id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
GHSA-c6gv-ggmm-8j39 | GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey. | [] |
|
CVE-2019-11953 | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] |
|
GHSA-x34m-jr7g-hrw7 | Whole Hog Password Protect: Enhanced 1.x allows remote attackers to bypass authentication and obtain administrative access via an integer value in the adminid cookie. | [] |
|
GHSA-r565-39fq-fxjv | Multiple buffer overflows in the RealPage Module Upload ActiveX control in Realpage.dll 1.0.0.9 in RealPage Module ActiveX Controls allow remote attackers to execute arbitrary code via a long (1) DestURL or (2) SourceFile property value. | [] |
|
GHSA-qgg8-99p6-v8v8 | LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail. | [] |
|
GHSA-g5h2-pp6c-m6qp | Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnReadyStateChange Remote Code Execution Vulnerability." | [] |
|
CVE-2025-40675 | Reflected Cross-Site Scripting (XSS) in Bagisto | A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the parameter 'query' in '/search'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user. | [] |
CVE-2021-47171 | net: usb: fix memory leak in smsc75xx_bind | In the Linux kernel, the following vulnerability has been resolved:
net: usb: fix memory leak in smsc75xx_bind
Syzbot reported memory leak in smsc75xx_bind().
The problem was is non-freed memory in case of
errors after memory allocation.
backtrace:
[<ffffffff84245b62>] kmalloc include/linux/slab.h:556 [inline]
[<ffffffff84245b62>] kzalloc include/linux/slab.h:686 [inline]
[<ffffffff84245b62>] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460
[<ffffffff82b5b2e6>] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-8p6h-3h6c-4hjv | An issue was discovered in MK-AUTH 19.01. The web login functionality allows an attacker to bypass authentication and gain client privileges via SQL injection in central/executar_login.php. | [] |
|
CVE-2002-0010 | Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges. | [
"cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*"
] |
|
GHSA-w9vx-wg94-r6pj | Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow. | [] |
|
CVE-2023-6864 | Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-42512 | In VsimOperationDataExt::encode of vsimdata.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763050References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-9031 | An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a NULL pointer dereference in the function Mat_VarFree() in mat.c. | [
"cpe:2.3:a:matio_project:matio:1.5.13:*:*:*:*:*:*:*"
] |
|
CVE-2017-1110 | IBM Curam Social Program Management 6.0, 6.1, 6.2, and 7.0 contains an unspecified vulnerability that could allow an authenticated user to view the incidents of a higher privileged user. IBM X-Force ID: 120915. | [
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:7.0.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-cm8h-rhxh-h795 | Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0297, CVE-2014-0308, and CVE-2014-0312. | [] |
|
GHSA-ghg5-qv84-mmvj | Use of default credentials for the TELNET server in Petwant PF-103 firmware 4.3.2.50 and Petalk AI 3.2.2.30 allows remote attackers to execute arbitrary system commands as the root user. | [] |
|
GHSA-6m77-33f8-v28x | All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0
are vulnerable to reflected cross site scripting (XSS) attacks in get
view method under view parameter. The ETIC RAS web server uses dynamic
pages that get their input from the client side and reflect the input in
their response to the client. | [] |
|
GHSA-p3m4-jx3q-wpfv | Cross-site scripting (XSS) vulnerability in the "Basic Toolbar Selection" in FCKEditor allows remote attackers to execute arbitrary JavaScript via the javascript: URI in the (1) href or (2) onmouseover attribute of the A HTML tag. | [] |
|
CVE-2014-6564 | Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] |
|
GHSA-g49g-rqj4-vx4f | Multiple cross-site scripting (XSS) vulnerabilities in IBM Sterling B2B Integrator 5.2.4 and Sterling File Gateway allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-x2cf-694f-4qp5 | Unrestricted file upload vulnerability in admin/uploadImage.html in SearchBlox before 8.2 allows remote attackers to execute arbitrary code by uploading a file with an executable extension and the image/jpeg content type, a different vulnerability than CVE-2013-3590. | [] |
|
GHSA-p357-vv6x-p853 | initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors. | [] |
|
GHSA-3hq4-jm2f-8478 | Buffer overflow vulnerability in function AP4_MemoryByteStream::WritePartial in mp42aac in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file. | [] |
|
CVE-2023-31356 | Incomplete system memory cleanup in SEV firmware could
allow a privileged attacker to corrupt guest private memory, potentially
resulting in a loss of data integrity. | [] |
|
CVE-2022-39372 | Stored Cross-Site Scripting (XSS) in user information in GLPI | GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] |
GHSA-xhw9-4wqq-x67v | rdiffweb vulnerable to potential DoS via memory consumption | rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "title" field when adding an SSH key.
This can result in excess memory consumption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds. | [] |
GHSA-f292-rrf7-hw2j | A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have Admin privileges on an affected device. | [] |
|
CVE-2014-7926 | The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:communications_messaging_server:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:communications_messaging_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
] |
|
CVE-2016-3295 | Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
GHSA-pf5c-h4wr-qw37 | The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.15.1. This is due to the plugin utilizing Symfony and leaving display_errors on within test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. | [] |
|
GHSA-3q8v-f398-frg8 | The PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, does not properly handle object linkage, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted document. | [] |
|
GHSA-985c-hrh4-r66m | Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified "relative search path." | [] |
|
CVE-2021-37990 | Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-2958 | Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all BI Publisher accessible data as well as unauthorized read access to a subset of BI Publisher accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N). | [
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-11330 | The DivFixppCore::avi_header_fix function in DivFix++Core.cpp in DivFix++ v0.34 allows remote attackers to cause a denial of service (invalid memory write and application crash) via a crafted avi file. | [
"cpe:2.3:a:divfix:divfix\\+\\+:0.34:*:*:*:*:*:*:*"
] |
|
CVE-2023-32240 | WordPress Woodmart theme <= 7.2.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in Xtemos WoodMart allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WoodMart: from n/a through 7.2.1. | [] |
CVE-2005-2986 | The v3flt2k.sys driver in AhnLab V3Pro 2004 Build 6.0.0.383, V3 VirusBlock 2005 Build 6.0.0.383, V3Net for Windows Server 6.0 Build 6.0.0.383 does not properly validate the source of the DeviceIoControl commands, which allows remote attackers to gain privileges. | [
"cpe:2.3:a:ahnlab:v3_virusblock_2005:6.0.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:ahnlab:v3net:6.0.0.383:*:win_server:*:*:*:*:*",
"cpe:2.3:a:ahnlab:v3pro_2004:6.0.0.383:*:*:*:*:*:*:*"
] |
|
CVE-2025-43973 | An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message. | [] |
|
GHSA-7893-9j9h-935c | The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter. | [] |
|
GHSA-jxhw-mg8m-2pj8 | Devise does not properly perform type conversion when performing database queries | Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts. | [] |
CVE-2022-34758 | A CWE-20: Improper Input Validation vulnerability exists that could cause the device watchdog function to be disabled if the attacker had access to privileged user credentials. Affected Products: Easergy P5 (V01.401.102 and prior) | [
"cpe:2.3:o:schneider-electric:easergy_p5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:easergy_p5:-:*:*:*:*:*:*:*"
] |
|
GHSA-88v7-949m-r8f8 | Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2009-1734 | SQL injection vulnerability in listing_video.php in VidSharePro allows remote attackers to execute arbitrary SQL commands via the catid parameter. | [
"cpe:2.3:a:omnisoftsol:vidsharepro:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-50065 | virtio_net: fix memory leak inside XPD_TX with mergeable | In the Linux kernel, the following vulnerability has been resolved:
virtio_net: fix memory leak inside XPD_TX with mergeable
When we call xdp_convert_buff_to_frame() to get xdpf, if it returns
NULL, we should check if xdp_page was allocated by xdp_linearize_page().
If it is newly allocated, it should be freed here alone. Just like any
other "goto err_xdp". | [] |
CVE-2023-45957 | A stored cross-site scripting (XSS) vulnerability in the component admin/AdminRequestSqlController.php of thirty bees before 1.5.0 allows attackers to execute arbitrary web script or HTML via $e->getMessage() error mishandling. | [
"cpe:2.3:a:thirtybees:thirty_bees:*:*:*:*:*:*:*:*"
] |
|
GHSA-5j3v-r3rh-6vh7 | Bentley Systems MicroStation Connect versions 10.17.0.209 and prior are vulnerable to a Stack-Based Buffer Overflow when a malformed design (DGN) file is parsed. This may allow an attacker to execute arbitrary code. | [] |
|
GHSA-hwr9-3qwm-5crv | The Lock Master app 2.2.4 for Android allows unauthorized apps to modify the values in its SharedPreference files. These files hold data that affects many app functions. Malicious modifications by unauthorized apps can cause security issues, such as functionality manipulation, resulting in a severe escalation of privilege attack. | [] |
|
CVE-2014-5100 | Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_label parameter to admin/users/api-keys/1, or (3) disable file validation via a request to admin/settings/edit-security. | [
"cpe:2.3:a:omeka:omeka:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-39863 | Apache Airflow: Potential XSS Vulnerability | Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.
| [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
] |
CVE-2021-0571 | In ActivityTaskManagerService.startActivity() and AppTaskImpl.startActivity() of ActivityTaskManagerService.java and AppTaskImpl.java, there is possible access to restricted activities due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137395936 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-g8f7-67xp-2h72 | Logic error in BIOS firmware for 8th, 9th and 10th Generation Intel(R) Core(TM) Processors may allow an unauthenticated user to potentially enable escalation of privilege, denial of service and/or information disclosure via physical access. | [] |
|
GHSA-pm8c-p624-72x2 | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. Photos belonging to the Hidden Photos Album could be viewed without authentication through Visual Lookup | [] |
|
GHSA-w572-29mg-j3qq | A vulnerability classified as critical was found in Netentsec NS-ASG Application Security Gateway 6.3. This vulnerability affects unknown code of the file /admin/add_ikev2.php. The manipulation of the argument TunnelId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259714 is the identifier assigned to this vulnerability. | [] |
|
CVE-2003-0400 | Vignette StoryServer and Vignette V/5 does not properly calculate the size of text variables, which causes Vignette to return unauthorized portions of memory, as demonstrated using the "-->" string in a CookieName argument to the login template, referred to as a "memory leak" in some reports. | [
"cpe:2.3:a:vignette:content_suite:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vignette:storyserver:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vignette:storyserver:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vignette:storyserver:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vignette:storyserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vignette:vignette:5.0:*:*:*:*:*:*:*"
] |
|
GHSA-mv6j-3x76-3g9r | Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] |
|
GHSA-23p6-m374-wpr8 | CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00. | [] |
|
CVE-2024-10989 | code-projects E-Health Care System detail.php sql injection | A vulnerability classified as critical has been found in code-projects E-Health Care System 1.0. This affects an unknown part of the file /Admin/detail.php. The manipulation of the argument s_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory confuses the vulnerability class of this issue. | [
"cpe:2.3:a:code-projects:e-health_care_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:anisha:e-health_care_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2019-8149 | Insecure authentication and session management vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An unauthenticated user can append arbitrary session id that will not be invalidated by subsequent authentication. | [
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:open_source:*:*:*"
] |
|
CVE-2023-0912 | SourceCodester Auto Dealer Management System sql injection | A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. This affects an unknown part of the file /adms/admin/?page=vehicles/view_transaction. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221481 was assigned to this vulnerability. | [
"cpe:2.3:a:auto_dealer_management_system_project:auto_dealer_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-jh8v-f3wq-v85p | IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 263376. | [] |
|
GHSA-5c4w-8hhh-3c3h | Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability | A vulnerability was identified in Consul and Consul Enterprise ("Consul") such that using Headers in L7 traffic intentions could bypass HTTP header based access rules. | [] |
GHSA-x274-9m9r-fm5g | Jenkins does not Verify Checksums for Plugin Files | The Plugins Manager in Jenkins before 1.640 and LTS before 1.625.2 does not verify checksums for plugin files referenced in update site data, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted plugin. | [] |
GHSA-m2rw-gwp5-6wqw | An exploitable firmware modification vulnerability was discovered on the Netgear WPN824EXT WiFi Range Extender. An attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the CRC check. A successful attack can either introduce a backdoor to the device or make the device DoS. This affects Firmware Version: 1.1.1_1.1.9. | [] |
|
CVE-2013-3798 | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect integrity and availability via unknown vectors related to MemCached. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*"
] |
|
GHSA-ww3m-j46v-9wf2 | Out-of-bounds read in applying binary with data in Samsung Notes prior to version 4.4.21.62 allows local attackers to potentially read memory. | [] |
|
CVE-2012-4501 | Citrix Cloud.com CloudStack, and Apache CloudStack pre-release, allows remote attackers to make arbitrary API calls by leveraging the system user account, as demonstrated by API calls to delete VMs. | [
"cpe:2.3:a:apache:cloudstack:-:prerelease:*:*:*:*:*:*",
"cpe:2.3:a:citrix:cloudstack:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-5891 | Quay: unauthorized user may authenticate via oauth application token | A vulnerability was found in Quay. If an attacker can obtain the client ID for an application, they can use an OAuth token to authenticate despite not having access to the organization from which the application was created. This issue is limited to authentication and not authorization. However, in configurations where endpoints rely only on authentication, a user may authenticate to applications they otherwise have no access to. | [
"cpe:/a:redhat:quay:3",
"cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*"
] |
GHSA-2582-53pq-96cq | Incorrect Default Permissions vulnerability in Apache Tomcat Connectors allows local users to view and modify shared memory containing mod_jk configuration which may lead to information disclosure and/or denial of service.This issue affects Apache Tomcat Connectors: from 1.2.9-beta through 1.2.49. Only mod_jk on Unix like systems is affected. Neither the ISAPI redirector nor mod_jk on Windows is affected.Users are recommended to upgrade to version 1.2.50, which fixes the issue. | [] |
|
GHSA-vh2g-m5fp-2gmh | Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/header.php in Maian Search 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) header, (2) header2, (3) header3, (4) header4, (5) header5, (6) header6, (7) header7, (8) header8, and (9) header9 parameters. | [] |
|
GHSA-7f4p-87qm-rj6c | In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, remote attackers can bypass authentication in the login process by leveraging knowledge of a valid username. | [] |
|
GHSA-36c6-hq98-86j5 | The AlarmService component in HwVmall with software earlier than 1.5.2.0 versions has no control over calling permissions, allowing any third party to call. An attacker can construct a malicious application to call it. Consequently, alert music will be played suddenly, compromising user experience. | [] |
|
CVE-2015-7994 | The SQL interface in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to "SQL Login," aka SAP Security Note 2197428. | [
"cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*"
] |
|
GHSA-2h25-8p7c-58m2 | The Monitoring Administration pages in PNMsoft Sequence Kinetics before 7.7 allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [] |
|
GHSA-532m-842f-wrr5 | Cross-Site Request Forgery (CSRF) vulnerability in Feedbucket Feedbucket – Website Feedback Tool allows Cross Site Request Forgery. This issue affects Feedbucket – Website Feedback Tool: from n/a through 1.0.6. | [] |
|
GHSA-5hq7-h62w-3v89 | PHP remote file inclusion vulnerability in WebCalendar before 1.0.1 allows remote attackers to execute arbitrary PHP code when opening settings.php, possibly via send_reminders.php or other scripts. | [] |
|
GHSA-pr22-23wp-22hm | blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file. | [] |
|
CVE-2016-0656 | Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to InnoDB, a different vulnerability than CVE-2016-0654. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] |
|
GHSA-6gjr-g247-wx36 | Server-Side Request Forgery (SSRF) vulnerability in NotFound Oshine Modules. This issue affects Oshine Modules: from n/a through n/a. | [] |
|
CVE-2007-0798 | Multiple cross-site scripting (XSS) vulnerabilities in Ublog Reload 1.0.5 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) login.asp; and allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters to (2) badword.asp, (3) polls.asp, and (4) users.asp. | [
"cpe:2.3:a:uapplication:ublog_reload:1.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-qhq7-4fq9-2fp7 | Cross-Site Request Forgery (CSRF) vulnerability in AccessPress Themes WP TFeed plugin <= 1.6.9 versions. | [] |
|
GHSA-hxvp-5v52-rfhx | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted MPEG-4 data, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454, CVE-2015-8655, CVE-2015-8821, and CVE-2015-8822. | [] |
|
GHSA-8pwm-77cc-4gjv | Lack of input validation while copying to buffer in WLAN will lead to a buffer overflow in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660. | [] |
|
CVE-2021-23023 | On version 7.2.1.x before 7.2.1.3 and 7.1.x before 7.1.9.9 Update 1, a DLL hijacking issue exists in cachecleaner.dll included in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-gm6x-h9cf-g8wr | Unspecified vulnerability in the Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 allows remote attackers to affect integrity via unknown vectors, a different vulnerability than CVE-2009-0974 and CVE-2009-3407. | [] |
|
CVE-2021-43946 | Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to add administrator groups to filter subscriptions via a Broken Access Control vulnerability in the /secure/EditSubscription.jspa endpoint. The affected versions are before version 8.13.21, and from version 8.14.0 before 8.20.9. | [
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-hh78-84xv-jpmr | TEF portal 2023-07-17 is vulnerable to authenticated remote code execution. | [] |
|
GHSA-mrff-v44r-8gc2 | An issue was discovered in Couchbase Server before 7.2.x before 7.2.4. otpCookie is shown with full admin on pools/default/serverGroups and engageCluster2. | [] |
|
GHSA-mg87-gpmw-w9r3 | While sending a probe request indication in lim_send_sme_probe_req_ind() in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel, a buffer overflow can occur. | [] |
|
GHSA-m8xw-66cv-rfr6 | A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause write access and the execution of commands when uploading a specially crafted file on the controller over FTP. | [] |
|
GHSA-8rpj-gmgj-f4wf | Integer overflow in Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors. | [] |
|
CVE-2019-2907 | Vulnerability in the Oracle Web Services product of Oracle Fusion Middleware (component: SOAP with Attachments API for Java). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Services. While the vulnerability is in Oracle Web Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Web Services accessible data as well as unauthorized read access to a subset of Oracle Web Services accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:web_services:12.2.1.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-21441 | Out-of-bounds Read in Windows WLAN Host | Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. | [] |
GHSA-3g7w-h796-wcg5 | In the Linux kernel, the following vulnerability has been resolved:cxl/pmem: Fix cxl_pmem_region and cxl_memdev leakWhen a cxl_nvdimm object goes through a ->remove() event (device
physically removed, nvdimm-bridge disabled, or nvdimm device disabled),
then any associated regions must also be disabled. As highlighted by the
cxl-create-region.sh test [1], a single device may host multiple
regions, but the driver was only tracking one region at a time. This
leads to a situation where only the last enabled region per nvdimm
device is cleaned up properly. Other regions are leaked, and this also
causes cxl_memdev reference leaks.Fix the tracking by allowing cxl_nvdimm objects to track multiple region
associations. | [] |
|
CVE-2005-4287 | PHP remote file include vulnerability in MarmaraWeb E-commerce allows remote attackers to execute arbitrary code via the page parameter to index.php. | [
"cpe:2.3:a:marmaraweb:marmaraweb_e-commerce:*:*:*:*:*:*:*:*"
] |
|
GHSA-hj7g-wpmp-qxxc | In Zillya! Antivirus 3.0.2230.0, the driver file (zef.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402424. | [] |
|
CVE-2006-0689 | Cross-site scripting (XSS) vulnerability in the Registration Form in TTS Time Tracking Software 3.0 allows remote attackers to inject arbitrary web script or HTML via the UserName parameter. | [
"cpe:2.3:a:scheduling_management.com:time_tracking_software:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-c7vv-qr7x-g477 | The firewall in Astaro Security Linux before 4.024 sends responses to SYN-FIN packets, which makes it easier for remote attackers to obtain information about the system and construct specialized attacks. | [] |
|
CVE-2024-3097 | The WordPress Gallery Plugin – NextGEN Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the get_item function in versions up to, and including, 3.59. This makes it possible for unauthenticated attackers to extract sensitive data including EXIF and other metadata of any image uploaded through the plugin. | [
"cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2018-17624 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of OCG objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6435. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.