which will cause it to fail the allocation (and thus module loading) as
__vmalloc_node_range() checks for zero-sized allocs and returns null:
[ 115.466896] module_64: cast_common: doesn't contain __patchable_function_entries.
[ 115.469189] ------------[ cut here ]------------
[ 115.469496] WARNING: CPU: 0 PID: 274 at mm/vmalloc.c:3778 __vmalloc_node_range_noprof+0x8b4/0x8f0
...
[ 115.478574] ---[ end trace 0000000000000000 ]---
[ 115.479545] execmem: unable to allocate memory
Fix this by removing the check completely, since it is anyway not
helpful to propagate this as an error upwards. | [] |
CVE-2017-14879 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, by calling an IPA ioctl and searching for routing/filer/hdr rule handle from ipa_idr pointer using ipa_idr_find() function, the wrong structure pointer can be returned resulting in a slab out of bound access in the IPA driver. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-25413 | A XSLT Server Side injection vulnerability in the Import Jobs function of FireBear Improved Import And Export v3.8.6 allows attackers to execute arbitrary commands via a crafted XSLT file. | [
"cpe:2.3:a:firebear_studio:improved_import_and_export:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:firebearstudio:improved_import_\\&_export:3.8.6:*:*:*:*:magento:*:*"
] |
|
CVE-2022-3643 | Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm5780:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-2773 | SourceCodester Apartment Visitor Management System profile.php cross site scripting | A vulnerability was found in SourceCodester Apartment Visitor Management System. It has been classified as problematic. This affects an unknown part of the file profile.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-206169 was assigned to this vulnerability. | [
"cpe:2.3:a:apartment_visitors_management_system_project:apartment_visitors_management_system:*:*:*:*:*:*:*:*"
] |
CVE-2020-17515 | The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely. | [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
] |
|
GHSA-g5m5-v5cp-5p7m | Directory Traversal in wintiwebdev | Affected versions of `wintiwebdev` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] |
GHSA-r832-r6x8-hgp3 | SQL injection vulnerability in search.asp in Xigla Absolute Live Support XE 5.1 allows remote authenticated administrators to execute arbitrary SQL commands via the orderby parameter. | [] |
|
CVE-2024-4564 | CoDesigner WooCommerce Builder for Elementor – Customize Checkout, Shop, Email, Products & More <= 4.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Widgets | The CoDesigner WooCommerce Builder for Elementor – Customize Checkout, Shop, Email, Products & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Shop Slider, Tabs Classic, and Image Comparison widgets in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
GHSA-95mg-jgfx-54v9 | Apache Superset uncontrolled resource consumption | Uncontrolled resource consumption can be triggered by authenticated attacker that uploads a malicious ZIP to import database, dashboards or datasets.
This vulnerability exists in Apache Superset versions up to and including 2.1.2 and versions 3.0.0, 3.0.1. | [] |
CVE-2024-3544 | LoadMaster Hardcoded SSH Key |
Unauthenticated attackers can perform actions, using SSH private keys, by knowing the IP address and having access to the same network of one of the machines in the HA or Cluster group. This vulnerability has been closed by enhancing LoadMaster partner communications to require a shared secret that must be exchanged between the partners before communication can proceed.
| [
"cpe:2.3:a:kemptechnologies:loadmaster:7.2.55.0\\(ga\\):*:*:*:*:*:*:*",
"cpe:2.3:a:kemptechnologies:loadmaster:7.2.49.0\\(ltsf\\):*:*:*:*:*:*:*",
"cpe:2.3:a:kemptechnologies:loadmaster:7.2.48.11\\(lts\\):*:*:*:*:*:*:*"
] |
CVE-2021-22696 | OAuth 2 authorization service vulnerable to DDos attacks | CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10. | [
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"
] |
GHSA-pp8m-prr7-wr8w | Jenkins Sidebar Link Plugin vulnerable to Path Traversal | Jenkins Sidebar Link Plugin allows specifying files in the `userContent/` directory for use as link icons.Sidebar Link Plugin 2.2.1 and earlier does not restrict the path of files in a method implementing form validation.This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.Sidebar Link Plugin 2.2.2 ensures that only files located within the expected `userContent/` directory can be accessed. | [] |
CVE-2005-2195 | Apple Darwin Streaming Server 5.5 and earlier allows remote attackers to cause a denial of service (application crash) via a URL with a filename containing a .cgi extension and an MS-DOS device name such as AUX, CON, PRN, COM1, or LPT1, a different vulnerability than CVE-2003-0421 and CVE-2003-0502. | [
"cpe:2.3:a:apple:darwin_streaming_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-21372 | Windows OLE Remote Code Execution Vulnerability | Windows OLE Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
CVE-2020-14384 | A flaw was found in JBossWeb in versions before 7.5.31.Final-redhat-3. The fix for CVE-2020-13935 was incomplete in JBossWeb, leaving it vulnerable to a denial of service attack when sending multiple requests with invalid payload length in a WebSocket frame. The highest threat from this vulnerability is to system availability. | [
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jbossweb:*:*:*:*:*:*:*:*"
] |
|
GHSA-45hv-4hc6-jvf2 | Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file. | [] |
|
GHSA-6fvx-97p6-hw44 | In the Linux kernel, the following vulnerability has been resolved:bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAXSyzbot hit warning in hci_conn_del() caused by freeing handle that was
not allocated using ida allocator.This is caused by handle bigger than HCI_CONN_HANDLE_MAX passed by
hci_le_big_sync_established_evt(), which makes code think it's unset
connection.Add same check for handle upper bound as in hci_conn_set_handle() to
prevent warning. | [] |
|
GHSA-34hc-f35h-vj85 | Windows Subsystem for Linux in Windows 10 1703, allows a denial of service vulnerability due to the way it handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability". | [] |
|
CVE-2009-3192 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in LinkorCMS 1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the searchstr parameter in a search action; or the (2) nikname, (3) realname, (4) homepage, or (5) city parameter in a registration action. | [
"cpe:2.3:a:linkorcms:linkorcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linkorcms:linkorcms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linkorcms:linkorcms:1.2:beta:*:*:*:*:*:*"
] |
|
GHSA-hmhg-25gg-p99m | Directory traversal vulnerability in the file-download configuration file in the management console in Symantec Workspace Streaming (SWS) 7.5.x before 7.5 SP1 HF9 and 7.6.0 before 7.6 HF5 and Symantec Workspace Virtualization (SWV) 7.5.x before 7.5 SP1 HF9 and 7.6.0 before 7.6 HF5 allows remote authenticated users to read unspecified application files via unknown vectors. | [] |
|
GHSA-43cg-vjjq-q598 | Vulnerability in the Oracle Security Service component of Oracle Fusion Middleware (subcomponent: C Oracle SSL API). Supported versions that are affected are FMW: 11.1.1.9.0 and 12.1.3.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Security Service. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Security Service accessible data. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). | [] |
|
CVE-2005-1057 | Cisco IOS 12.2T, 12.3 and 12.3T, when using Easy VPN Server XAUTH version 6 authentication, allows remote attackers to bypass authentication via a "malformed packet." | [
"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*"
] |
|
CVE-2025-29480 | Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker to cause a denial of service via the OGRSpatialReference::Release function. | [] |
|
GHSA-95rc-6f28-2jcq | HarfBuzz before 1.0.4 allows remote attackers to cause a denial of service (invalid read of two bytes and application crash) because of GPOS and GSUB table mishandling, related to hb-ot-layout-gpos-table.hh, hb-ot-layout-gsub-table.hh, and hb-ot-layout-gsubgpos-private.hh. | [] |
|
GHSA-3rcq-39xp-7xjp | ic-stable-structures vulnerable to BTreeMap memory leak when deallocating nodes with overflows | ImpactWhen storing unbounded types in a `BTreeMap`, a node is represented as a linked list of "memory chunks". It was discovered recently that when we deallocate a node, in some cases only the first memory chunk is deallocated, and the rest of the memory chunks remain (incorrectly) allocated, causing a memory leak.In the worst case, depending on how a canister uses the `BTreeMap`, an adversary could interact with the canister through its API and trigger interactions with the map that keep consuming memory due to the memory leak. This could potentially lead to using an excessive amount of memory, or even running out of memory.This issue has been fixed in #212 by changing the logic for deallocating nodes to ensure that all of a node's memory chunks are deallocated. Tests have been added to prevent regressions of this nature moving forward.**Note:** Users of stable-structure < 0.6.0 are not affected.PatchesThe problem has been fixed in PR #212 and users are asked to upgrade to version `0.6.4`.WorkaroundsUsers who are not storing unbounded types in `BTreeMap` are not affected and do not need to upgrade. Otherwise, an upgrade to version `0.6.4` is necessary. | [] |
CVE-2017-10759 | XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpInsertDependencyRecord+0x0000000000000039." | [
"cpe:2.3:a:xnview:xnview:2.40:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-1463 | Cross-site scripting (XSS) vulnerability in the management GUI in Imperva SecureSphere MX Management Server 5.0 allows remote attackers to inject arbitrary web script or HTML via an invalid or prohibited request to a web server protected by SecureSphere, which triggers injection into the "corrective action" section of an alert page. | [
"cpe:2.3:a:imperva:securesphere:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imperva:securesphere_mx_management_server:5:*:*:*:*:*:*:*",
"cpe:2.3:a:imperva:securesphere_mx_management_server:5.0:*:*:*:*:*:*:*"
] |
|
GHSA-j5ph-qf4x-g7h7 | An information disclosure vulnerability exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10001 can allow for a user to retrieve sensitive information without authentication. | [] |
|
CVE-2006-7051 | The sys_timer_create function in posix-timers.c for Linux kernel 2.6.x allows local users to cause a denial of service (memory consumption) and possibly bypass memory limits or cause other processes to be killed by creating a large number of posix timers, which are allocated in kernel memory but are not treated as part of the process' memory. | [
"cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*"
] |
|
GHSA-7xfv-pf6f-p6v2 | Insecure access control in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read sensitive backup files and access sensitive information such as user credentials via sending a crafted HTTP request to the static files resources of the system. | [] |
|
CVE-2018-12019 | The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids. | [
"cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-18910 | The Citrix Receiver wrapper function does not safely handle user supplied input, which may be leveraged by an attacker to inject commands that will execute with local user privileges. | [
"cpe:2.3:o:hp:thinpro:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:thinpro:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:thinpro:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:thinpro:7.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-9841 | OpenText ArcSight Management Center and ArcSight Platform Stored XSS | A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Management Center and ArcSight Platform. The vulnerability could be remotely exploited. | [
"cpe:2.3:a:microfocus:arcsight_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:arcsight_management_center:3.2.5:-:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:arcsight_platform:*:*:*:*:*:*:*:*"
] |
GHSA-x543-885p-w95x | In Adam Kropelin adk0212 APC UPS Daemon through 3.14.14, the default installation of APCUPSD allows a local authenticated, but unprivileged, user to run arbitrary code with elevated privileges by replacing the service executable apcupsd.exe with a malicious executable that will run with SYSTEM privileges at startup. This occurs because of "RW NT AUTHORITY\Authenticated Users" permissions for %SYSTEMDRIVE%\apcupsd\bin\apcupsd.exe. | [] |
|
GHSA-qqc4-r6pr-hvwj | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-m2xp-5rxh-x3wc | PCCS MySQLDatabase Admin Tool Manager 1.2.4 and earlier installs the file dbconnect.inc within the web root, which allows remote attackers to obtain sensitive information such as the administrative password. | [] |
|
CVE-2020-0651 | A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0650, CVE-2020-0653. | [
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:excel:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*"
] |
|
CVE-2010-0196 | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193. | [
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*"
] |
|
GHSA-78qq-x5w4-w8jw | Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect availability via vectors related to Kernel Zones virtualized NIC driver. | [] |
|
GHSA-j24r-5pwg-3xrw | Fast Food Ordering System v1.0 is vulnerable to SQL Injection via /ffos/classes/Master.php?f=delete_category. | [] |
|
GHSA-vq2h-w7g9-p547 | Huawei FusionAccess with software V100R005C10 and V100R005C20 could allow remote attackers with specific permission to inject a Lightweight Directory Access Protocol (LDAP) operation command into a specific input variable to obtain sensitive information from the database. | [] |
|
CVE-2022-48728 | IB/hfi1: Fix AIP early init panic | In the Linux kernel, the following vulnerability has been resolved:
IB/hfi1: Fix AIP early init panic
An early failure in hfi1_ipoib_setup_rn() can lead to the following panic:
BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0
PGD 0 P4D 0
Oops: 0002 [#1] SMP NOPTI
Workqueue: events work_for_cpu_fn
RIP: 0010:try_to_grab_pending+0x2b/0x140
Code: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 <f0> 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c
RSP: 0018:ffffb6b3cf7cfa48 EFLAGS: 00010046
RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000
RDX: 0000000000000246 RSI: 0000000000000000 RDI: 00000000000001b0
RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: ffffb6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690
FS: 0000000000000000(0000) GS:ffff8a527f400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000001b0 CR3: 00000017e2410003 CR4: 00000000007706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
__cancel_work_timer+0x42/0x190
? dev_printk_emit+0x4e/0x70
iowait_cancel_work+0x15/0x30 [hfi1]
hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1]
? dev_err+0x6c/0x90
hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1]
hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1]
rdma_init_netdev+0x5a/0x80 [ib_core]
? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1]
ipoib_intf_init+0x6c/0x350 [ib_ipoib]
ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib]
ipoib_add_one+0xbe/0x300 [ib_ipoib]
add_client_context+0x12c/0x1a0 [ib_core]
enable_device_and_get+0xdc/0x1d0 [ib_core]
ib_register_device+0x572/0x6b0 [ib_core]
rvt_register_device+0x11b/0x220 [rdmavt]
hfi1_register_ib_device+0x6b4/0x770 [hfi1]
do_init_one.isra.20+0x3e3/0x680 [hfi1]
local_pci_probe+0x41/0x90
work_for_cpu_fn+0x16/0x20
process_one_work+0x1a7/0x360
? create_worker+0x1a0/0x1a0
worker_thread+0x1cf/0x390
? create_worker+0x1a0/0x1a0
kthread+0x116/0x130
? kthread_flush_work_fn+0x10/0x10
ret_from_fork+0x1f/0x40
The panic happens in hfi1_ipoib_txreq_deinit() because there is a NULL
deref when hfi1_ipoib_netdev_dtor() is called in this error case.
hfi1_ipoib_txreq_init() and hfi1_ipoib_rxq_init() are self unwinding so
fix by adjusting the error paths accordingly.
Other changes:
- hfi1_ipoib_free_rdma_netdev() is deleted including the free_netdev()
since the netdev core code deletes calls free_netdev()
- The switch to the accelerated entrances is moved to the success path. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*"
] |
CVE-2020-11019 | Out of bound read in update_recv in FreeRDP | In FreeRDP less than or equal to 2.0.0, when running with logger set to "WLOG_TRACE", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0. | [
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
GHSA-4gm2-v7j4-74p8 | When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled | [] |
|
CVE-2009-4826 | Cross-site request forgery (CSRF) vulnerability in hosting/admin_ac.php in ScriptsEz Mini Hosting Panel allows remote attackers to hijack the authentication of administrators for requests that alter administrative settings via a cp action. | [
"cpe:2.3:a:scriptsez:mini_hosting_panel:*:*:*:*:*:*:*:*"
] |
|
GHSA-rv94-849j-v27x | In DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS09291146; Issue ID: MSV-2056. | [] |
|
GHSA-g4rw-2g4w-2cmr | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yannick Lefebvre Bug Library allows Blind SQL Injection. This issue affects Bug Library: from n/a through 2.1.4. | [] |
|
GHSA-2948-rrxj-6qwq | Cisco Content Security Management Appliance (SMA) 7.8.0-000 does not properly validate credentials, which allows remote attackers to cause a denial of service (rapid log-file rollover and application fault) via crafted HTTP requests, aka Bug ID CSCuw09620. | [] |
|
CVE-2022-41123 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Microsoft Exchange Server Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*"
] |
GHSA-cvc5-776g-xgcw | Buffer overflow in the locale implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | [] |
|
GHSA-fcqc-4m7c-74f8 | Buffer overflow in the NetBackup Sharepoint Services server daemon (bpspsserver) on NetBackup 6.0 for Windows allows remote attackers to execute arbitrary code via crafted "Request Service" packets to the vnetd service (TCP port 13724). | [] |
|
CVE-2023-26840 | A cross-site request forgery (CSRF) vulnerability in ChurchCRM v4.5.3 allows attackers to set a person to a user and set that user to be an Administrator. | [
"cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-45703 | Heap buffer overflow vulnerability in binutils readelf before 2.40 via function display_debug_section in file readelf.c. | [
"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.