id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
CVE-2021-43220
Microsoft Edge for iOS Spoofing Vulnerability
Microsoft Edge for iOS Spoofing Vulnerability
[ "cpe:2.3:a:microsoft:edge_ios:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:*:*:*:*:*:iphone_os:*:*" ]
CVE-2021-24661
PostX Gutenberg Blocks Saved Templates Addon < 2.4.10 - Private Content Disclosure
The PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10, with Saved Templates Addon enabled, allows users with Contributor roles or higher to read password-protected or private post contents the user is otherwise unable to read, given the post ID.
[ "cpe:2.3:a:wpxpo:postx_-_gutenberg_blocks_for_post_grid:*:*:*:*:*:wordpress:*:*" ]
GHSA-j4gv-c6jh-pvhm
In the Linux kernel, the following vulnerability has been resolved:nouveau: lock the client object tree.It appears the client object tree has no locking unless I've missed something else. Fix races around adding/removing client objects, mostly vram bar mappings.4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI [ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27 [ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021 [ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau] [ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 <48> 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe [ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206 [ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58 [ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400 [ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000 [ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0 [ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007 [ 4562.099528] FS: 00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000 [ 4562.099534] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0 [ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 4562.099544] Call Trace: [ 4562.099555] <TASK> [ 4562.099573] ? die_addr+0x36/0x90 [ 4562.099583] ? exc_general_protection+0x246/0x4a0 [ 4562.099593] ? asm_exc_general_protection+0x26/0x30 [ 4562.099600] ? nvkm_object_search+0x1d/0x70 [nouveau] [ 4562.099730] nvkm_ioctl+0xa1/0x250 [nouveau] [ 4562.099861] nvif_object_map_handle+0xc8/0x180 [nouveau] [ 4562.099986] nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau] [ 4562.100156] ? dma_resv_test_signaled+0x26/0xb0 [ 4562.100163] ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm] [ 4562.100182] ? __mutex_unlock_slowpath+0x2a/0x270 [ 4562.100189] nouveau_ttm_fault+0x69/0xb0 [nouveau] [ 4562.100356] __do_fault+0x32/0x150 [ 4562.100362] do_fault+0x7c/0x560 [ 4562.100369] __handle_mm_fault+0x800/0xc10 [ 4562.100382] handle_mm_fault+0x17c/0x3e0 [ 4562.100388] do_user_addr_fault+0x208/0x860 [ 4562.100395] exc_page_fault+0x7f/0x200 [ 4562.100402] asm_exc_page_fault+0x26/0x30 [ 4562.100412] RIP: 0033:0x9b9870 [ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 <44> 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7 [ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246 [ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000 [ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066 [ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000 [ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff [ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 4562.100446] </TASK> [ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink ---truncated---
[]
CVE-2022-25069
Mark Text v0.16.3 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability which allows attackers to perform remote code execution (RCE) via injecting a crafted payload into /lib/contentState/pasteCtrl.js.
[ "cpe:2.3:a:marktext:marktext:0.16.3:*:*:*:*:*:*:*" ]
CVE-2023-52787
blk-mq: make sure active queue usage is held for bio_integrity_prep()
In the Linux kernel, the following vulnerability has been resolved: blk-mq: make sure active queue usage is held for bio_integrity_prep() blk_integrity_unregister() can come if queue usage counter isn't held for one bio with integrity prepared, so this request may be completed with calling profile->complete_fn, then kernel panic. Another constraint is that bio_integrity_prep() needs to be called before bio merge. Fix the issue by: - call bio_integrity_prep() with one queue usage counter grabbed reliably - call bio_integrity_prep() before bio merge
[]
GHSA-26h9-w3fm-wprg
A missing authentication vulnerability in Palo Alto Networks Cortex XDR® Broker VM allows an unauthenticated user to disable certain internal services on the Broker VM.The attacker must have network access to the Broker VM to exploit this issue.
[]
CVE-2018-0412
A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client). The vulnerability is due to the improper processing of certain EAPOL messages that are received during the Wi-Fi handshake process. An attacker could exploit this vulnerability by establishing a man-in-the-middle position between a supplicant and an authenticator and manipulating an EAPOL message exchange to force usage of a WPA-TKIP cipher instead of the more secure AES-CCMP cipher. A successful exploit could allow the attacker to conduct subsequent cryptographic attacks, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvj29229.
[ "cpe:2.3:o:cisco:wap121_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap121:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wap125_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap125:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wap131_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wap150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wap321_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap321:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wap351_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wap361_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap361:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wap371_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wap371:-:*:*:*:*:*:*:*" ]
CVE-2025-46227
WordPress Custom Related Posts <= 1.7.4 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brecht Custom Related Posts allows Stored XSS. This issue affects Custom Related Posts: from n/a through 1.7.4.
[]
GHSA-5cqj-x29q-49hf
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling.
[]
CVE-2019-4212
IBM QRadar SIEM 7.2 and 7.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 159132.
[ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:p1:*:*:*:*:*:*" ]
GHSA-6mpm-3752-992x
Halo CMS v1.5.3 was discovered to contain an arbitrary file upload vulnerability via the component /api/admin/attachments/upload.
[]
CVE-2014-1885
The ForzeArmate application for Android, when Adobe PhoneGap 2.9.0 or earlier is used, allows remote attackers to execute arbitrary JavaScript code, and consequently obtain write access to external-storage resources, by leveraging control over any Google syndication advertising domain.
[ "cpe:2.3:a:hsgroup:forzearmate:-:*:*:*:*:android:*:*", "cpe:2.3:a:adobe:phonegap:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:phonegap:2.9.0:rc1:*:*:*:*:*:*" ]
GHSA-x8qg-whhh-m3ph
A programming error exists in a way Randombit Botan cryptographic library version 2.0.1 implements x500 string comparisons which could lead to certificate verification issues and abuse. A specially crafted X509 certificate would need to be delivered to the client or server application in order to trigger this vulnerability.
[]
GHSA-6hq5-pgvc-59fw
Blind SQL Injection in wordpress plugin dukapress v2.5.9
[]
GHSA-rr5m-rhf5-cxvw
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
[]
CVE-2023-38348
A CSRF issue was discovered in LWsystems Benno MailArchiv 2.10.1.
[ "cpe:2.3:a:lw-systems:benno_mailarchiv:*:*:*:*:*:*:*:*" ]
CVE-2023-28761
Missing Authentication check in SAP NetWeaver Enterprise Portal
In SAP NetWeaver Enterprise Portal - version 7.50, an unauthenticated attacker can attach to an open interface and make use of an open API to access a service which will enable them to access or modify server settings and data, leading to limited impact on confidentiality and integrity.
[ "cpe:2.3:a:sap:netweaver_enterprise_portal:7.50:*:*:*:*:*:*:*" ]
GHSA-vqwg-4v6f-h6x5
Stored XSS vulnerability in Matrix Project Plugin
Jenkins Matrix Project Plugin prior to 1.20 and 1.18.1 does not escape HTML metacharacters in node and label names, and label descriptions.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.Matrix Project Plugin 1.20 and 1.18.1 escapes HTML metacharacters in node and label names, and label descriptions.
[]
CVE-2024-44838
RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the username parameter at /resource/runlogin.php.
[ "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*" ]
CVE-2010-3189
The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Internet Security Pro 2010 allows remote attackers to execute arbitrary code via an invalid address that is dereferenced as a pointer.
[ "cpe:2.3:a:trendmicro:internet_security:2010:-:pro:*:*:*:*:*" ]
CVE-2020-6102
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).
[ "cpe:2.3:a:amd:radeon_directx_11_driver_atidxx64.dll:26.20.15019.19000:*:*:*:*:*:*:*" ]
GHSA-r33g-v22q-5gfw
Cross-site scripting (XSS) vulnerability in vote.php in Good/Bad Vote allows remote attackers to inject arbitrary web script or HTML via the id parameter in a vote action.
[]
GHSA-84f8-vjhf-h3rw
A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2014-4587
Multiple cross-site scripting (XSS) vulnerabilities in the WP GuestMap plugin 1.8 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) zl, (2) mt, or (3) dc parameter to guest-locator.php; the (4) zl, (5) mt, (6) activate, or (7) dc parameter to online-tracker.php; the (8) zl, (9) mt, or (10) dc parameter to stats-map.php; or the (11) zl, (12) mt, (13) activate, or (14) dc parameter to weather-map.php.
[ "cpe:2.3:a:wp_guestmap_project:wp_guestmap_project:*:-:-:*:-:wordpress:*:*" ]
CVE-2023-37899
feathersjs socket handler allows abusing implicit toString
Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. Feathers socket handler did not catch invalid string conversion errors like `const message = ${{ toString: '' }}` which would cause the NodeJS process to crash when sending an unexpected Socket.io message like `socket.emit('find', { toString: '' })`. A fix has been released in versions 5.0.8 and 4.5.18. Users are advised to upgrade. There is no known workaround for this vulnerability.
[ "cpe:2.3:a:feathersjs:feathers:*:*:*:*:*:node.js:*:*" ]
GHSA-m5f4-wpc8-674q
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.5, macOS Monterey 12.6.8, macOS Big Sur 11.7.9. Processing a file may lead to a denial-of-service or potentially disclose memory contents.
[]
GHSA-xrpq-r56p-r4mq
GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c.
[]
GHSA-7p43-ch8g-7vxg
PDF-XChange Editor Net.HTTP.requests Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the Net.HTTP.requests method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-20211.
[]
CVE-2022-2268
WP All Import < 3.6.8 - Admin+ Arbitrary File Upload
The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE
[ "cpe:2.3:a:soflyy:wp_all_import:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-33987
Cross-Site Scripting (XSS) vulnerability in Janobe products
Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate', 'YearLevel', 'eventdate', 'events', 'Users' and 'YearLevel' parameters in '/report/index.php'.
[ "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2015-2472
Remote Desktop Session Host (RDSH) in Remote Desktop Protocol (RDP) through 8.1 in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly verify certificates, which allows man-in-the-middle attackers to spoof clients via a crafted certificate with valid Issuer and Serial Number fields, aka "Remote Desktop Session Host Spoofing Vulnerability."
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
GHSA-3244-863h-59jf
The Firelight Lightbox WordPress plugin before 2.3.16 does not sanitise and escape title attributes before outputting them in the page, which could allow users with a role as low as contributors to perform stored Cross-Site Scripting attacks.
[]
CVE-2019-13264
D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender.
[ "cpe:2.3:o:dlink:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-825\\/ac_g1:-:*:*:*:*:*:*:*" ]
CVE-2021-37634
LeafKit allows XSS with untrusted user input
Leafkit is a templating language with Swift-inspired syntax. Versions prior to 1.3.0 are susceptible to Cross-site Scripting (XSS) attacks. This affects anyone passing unsanitised data to Leaf's variable tags. Before this fix, Leaf would not escape any strings passed to tags as variables. If an attacker managed to find a variable that was rendered with their unsanitised data, they could inject scripts into a generated Leaf page, which could enable XSS attacks if other mitigations such as a Content Security Policy were not enabled. This has been patched in 1.3.0. As a workaround sanitize any untrusted input before passing it to Leaf and enable a CSP to block inline script and CSS data.
[ "cpe:2.3:a:vapor:leafkit:*:*:*:*:*:*:*:*" ]
GHSA-772w-6r32-pmgr
Marvell QConvergeConsole deleteAppFile Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the deleteAppFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM. Was ZDI-CAN-24918.
[]
GHSA-5h6r-fm43-455f
SQL injection vulnerability in wp-users.php in WordPress Users plugin 1.3 and possibly earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the uid parameter to index.php.
[]
GHSA-c5v6-g38c-9hgp
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
[]
CVE-1999-0507
An account on a router, firewall, or other network device has a guessable password.
[]
GHSA-8xv4-6c9v-2w8h
The Easy Digital Downloads (EDD) QR Code extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
[]
CVE-2021-45599
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
[ "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*" ]
GHSA-rcjc-c4pj-xxrp
Apache Derby: LDAP injection vulnerability in authenticator
A cleverly devised username might bypass LDAP authentication checks. In LDAP-authenticated Derby installations, this could let an attacker fill up the disk by creating junk Derby databases. In LDAP-authenticated Derby installations, this could also allow the attacker to execute malware which was visible to and executable by the account which booted the Derby server. In LDAP-protected databases which weren't also protected by SQL GRANT/REVOKE authorization, this vulnerability could also let an attacker view and corrupt sensitive data and run sensitive database functions and procedures.Mitigation:Users should upgrade to Java 21 and Derby 10.17.1.0.Alternatively, users who wish to remain on older Java versions should build their own Derby distribution from one of the release families to which the fix was backported: 10.16, 10.15, and 10.14. Those are the releases which correspond, respectively, with Java LTS versions 17, 11, and 8.
[]
GHSA-8pf7-jhff-4vgr
In the Linux kernel, the following vulnerability has been resolved:Revert "media: v4l2-ctrls: show all owned controls in log_status"This reverts commit 9801b5b28c6929139d6fceeee8d739cc67bb2739.This patch introduced a potential deadlock scenario:[Wed May 8 10:02:06 2024] Possible unsafe locking scenario:[Wed May 8 10:02:06 2024] CPU0 CPU1 [Wed May 8 10:02:06 2024] ---- ---- [Wed May 8 10:02:06 2024] lock(vivid_ctrls:1620:(hdl_vid_cap)->_lock); [Wed May 8 10:02:06 2024] lock(vivid_ctrls:1608:(hdl_user_vid)->_lock); [Wed May 8 10:02:06 2024] lock(vivid_ctrls:1620:(hdl_vid_cap)->_lock); [Wed May 8 10:02:06 2024] lock(vivid_ctrls:1608:(hdl_user_vid)->_lock);For now just revert.
[]
CVE-2007-6186
Unspecified vulnerability in PHPDevShell before 0.7.0 has unknown impact and attack vectors, involving a "minor security bug in repair & optimize database."
[ "cpe:2.3:a:phpdevshell:phpdevshell:*:*:*:*:*:*:*:*" ]
GHSA-7cmj-p544-vw4q
The Huawei Versatile Routing Platform 1.43 2500E-003 firmware on the Quidway R1600 Router, and possibly other models, allows remote attackers to cause a denial of service (device crash) via a long show arp command.
[]
GHSA-pv24-75cx-c5m2
A spoofing vulnerability exists when Windows incorrectly validates file signatures, aka 'Windows Spoofing Vulnerability'.
[]
GHSA-8rc2-4h22-rv2w
A user may be tricked into opening a malicious FBX file which may exploit an Untrusted Pointer Dereference vulnerability in FBX’s Review version 1.5.0 and prior causing it to run arbitrary code on the system.
[]
CVE-2022-28982
A cross-site scripting (XSS) vulnerability in Liferay Portal v7.3.3 through v7.4.2 and Liferay DXP v7.3 before service pack 3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name of a tag.
[ "cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.3:sp1:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.3:sp2:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.3:sp3:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*" ]
CVE-2024-8436
WP Easy Gallery – WordPress Gallery Plugin <= 4.8.5 - Authenticated (Subscriber+) SQL Injection
The WP Easy Gallery – WordPress Gallery Plugin plugin for WordPress is vulnerable to SQL Injection via the 'edit_imageId' and 'edit_imageDelete' parameters in all versions up to, and including, 4.8.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:hahncgdev:wp_easy_gallery_wordpress_gallery_plugin:*:*:*:*:*:*:*:*" ]
CVE-2008-0200
Multiple cross-site scripting (XSS) vulnerabilities in account/index.html in RotaBanner Local 3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) drop parameter.
[ "cpe:2.3:a:medialand:rotabanner_local:*:*:*:*:*:*:*:*" ]
GHSA-3qfv-q2rr-vg2v
An issue was discovered in arcms through 2018-03-19. No authentication is required for index/main, user/useradd, or img/images.
[]
CVE-2024-21342
Windows DNS Client Denial of Service Vulnerability
Windows DNS Client Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
GHSA-hjjp-8vgj-3j9q
A maliciously crafted 3DM file when parsed in AcTranslators.exe through Autodesk AutoCAD can force a Heap-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
[]
CVE-2025-3932
It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent that. Thunderbird has been fixed to no longer allow access to web pages listed in the X-Mozilla-External-Attachment-URL header of an email. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.
[]
CVE-2023-46611
WordPress YOP Poll plugin <= 6.5.28 - Vote Manipulation Due to Broken Captcha Control Vulnerability
Authentication Bypass by Primary Weakness vulnerability in yourownprogrammer YOP Poll allows Authentication Bypass.This issue affects YOP Poll: from n/a through 6.5.28.
[]
CVE-2024-3008
Tenda FH1205 execCommand formexeCommand stack-based overflow
A vulnerability, which was classified as critical, was found in Tenda FH1205 2.0.0.7(775). Affected is the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258294 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:tenda:fh1205:-:*:*:*:*:*:*:*" ]
GHSA-crgr-72p3-3g72
Medtronic identified that the Pelvic Health clinician apps, which are installed on the Smart Programmer mobile device, have a password vulnerability that requires a security update to fix. Not updating could potentially result in unauthorized control of the clinician therapy application, which has greater control over therapy parameters than the patient app. Changes still cannot be made outside of the established therapy parameters of the programmer. For unauthorized access to occur, an individual would need physical access to the Smart Programmer.
[]
GHSA-46c4-8wrp-j99v
Improper Validation and Sanitization in url-parse
Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.
[]
CVE-2023-29438
WordPress SimpleModal Contact Form (SMCF) Plugin <= 1.2.9 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eric Martin SimpleModal Contact Form (SMCF) plugin <= 1.2.9 versions.
[ "cpe:2.3:a:simplemodal_contact_form_project:simplemodal_contact_form:*:*:*:*:*:wordpress:*:*" ]
GHSA-929q-cjpr-43v5
The function ParseVP9SuperFrameIndex in common/libwebm_util.cc in libwebm through 2018-01-30 does not validate the child_frame_length data obtained from a .webm file, which allows remote attackers to cause an information leak or a denial of service (heap-based buffer over-read and later out-of-bounds write), or possibly have unspecified other impact.
[]
GHSA-8mwm-vx53-284j
A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the cod parameter in /administer/node-selection/data.asp.
[]
CVE-2020-0239
In getDocumentMetadata of DocumentsContract.java, there is a possible disclosure of location metadata from a file due to a permissions bypass. This could lead to local information disclosure from a file (eg. a photo) containing location metadata with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-151095863
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
CVE-2025-4187
UserPro - Community and User Profile WordPress Plugin <= 5.1.10 - Unauthenticated Arbitrary File Read
The UserPro - Community and User Profile WordPress Plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 5.1.10 via the userpro_fbconnect() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
[]
CVE-2020-11615
NVIDIA DGX servers, all BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which it uses a hard-coded RC4 cipher key, which may lead to information disclosure.
[ "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:dgx-1:-:*:*:*:*:*:*:*" ]
GHSA-7rv4-g7qg-q4mx
Logsign Unified SecOps Platform HTTP API Hard-coded Cryptographic Key Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.The specific flaw exists within the HTTP API. The issue results from using a hard-coded cryptographic key. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24170.
[]
GHSA-j796-27g2-334f
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
[]
CVE-2025-53104
gluestack-ui Command Injection Vulnerability via discussion-to-slack GitHub Action Workflow
gluestack-ui is a library of copy-pasteable components & patterns crafted with Tailwind CSS (NativeWind). Prior to commit e6b4271, a command injection vulnerability was discovered in the discussion-to-slack.yml GitHub Actions workflow. Untrusted discussion fields (title, body, etc.) were directly interpolated into shell commands in a run: block. An attacker could craft a malicious GitHub Discussion title or body (e.g., $(curl ...)) to execute arbitrary shell commands on the Actions runner. This issue has been fixed in commit e6b4271 where the discussion-to-slack.yml workflow was removed. Users should remove the discussion-to-slack.yml workflow if using a fork or derivative of this repository.
[]
CVE-2024-2597
Cross-Site Scripting (XSS) in AMSS++
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/bookdetail_school_person.php, in the 'b_id' parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[]
GHSA-4fj4-9m67-3mj3
Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with root-like permissions until the first fork.
[]
CVE-2020-36623
Pengu index.js runApp cross-site request forgery
A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The name of the patch is aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216475.
[ "cpe:2.3:a:pengu_project:pengu:*:*:*:*:*:*:*:*" ]
GHSA-3gwr-wj7f-25vv
The Login With OTP Over SMS, Email, WhatsApp and Google Authenticator WordPress plugin before 1.0.8 does not escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
[]
CVE-2023-51777
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error.
[ "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*" ]
CVE-2019-25015
LuCI in OpenWrt 18.06.0 through 18.06.4 allows stored XSS via a crafted SSID.
[ "cpe:2.3:o:openwrt:openwrt:*:*:*:*:*:*:*:*" ]
GHSA-mfjm-62pv-6673
An issue was discovered in libremote_dbg.so on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Filtering of debug information is mishandled during use of popen. Consequently, an attacker can bypass validation and execute a shell command.
[]
CVE-2015-3083
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2015-7189
Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
[ "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
GHSA-g827-h3jp-qr6m
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000-40 V31R02B1413C and classified as critical. This issue affects some unknown processing of the file /useratte/resmanage.php. The manipulation of the argument load leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264533 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
[]
CVE-2021-23340
Local File Inclusion
This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
GHSA-7gqj-hcm9-649c
Multiple cross-site scripting (XSS) vulnerabilities in lists/admin/index.php in phpList before 2.10.19 allow remote attackers to inject arbitrary web script or HTML via the (1) remote_user, (2) remote_database, (3) remote_userprefix, (4) remote_password, or (5) remote_prefix parameter to the import4 page; or the (6) id parameter to the bouncerule page.
[]
CVE-2008-2563
Multiple cross-site scripting (XSS) vulnerabilities in (1) dsp_main.php and (2) dsp_task_editor.php in SamTodo 1.1 allow remote attackers to inject arbitrary web script or HTML via the (a) tid parameter in a main.taskeditor edit action, and the (b) completed parameter in a main.default action, to index.php.
[ "cpe:2.3:a:samtodo:samtodo:1.1:*:*:*:*:*:*:*" ]
GHSA-33cc-8pcc-ph75
webserver.c in mt-dappd in Firefly Media Server 0.2.4 and earlier allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via a stats method action to /xml-rpc with (1) an empty Authorization header line, which triggers a crash in the ws_decodepassword function; or (2) a header line without a ':' character, which triggers a crash in the ws_getheaders function.
[]
CVE-2017-6290
In Android before the 2018-06-05 security patch level, NVIDIA TLK TrustZone contains a possible out of bounds write due to an integer overflow which could lead to local escalation of privilege with no additional execution privileges needed. User interaction not needed for exploitation. This issue is rated as high. Version: N/A. Android: A-69559414. Reference: N-CVE-2017-6290.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2009-3817
PHP remote file inclusion vulnerability in doc/releasenote.php in the BookLibrary (com_booklibrary) component 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter, a different vector than CVE-2009-2637. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", "cpe:2.3:a:ordasoft:com_booklibrary:1.0:*:*:*:*:*:*:*" ]
CVE-2020-5907
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, an authorized user provided with access only to the TMOS Shell (tmsh) may be able to conduct arbitrary file read/writes via the built-in sftp functionality.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ]
GHSA-p26p-v9m6-4g6h
Cross-site request forgery (CSRF) vulnerability in eZOE flash player in eZ Publish 4.1 through 4.6 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
GHSA-h49p-m77c-w5m9
An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.
[]
CVE-2020-13421
OpenIAM before 4.2.0.3 has Incorrect Access Control for the Create User, Modify User Permissions, and Password Reset actions.
[ "cpe:2.3:a:openiam:openiam:*:*:*:*:*:*:*:*" ]
CVE-2023-45605
WordPress Feed Statistics Plugin <= 4.1 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Christopher Finke Feed Statistics plugin <= 4.1 versions.
[ "cpe:2.3:a:feed_statistics_project:feed_statistics:*:*:*:*:*:wordpress:*:*" ]
CVE-2020-12410
Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
CVE-2024-36941
wifi: nl80211: don't free NULL coalescing rule
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: don't free NULL coalescing rule If the parsing fails, we can dereference a NULL pointer here.
[]
GHSA-969p-h3hv-f229
Multiple SQL injection vulnerabilities in download.php in Olate Download (od) 3.4.2 allow remote attackers to execute arbitrary SQL commands via the (1) HTTP_REFERER or (2) HTTP_USER_AGENT HTTP header.
[]
GHSA-5hrv-4r6h-jgxc
Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
[]
GHSA-xprq-wxmv-vch9
In the Linux kernel, the following vulnerability has been resolved:efi: runtime: avoid EFIv2 runtime services on Apple x86 machinesAditya reports [0] that his recent MacbookPro crashes in the firmware when using the variable services at runtime. The culprit appears to be a call to QueryVariableInfo(), which we did not use to call on Apple x86 machines in the past as they only upgraded from EFI v1.10 to EFI v2.40 firmware fairly recently, and QueryVariableInfo() (along with UpdateCapsule() et al) was added in EFI v2.00.The only runtime service introduced in EFI v2.00 that we actually use in Linux is QueryVariableInfo(), as the capsule based ones are optional, generally not used at runtime (all the LVFS/fwupd firmware update infrastructure uses helper EFI programs that invoke capsule update at boot time, not runtime), and not implemented by Apple machines in the first place. QueryVariableInfo() is used to 'safely' set variables, i.e., only when there is enough space. This prevents machines with buggy firmwares from corrupting their NVRAMs when they run out of space.Given that Apple machines have been using EFI v1.10 services only for the longest time (the EFI v2.0 spec was released in 2006, and Linux support for the newly introduced runtime services was added in 2011, but the MacbookPro12,1 released in 2015 still claims to be EFI v1.10 only), let's avoid the EFI v2.0 ones on all Apple x86 machines.[0] https://lore.kernel.org/all/[email protected]/
[]
GHSA-jw9g-8hf3-fcpm
SQL injection vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the fid parameter in a detail action to index.php.
[]
GHSA-mfpx-cx7p-6jc6
HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3.
[]
CVE-2019-17554
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
[ "cpe:2.3:a:apache:olingo:*:*:*:*:*:*:*:*" ]
CVE-2021-34569
WAGO I/O-Check Service prone to Out-of-bounds Write
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
[ "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8100_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8101\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8102\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-011_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-012_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/000-022_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/025-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/025-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-000_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:750-8202\\/040-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:750-8202\\/040-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4101_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4102_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4103_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4104_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4205\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4206\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-4306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:-:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:18:patch_2:*:*:*:*:*:*", "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*" ]
GHSA-h4jx-4cf4-wr53
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
GHSA-wvj5-m492-v978
Cross-site request forgery (CSRF) vulnerability in IBM Tivoli Identity Manager (ITIM) 5.0 before 5.0.0.15 and 5.1 before 5.1.0.15 and IBM Security Identity Manager (ISIM) 6.0 before 6.0.0.2 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
[]
GHSA-rp4r-rf72-hqqw
SpeedXess HA-120 DSL router has a default administrative password of "speedxess", which allows remote attackers to gain access.
[]
CVE-2024-12188
1000 Projects Library Management System stu.php sql injection
A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*" ]