id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
GHSA-f9fv-pv8g-g96g | An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c. | [] |
|
CVE-2007-3409 | Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. | [
"cpe:2.3:a:net-dns:net\\:\\:dns:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"
] |
|
CVE-2025-1757 | WordPress Portfolio Builder – Portfolio Gallery <= 1.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode | The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
GHSA-2mw8-v4w5-29m4 | Rejected reason: Not used | [] |
|
CVE-2019-13332 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of templates in XFA forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9149. | [
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-6g3h-98q3-6fwf | The application OpenEMR version 5.0.0, 5.0.1-dev and prior is affected by vertical privilege escalation vulnerability. This vulnerability can allow an authenticated non-administrator users to view and modify information only accessible to administrators. | [] |
|
GHSA-5423-jcjm-2gpv | Traefik affected by Go HTTP Request Smuggling Vulnerability | Summarynet/http: request smuggling through invalid chunked data: The net/http package accepts data in the chunked transfer encoding containing an invalid chunk-size line terminated by a bare LF. When used in conjunction with a server or proxy which incorrectly interprets a bare LF in a chunk extension as part of the extension, this could permit request smuggling. [CVE-2025-22871] Vendor Affected Components: Go: 1.23.x < 1.23.8More Details: [CVE-2025-22871](https://nvd.nist.gov/vuln/detail/CVE-2025-22871)Patcheshttps://github.com/traefik/traefik/releases/tag/v2.11.24https://github.com/traefik/traefik/releases/tag/v3.3.6https://github.com/traefik/traefik/releases/tag/v3.4.0-rc2 | [] |
CVE-2011-1783 | The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data. | [
"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-59gh-4pp9-3287 | An issue in BoltWire v.6.03 allows a remote attacker to obtain sensitive information via a crafted payload to the view and change admin password function. | [] |
|
GHSA-4fc7-mvrr-wv2c | Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available. | [] |
|
GHSA-4fgh-2vxj-rhg5 | Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an SSL incorrect hostname certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information. | [] |
|
CVE-2023-2418 | Konga Login API random values | A vulnerability was found in Konga 2.8.3 on Kong. It has been classified as problematic. This affects an unknown part of the component Login API. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The associated identifier of this vulnerability is VDB-227715. | [
"cpe:2.3:a:konghq:kong:2.8.3:*:*:*:*:*:*:*"
] |
CVE-2025-30535 | WordPress External image replace plugin <= 1.0.8 - Cross Site Request Forgery (CSRF) to Settings Change vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in muro External image replace allows Cross Site Request Forgery. This issue affects External image replace: from n/a through 1.0.8. | [] |
CVE-2022-4631 | WP-Ban ban-options.php cross site scripting | A vulnerability, which was classified as problematic, was found in WP-Ban. Affected is an unknown function of the file ban-options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 22b925449c84faa9b7496abe4f8f5661cb5eb3bf. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216480. | [
"cpe:2.3:a:wp-ban_project:wp-ban:-:*:*:*:*:wordpress:*:*"
] |
CVE-2020-21523 | A Server-Side Freemarker template injection vulnerability in halo CMS v1.1.3 In the Edit Theme File function. The ftl file can be edited. This is the Freemarker template file. This file can cause arbitrary code execution when it is rendered in the background. exp: <#assign test="freemarker.template.utility.Execute"?new()> ${test("touch /tmp/freemarkerPwned")} | [
"cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-99cg-fq8g-hrc9 | HP Virtual Connect Enterprise Manager (VCEM) SDK before 7.5.0, as used in HP Matrix Operating Environment before 7.5.0 and other products, allows remote authenticated users to obtain sensitive information via unspecified vectors. | [] |
|
CVE-2024-9896 | BBP Core – Expand bbPress powered forums with useful features <= 1.2.5 - Reflected Cross-Site Scripting via add_query_arg Parameter | The BBP Core – Expand bbPress powered forums with useful features plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:spider-themes:bbp_core:*:*:*:*:*:wordpress:*:*"
] |
GHSA-gv23-mcr7-vrqf | PTC Codebeamer is vulnerable to a cross site scripting vulnerability that could allow an attacker to inject and execute malicious code. | [] |
|
GHSA-6mpm-xvfm-qh84 | Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets. | [] |
|
CVE-2011-4347 | The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in the KVM subsystem in the Linux kernel before 3.1.10 does not verify permission to access PCI configuration space and BAR resources, which allows host OS users to assign PCI devices and cause a denial of service (host OS crash) via a KVM_ASSIGN_PCI_DEVICE operation. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*"
] |
|
CVE-2022-35777 | Visual Studio Remote Code Execution Vulnerability | Visual Studio Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:visual_studio:2012:update_5:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio:2013:update_5:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*"
] |
CVE-2014-4688 | pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php. | [
"cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-1666 | SourceCodester Automatic Question Paper Generator System GET Parameter view_class.php sql injection | A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. This vulnerability affects unknown code of the file users/classes/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224104. | [
"cpe:2.3:a:automatic_question_paper_generator_system_project:automatic_question_paper_generator_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2024-45406 | Craft CMS stored XSS in breadcrumb list and title fields | Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input. | [
"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*"
] |
CVE-2024-39482 | bcache: fix variable length array abuse in btree_iter | In the Linux kernel, the following vulnerability has been resolved:
bcache: fix variable length array abuse in btree_iter
btree_iter is used in two ways: either allocated on the stack with a
fixed size MAX_BSETS, or from a mempool with a dynamic size based on the
specific cache set. Previously, the struct had a fixed-length array of
size MAX_BSETS which was indexed out-of-bounds for the dynamically-sized
iterators, which causes UBSAN to complain.
This patch uses the same approach as in bcachefs's sort_iter and splits
the iterator into a btree_iter with a flexible array member and a
btree_iter_stack which embeds a btree_iter as well as a fixed-length
data array. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2023-0071 | WP Tabs < 2.1.17 - Contributor+ Stored XSS | The WP Tabs WordPress plugin before 2.1.17 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [
"cpe:2.3:a:shapedplugin:wp_tabs:*:*:*:*:*:wordpress:*:*"
] |
CVE-2002-0469 | Ecartis (formerly Listar) 1.0.0 in snapshot 20020125 and earlier does not properly drop privileges when Ecartis is installed setuid-root, "lock-to-user" is not set, and ecartis is called by certain MTA's, which could allow local users to gain privileges. | [
"cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-21:*:*:*:*:*:*:*",
"cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-25:*:*:*:*:*:*:*",
"cpe:2.3:a:listar:listar:0.126a:*:*:*:*:*:*:*",
"cpe:2.3:a:listar:listar:0.127a:*:*:*:*:*:*:*",
"cpe:2.3:a:listar:listar:0.129a:*:*:*:*:*:*:*"
] |
|
GHSA-pwcw-6f5g-gxf8 | Helm vulnerable to information disclosure via getHostByName Function | A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function.Impact`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart.Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server.PatchesThe issue has been fixed in Helm 3.11.1.WorkaroundsPrior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.For more informationHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.CreditsDisclosed by Philipp Stehle at SAP. | [] |
CVE-2018-15481 | Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder. | [
"cpe:2.3:o:ucopia:wireless_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ucopia:wireless_appliance:-:*:*:*:*:*:*:*"
] |
|
GHSA-p9wv-xg3r-33r2 | Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie. | [] |
|
CVE-2004-0231 | Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations." | [
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-30211 | Improper access control in some Intel(R) ME driver pack installer engines before version 2422.6.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2024-3758 | Hmdfs has a heap buffer overflow vulnerability | in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow. | [
"cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*"
] |
CVE-2007-5963 | Unspecified vulnerability in kdebase allows local users to cause a denial of service (KDM login inaccessible, or resource consumption) via unknown vectors. | [
"cpe:2.3:o:kde:kde:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-39861 | Adobe Acrobat Reader DC Catalog Plugin Out-of-Bounds Read Bug | Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_2017:*:*:*:*:classic_2017:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_2017:*:*:*:*:classic_2017:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] |
CVE-2008-0914 | Multiple cross-site scripting (XSS) vulnerabilities in the Mediation server in IPdiva SSL VPN Server 2.2 before 2.2.8.84 and 2.3 before 2.3.2.14 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ipdiva:ipdiva:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipdiva:ipdiva:2.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-22048 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
GHSA-gc7p-h58r-x4mr | Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(4) and earlier allow remote attackers to cause a denial of service via a flood of packets, aka Bug ID CSCtg06316. | [] |
|
GHSA-w7j8-5xhg-jwrw | TRITON AP-EMAIL 8.2 before 8.2 IB does not properly restrict file access in an unspecified directory. | [] |
|
GHSA-4fqg-89cc-5pv5 | Malicious Package in sj-labc | All versions of `sj-labc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] |
CVE-2020-8916 | Memory leak in wpanctl can lead to DoS | A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to restrict access in your debug environments. | [
"cpe:2.3:a:openthread:wpantund:*:*:*:*:*:*:*:*"
] |
GHSA-jrp9-wjr5-77p4 | A vulnerability in the REST API of Cisco Firepower Device Manager (FDM) On-Box Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. This vulnerability is due to insufficient sanitization of user input on specific REST API commands. An attacker could exploit this vulnerability by sending a crafted HTTP request to the API subsystem of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system. To exploit this vulnerability, an attacker would need valid low-privileged user credentials. | [] |
|
GHSA-mcm3-pfm7-4jqc | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again parameters in the My Preferences - Add user component. | [] |
|
GHSA-xrxc-cv69-f3fp | Arbitrary file upload to web root in the IDAttend’s IDWeb application 3.1.013 allows authenticated attackers to upload dangerous files to web root such as ASP or ASPX, gaining command execution on the affected server. | [] |
|
GHSA-6vq9-c7rm-r447 | In the Linux kernel, the following vulnerability has been resolved:wifi: rtw88: usb: schedule rx work after everything is set upRight now it's possible to hit NULL pointer dereference in
rtw_rx_fill_rx_status on hw object and/or its fields because
initialization routine can start getting USB replies before
rtw_dev is fully setup.The stack trace looks like this:rtw_rx_fill_rx_status
rtw8821c_query_rx_desc
rtw_usb_rx_handler
...
queue_work
rtw_usb_read_port_complete
...
usb_submit_urb
rtw_usb_rx_resubmit
rtw_usb_init_rx
rtw_usb_probeSo while we do the async stuff rtw_usb_probe continues and calls
rtw_register_hw, which does all kinds of initialization (e.g.
via ieee80211_register_hw) that rtw_rx_fill_rx_status relies on.Fix this by moving the first usb_submit_urb after everything
is set up.For me, this bug manifested as:
[ 8.893177] rtw_8821cu 1-1:1.2: band wrong, packet dropped
[ 8.910904] rtw_8821cu 1-1:1.2: hw->conf.chandef.chan NULL in rtw_rx_fill_rx_status
because I'm using Larry's backport of rtw88 driver with the NULL
checks in rtw_rx_fill_rx_status. | [] |
|
CVE-2019-5867 | Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-q966-x4v8-whfm | Missing Authorization vulnerability in Mateusz Czardybon Justified Gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Justified Gallery: from n/a through 1.7.3. | [] |
|
GHSA-x9wg-fm6f-f8w7 | Nessus versions 8.2.1 and earlier were found to contain a stored XSS vulnerability due to improper validation of user-supplied input. An authenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session. Tenable has released Nessus 8.2.2 to address this issue. | [] |
|
CVE-2021-4357 | The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability checks, and a missing security nonce, on the UlistingUserRole::save_role_api function in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to arbitrarily delete site posts and pages. | [
"cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-qgjq-qw4q-mfpv | A vulnerability has been found in OpenBMB XAgent up to 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /conv/community. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2025-52474 | WeGIA SQL Injection Vulnerability in id Parameter on control.php Endpoint | WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, a SQL Injection vulnerability was identified in the id parameter of the /WeGIA/controle/control.php endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data. This issue has been patched in version 3.4.2. | [] |
GHSA-m256-5rj4-75c4 | The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when creating and editing its shortcode, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | [] |
|
CVE-2008-1390 | The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses. | [
"cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-29121 | Exposed TCF agent service in Enel X Juicebox | Waybox Enel TCF Agent service could be used to get administrator’s privileges over the Waybox system. | [
"cpe:2.3:a:enel_x:juicebox_pro3.0_22kw_cellular:*:*:*:*:*:*:*:*",
"cpe:2.3:o:enelx:waybox_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:enelx:waybox_pro:3.0:*:*:*:*:*:*:*"
] |
CVE-2022-36008 | Message length overflow in frontier | Frontier is Substrate's Ethereum compatibility layer. A security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic. No action is needed unless you have a bridge node that needs to distinguish different reversion exit reasons and you used RPC for this. There are currently no known workarounds. | [
"cpe:2.3:a:parity:frontier:-:*:*:*:*:*:*:*"
] |
GHSA-h598-h2hg-rch5 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows an attacker using a specially crafted project file to supply a pointer for a controlled memory address, which may allow remote code execution, data exfiltration, or cause a system crash. | [] |
|
CVE-2023-3774 | Vault Enterprise Namespace Creation May Lead to Denial of Service | An unhandled error in Vault Enterprise's namespace creation may cause the Vault process to crash, potentially resulting in denial of service. Fixed in 1.14.1, 1.13.5, and 1.12.9. | [
"cpe:2.3:a:hashicorp:vault:1.12.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hashicorp:vault:1.13.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hashicorp:vault:1.14.0:*:*:*:enterprise:*:*:*"
] |
GHSA-838x-prqr-qg3c | Insecure inherited permissions in the NVM Update Utility for some Intel(R) Ethernet Network Adapter E810 Series before version 4.60 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2020-6960 | The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch contain an SQL injection vulnerability that could give an attacker remote unauthenticated access to the web user interface with administrator-level privileges. | [
"cpe:2.3:o:honeywell:maxpro_nvr_xe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:maxpro_nvr_xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:maxpro_nvr_se_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:maxpro_nvr_se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:maxpro_nvr_pe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:maxpro_nvr_pe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:mpnvrswxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:mpnvrswxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hnmswvms_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hnmswvms:-:*:*:*:*:*:*:*",
"cpe:2.3:o:honeywell:hnmswvmslt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:hnmswvmslt:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-20643 | NETGEAR RAX40 devices before 1.0.3.64 are affected by disclosure of sensitive information. | [
"cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*"
] |
|
GHSA-9q3v-827r-c9mw | The myCred WordPress plugin before 2.3 does not validate or escape the fields parameter before using it in a SQL statement, leading to an SQL injection exploitable by any authenticated user | [] |
|
GHSA-22vq-wcg7-jq7r | The socket implementation in net/core/sock.c in the Linux kernel before 2.6.35 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service by sending a large amount of network traffic, related to the sk_add_backlog function and the sk_rmem_alloc socket field. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4251. | [] |
|
CVE-2020-7942 | Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 and 5.5.19 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. Affected software versions: Puppet 6.x prior to 6.13.0 Puppet Agent 6.x prior to 6.13.0 Puppet 5.5.x prior to 5.5.19 Puppet Agent 5.5.x prior to 5.5.19 Resolved in: Puppet 6.13.0 Puppet Agent 6.13.0 Puppet 5.5.19 Puppet Agent 5.5.19 | [
"cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*"
] |
|
GHSA-vm3m-gqc9-52ch | The Wildog/flask-file-server repository through 2020-02-20 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [] |
|
CVE-2025-31843 | WordPress OpenAI Tools for WordPress & WooCommerce plugin <= 2.1.5 - Broken Access Control vulnerability | Missing Authorization vulnerability in Wilson OpenAI Tools for WordPress & WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects OpenAI Tools for WordPress & WooCommerce: from n/a through 2.1.5. | [] |
CVE-2010-2505 | Soft SaschArt SasCAM Webcam Server 2.6.5, 2.7, and earlier allows remote attackers to cause a denial of service (crash) via a large number of requests with a long line, as demonstrated using a long GET request. | [
"cpe:2.3:a:saschart:sascam_webcam_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:saschart:sascam_webcam_server:2.6.5:*:*:*:*:*:*:*"
] |
|
GHSA-x9vj-7v57-p27f | llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176. | [] |
|
GHSA-9q5j-6j5r-qjfh | Cross-site request forgery (CSRF) vulnerability in the Administrative Console in IBM WebSphere Application Server (WAS) 6.x through 6.1.0.47, 7.0 before 7.0.0.35, 8.0 before 8.0.0.10, and 8.5 before 8.5.5.4 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences. | [] |
|
CVE-2015-3872 | libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23346388. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-0770 | Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] |
|
GHSA-8v6j-vg6w-6wwj | langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint. | [] |
|
GHSA-692g-rgm4-9v87 | Insertion of sensitive information into log vulnerability in Locksettings prior to SMR Sep-2023 Release 1 allows a privileged local attacker to get lock screen match information from the log. | [] |
|
GHSA-9qcx-32pg-7pqp | Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings. | [] |
|
GHSA-4jfp-x3q6-2vqx | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound XLSXviewer allows Path Traversal. This issue affects XLSXviewer: from n/a through 2.1.1. | [] |
|
CVE-2021-46419 | An unauthorized file deletion vulnerability in Telesquare TLR-2855KS6 via DELETE method can allow deletion of system files and scripts. | [
"cpe:2.3:o:telesquare:tlr-2855ks6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telesquare:tlr-2855ks6:-:*:*:*:*:*:*:*"
] |
|
GHSA-3wxg-w96j-8hq9 | CraftCMS stored XSS in Quick Post widget error message | SummaryThe platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload.DetailsOld CVE fixed the XSS in label HTML but didn’t fix it when clicking save.PoCLogin at adminGo to settingCreate a SectionOn Entry page, click Edit labelInject the XSS payload into the label and saveOn the admin dashboard choose new widget -> Quick PostIn Quick Post, click save with blank slug; The XSS will be executed"errors":{"title":["<script>alert('nono')</script> cannot be blank."],"slug":["Slug cannot be blank."]Fixed in https://github.com/craftcms/cms/commit/9d0cd0bda7c8a830a3373f8c0f06943e519ac888 | [] |
CVE-2021-20030 | SonicWall GMS is vulnerable to file path manipulation resulting that an unauthenticated attacker can gain access to web directory containing application's binaries and configuration files. | [
"cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-10634 | scala-standalone-bin is a Binary wrapper for ScalaJS. scala-standalone-bin downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:scalajs-standalone-bin_project:scalajs-standalone-bin:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2023-4582 | Due to large allocation checks in Angle for glsl shaders being too lenient a buffer overflow could have occured when allocating too much private shader memory on mac OS.
*This bug only affects Firefox on macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-5064 | SQL injection vulnerability in liga.php in H&H WebSoccer 2.80 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:h\\&h:websoccer:2.80:*:*:*:*:*:*:*"
] |
|
CVE-2022-49446 | nvdimm: Fix firmware activation deadlock scenarios | In the Linux kernel, the following vulnerability has been resolved:
nvdimm: Fix firmware activation deadlock scenarios
Lockdep reports the following deadlock scenarios for CXL root device
power-management, device_prepare(), operations, and device_shutdown()
operations for 'nd_region' devices:
Chain exists of:
&nvdimm_region_key --> &nvdimm_bus->reconfig_mutex --> system_transition_mutex
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(system_transition_mutex);
lock(&nvdimm_bus->reconfig_mutex);
lock(system_transition_mutex);
lock(&nvdimm_region_key);
Chain exists of:
&cxl_nvdimm_bridge_key --> acpi_scan_lock --> &cxl_root_key
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(&cxl_root_key);
lock(acpi_scan_lock);
lock(&cxl_root_key);
lock(&cxl_nvdimm_bridge_key);
These stem from holding nvdimm_bus_lock() over hibernate_quiet_exec()
which walks the entire system device topology taking device_lock() along
the way. The nvdimm_bus_lock() is protecting against unregistration,
multiple simultaneous ops callers, and preventing activate_show() from
racing activate_store(). For the first 2, the lock is redundant.
Unregistration already flushes all ops users, and sysfs already prevents
multiple threads to be active in an ops handler at the same time. For
the last userspace should already be waiting for its last
activate_store() to complete, and does not need activate_show() to flush
the write side, so this lock usage can be deleted in these attributes. | [] |
CVE-2023-2117 | Image Optimizer by 10web < 1.0.27 - Admin+ Path Traversal | The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root. | [
"cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-28167 | Missing Authorization check in SAP Group Reporting Data Collection (Enter Package Data) | SAP Group Reporting Data Collection does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.
| [
"cpe:2.3:a:sap_se:sap_group_reporting_data_collection:*:*:*:*:*:*:*:*"
] |
CVE-2008-7166 | Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364. | [
"cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.20.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.27.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:4.27.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bittorrent:bittorrent:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:utorrent:utorrent:1.7.5:*:*:*:*:*:*:*"
] |
|
GHSA-mjgf-fjmw-jf84 | A vulnerability was found in Tenda AC23 16.03.07.45 and classified as critical. Affected by this issue is the function formSetSysToolDDNS/formGetSysToolDDNS of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220640. | [] |
|
GHSA-8m4w-439f-hw99 | PHP remote file inclusion vulnerability in sinapis.php in Sinapis Forum 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the fuss parameter. | [] |
|
CVE-2016-10291 | An elevation of privilege vulnerability in the Qualcomm Slimbus driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-34030871. References: QC-CR#986837. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*"
] |
|
GHSA-24cc-5mgg-6xch | SQL injection vulnerability in include/functions_trackbacks.inc.php in Serendipity 1.6.2 allows remote attackers to execute arbitrary SQL commands via the url parameter to comment.php. | [] |
|
CVE-2022-4510 | Path Traversal in binwalk | A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins.
This vulnerability is associated with program files src/binwalk/plugins/unpfs.py.
This issue affects binwalk from 2.1.2b through 2.3.3 included. | [
"cpe:2.3:a:microsoft:binwalk:*:*:*:*:*:*:*:*"
] |
CVE-2017-15615 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_client.lua file. | [
"cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*"
] |
|
GHSA-fjxh-77hg-36f8 | Cross-site scripting (XSS) vulnerability in the Ubercart Webform Checkout Pane module 6.x-3.x before 6.x-3.10 and 7.x-3.x before 7.x-3.11 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2015-0469 | Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. | [
"cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update81:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update40:*:*:*:*:*:*"
] |
|
CVE-2016-7642 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] |
|
GHSA-fp4w-r85f-ff69 | Multiple PHP remote file inclusion vulnerabilities in SmartISoft phpListPro 2.01 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the returnpath parameter in (1) editsite.php, (2) addsite.php, and (3) in.php. NOTE: The config.php vector is already covered by CVE-2006-1749. | [] |
|
CVE-2022-35041 | OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b558f. | [
"cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*"
] |
|
CVE-2004-0082 | The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password. | [
"cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-3207 | Simple File List < 4.4.12 - Admin+ Stored Cross-Site Scripting | The Simple File List WordPress plugin before 4.4.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:*"
] |
GHSA-gg39-h2qq-j648 | SQL injection vulnerabilities exist in the ID parameters of OS4Ed openSIS 7.3 pages. The id parameter in the page CourseMoreInfo.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [] |
|
CVE-2016-10693 | pm2-kafka is a PM2 module that installs and runs a kafka server pm2-kafka downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:pm2-kafka_project:pm2-kafka:1.0.0:*:*:*:*:node.js:*:*"
] |
|
GHSA-ph35-xjxx-64r9 | The RSA 1.5 algorithm implementation in the JOSE_JWE class in JWE.php in jose-php before 2.2.1 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA). | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.