id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2022-34520 | Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file. | [
"cpe:2.3:a:radare:radare2:5.7.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-35999 | smb3: missing lock when picking channel | In the Linux kernel, the following vulnerability has been resolved:
smb3: missing lock when picking channel
Coverity spotted a place where we should have been holding the
channel lock when accessing the ses channel index.
Addresses-Coverity: 1582039 ("Data race condition (MISSING_LOCK)") | [] |
GHSA-c5f9-ppjj-3g7p | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter. | [] |
|
CVE-2023-44009 | File Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the Skin Management function. | [
"cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-mw7q-3wxj-rqfx | A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability. | [] |
|
GHSA-mc9m-5hw4-g3g6 | A Server-Side Request Forgery (SSRF) vulnerability was discovered in gaizhenbiao/chuanhuchatgpt version 20240914. The vulnerability allows an attacker to construct a response link by saving the response in a folder named after the SHA-1 hash of the target URL. This enables the attacker to access the response directly, potentially leading to unauthorized access to internal systems, data theft, service disruption, or further attacks such as port scanning and accessing metadata endpoints. | [] |
|
CVE-2021-37052 | There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-qcgv-87r9-9cw4 | Adobe Bridge versions 10.1.1 (and earlier) and 11.0.1 (and earlier) are affected by an Out-of-bounds write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-q27r-qgw3-47hx | The SMTP service in Microsoft Internet Information Services (IIS) 4.0 and 5.0 allows remote attackers to bypass anti-relaying rules and send spam or spoofed messages via encapsulated SMTP addresses, a similar vulnerability to CVE-1999-0682. | [] |
|
CVE-2020-0719 | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0691, CVE-2020-0720, CVE-2020-0721, CVE-2020-0722, CVE-2020-0723, CVE-2020-0724, CVE-2020-0725, CVE-2020-0726, CVE-2020-0731. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-qrqm-fhg8-7274 | Missing authentication for critical function vulnerability in UNIMO Technology digital video recorders (UDR-JA1004/JA1008/JA1016 firmware versions v1.0.20.13 and earlier, and UDR-JA1016 firmware versions v2.0.20.13 and earlier) allows a remote unauthenticated attacker to execute an arbitrary OS command by sending a specially crafted request to the affected device web interface. | [] |
|
CVE-2023-52142 | WordPress Events Shortcodes & Templates For The Events Calendar Plugin <= 2.3.1 is vulnerable to SQL Injection | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cool Plugins Events Shortcodes For The Events Calendar.This issue affects Events Shortcodes For The Events Calendar: from n/a through 2.3.1.
| [
"cpe:2.3:a:coolplugins:events_shortcodes_for_the_events_calendar:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-28074 | Halo-1.5.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via \admin\index.html#/system/tools. | [
"cpe:2.3:a:fit2cloud:halo:1.5.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-10410 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-user.php by adding a question mark (?) followed by the payload. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-8j85-hmc5-39qq | An issue in KeeperChat IOS Application v.5.8.8 allows a physically proximate attacker to escalate privileges via the Biometric Authentication Module | [] |
|
CVE-2009-1316 | Multiple SQL injection vulnerabilities in AbleSpace 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) eid parameter to events_view.php and the (2) id parameter to events_clndr_view.php. | [
"cpe:2.3:a:abk-soft:ablespace:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-4m4g-45pf-2c57 | Buffer overflow in Apple ImageIO on Apple Mac OS X 10.4 through 10.4.7 allows remote attackers to execute arbitrary code via a malformed JPEG2000 image. | [] |
|
GHSA-jcvp-jp5p-524h | Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_patient. | [] |
|
GHSA-6539-6fh5-h34x | The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with a greater ACL Length after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service (firmware crash) via a crafted LMP packet. | [] |
|
CVE-2022-21248 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2007-3236 | PHP remote file inclusion vulnerability in footer.php in the Horoscope 1.0 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the xoopsConfig[root_path] parameter. | [
"cpe:2.3:a:xoops:horoscope_module:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-12216 | A vulnerability in the web-based user interface of Cisco SocialMiner could allow an unauthenticated, remote attacker to have read and write access to information stored in the affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file with malicious entries, which could allow the attacker to read and write files and execute remote code within the application. Cisco Bug IDs: CSCvf47946. | [
"cpe:2.3:a:cisco:socialminer:-:*:*:*:*:*:*:*"
] |
|
GHSA-2f7w-8245-v7w6 | An issue was discovered in Thomson Reuters Desktop Extensions 1.9.0.358. An unauthenticated directory traversal and local file inclusion vulnerability in the ThomsonReuters.Desktop.Service.exe and ThomsonReuters.Desktop.exe allows a remote attacker to list or enumerate sensitive contents of files via a \.. to port 6677. Additionally, this could allow for privilege escalation by dumping the affected machine's SAM and SYSTEM database files, as well as remote code execution. | [] |
|
CVE-2019-1003007 | A cross-site request forgery vulnerability exists in Jenkins Warnings Plugin 5.0.0 and earlier in src/main/java/hudson/plugins/warnings/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint. | [
"cpe:2.3:a:jenkins:warnings:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-vcw3-9m5f-w235 | TOTOLINK CPE CP900 V6.3c.1144_B20190715 was discovered to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the url or magicid parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | [] |
|
CVE-2007-3280 | The Database Link library (dblink) in PostgreSQL 8.1 implements functions via CREATE statements that map to arbitrary libraries based on the C programming language, which allows remote authenticated superusers to map and execute a function from any library, as demonstrated by using the system function in libc.so.6 to gain shell access. | [
"cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*"
] |
|
GHSA-87rf-xcxq-w82r | Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation. | [] |
|
CVE-2024-42621 | Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_editor.php | [
"cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-r6xq-xcxc-fghx | Improper Privilege Management in microweber | Microweber prior to 1.3.4 has an Improper Privilege Management vulnerability. | [] |
CVE-2009-4727 | SQL injection vulnerability in x/login in JungleScripts Ajax Short Url Script allows remote attackers to execute arbitrary SQL commands via the username parameter. | [
"cpe:2.3:a:junglescripts:ajax_short_url_script:*:*:*:*:*:*:*:*"
] |
|
GHSA-279f-qwgh-h5mp | Jenkins does not exclude sensitive build variables from search | Jenkins allows filtering builds in the build history widget by specifying an expression that searches for matching builds by name, description, parameter values, etc.Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from this search.This allows attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.Jenkins 2.424, LTS 2.414.2 excludes sensitive variables from this search. | [] |
CVE-2021-25033 | Noptin < 1.6.5 - Open Redirect | The WordPress Newsletter Plugin WordPress plugin before 1.6.5 does not validate the to parameter before redirecting the user to its given value, leading to an open redirect issue | [
"cpe:2.3:a:noptin:noptin:*:*:*:*:*:wordpress:*:*"
] |
GHSA-v6wx-rx33-54f5 | Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file. | [] |
|
CVE-2007-6222 | The CheckCustomerAccess function in functions.php in CRM-CTT Interleave before 4.2.0 (formerly CRM-CTT) does not properly verify user privileges, which allows remote authenticated users with the LIMITTOCUSTOMERS privilege to bypass intended access restrictions and edit non-active user settings. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:crm_ctt:interleave:*:*:*:*:*:*:*:*"
] |
|
GHSA-pmpp-7jh8-v8hq | User Privilege Escalation in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1. | [] |
|
GHSA-33wr-cf89-cggc | An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. StickerProvider allows directory traversal for access to system files. The Samsung ID is SVE-2020-17665 (July 2020). | [] |
|
GHSA-qvfx-47j9-mhg5 | The HTTPS NIO Connector allows remote attackers to cause a denial of service (thread consumption) by opening a socket and not sending an SSL handshake, aka a read-timeout vulnerability. | [] |
|
GHSA-v4cr-m5f8-gxw8 | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF) | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF). | [] |
GHSA-479r-h4h5-wrgc | Unrestricted Upload of File with Dangerous Type vulnerability in Agile Logix Store Locator WordPress allows Upload a Web Shell to a Web Server. This issue affects Store Locator WordPress: from n/a through 1.5.2. | [] |
|
CVE-2020-26567 | An issue was discovered on D-Link DSR-250N before 3.17B devices. The CGI script upgradeStatusReboot.cgi can be accessed without authentication. Any access reboots the device, rendering it therefore unusable for several minutes. | [
"cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-1962 | Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2015-1924, CVE-2015-1925, CVE-2015-1929, CVE-2015-1930, CVE-2015-1948, CVE-2015-1953, CVE-2015-1954, CVE-2015-1963, CVE-2015-1964, and CVE-2015-1965. | [
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.1:*:*:*:*:*:*:*"
] |
|
GHSA-wm4f-m9qr-q5j6 | IBM Security Access Manager 9.0 and IBM Security Verify Access Docker 10.0.0 stores user credentials in plain clear text which can be read by an unauthorized user. | [] |
|
GHSA-2m7m-jhx5-8crh | IBM Aspera Orchestrator 4.0.1 could allow a remote attacker to enumerate usernames due to observable response discrepancies. IBM X-Force ID: 248545. | [] |
|
CVE-2017-2137 | ProSAFE Plus Configuration Utility prior to 2.3.29 allows remote attackers to bypass access restriction and change configurations of the switch via SOAP requests. | [
"cpe:2.3:a:netgear:prosafe_plus_configuration_utility:*:*:*:*:*:*:*:*"
] |
|
GHSA-fx9g-g9q6-x3jx | Magento Path Traversal vulnerability | Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could be abused by an attacker to inject malicious scripts into the vulnerable endpoint. A low privileged attacker could leverage this vulnerability to read local files and to perform Stored XSS. Exploitation of this issue does not require user interaction. | [] |
GHSA-pf7x-vr8p-v434 | Multiple cross-site request forgery (CSRF) vulnerabilities in SemanticScuttle before 0.91 allow remote attackers to (1) hijack the authentication of administrators via unknown vectors or (2) hijack the authentication of arbitrary users via vectors involving the profile page. | [] |
|
CVE-2019-5352 | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] |
|
GHSA-v769-j248-h7cq | In the medialibrary component in QNAP NAS 4.3.3.0229, an un-authenticated, remote attacker can execute arbitrary system commands as the root user of the NAS application. | [] |
|
GHSA-9wg9-93h9-j8ch | Auth0 Symfony SDK Vulnerable to Brute Force Authentication Tags of CookieStore Sessions | **Overview**
Session cookies of applications using the Auth0 symfony SDK configured with CookieStore have authentication tags that can be brute forced, which may result in unauthorized access.**Am I Affected?**
You are affected by this vulnerability if you meet the following pre-conditions:Applications using the Auth0 symfony SDK with version <=5.3.1Auth0/Symfony SDK uses the Auth0-PHP SDK with version 8.0.0-BETA1 or higher and below 8.14.0.Session storage configured with CookieStore.**Fix**
Upgrade Auth0/symfony to v5.4.0. As an additional precautionary measure, we recommend rotating your cookie encryption keys. Note that once updated, any previous session cookies will be rejected.**Acknowledgement**
Okta would like to thank Félix Charette for discovering this vulnerability. | [] |
CVE-2024-4749 | WP eMember < 10.3.9 - Reflected XSS | The wp-eMember WordPress plugin before 10.3.9 does not sanitize and escape the "fieldId" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. | [
"cpe:2.3:a:tipsandtricks-hq:wp_emember:*:*:*:*:*:*:*:*"
] |
GHSA-pmr4-rq5x-jpmj | Missing Authorization vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn): from n/a through 7.6.0. | [] |
|
CVE-2020-35745 | PHPGURUKUL Hospital Management System V 4.0 does not properly restrict access to admin/dashboard.php, which allows attackers to access all data of users, doctors, patients, change admin password, get appointment history and access all session logs. | [
"cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-p577-3r2w-6mfh | The ff_log2_16bit_c function in libavutil/intmath.h in FFmpeg before 3.1.4 is vulnerable to reading out-of-bounds memory when it decodes a malformed AIFF file. | [] |
|
CVE-2019-5686 | NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software uses an API function or data structure in a way that relies on properties that are not always guaranteed to be valid, which may lead to denial of service. | [
"cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-xq9m-fh33-jh35 | Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
CVE-2018-19311 | Centreon 3.4.x (fixed in Centreon 18.10.0) allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the "Monitoring > Status Details > Services" screen. | [
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*"
] |
|
GHSA-79r9-rp8p-w25h | SQL injection vulnerability in login.php in Scriptme SmE GB Host 1.21 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the Username parameter. | [] |
|
CVE-2018-13886 | Unchecked OTA field in GNSS XTRA3 lead to integer overflow and then buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, Snapdragon_High_Med_2016, SXR1130 | [
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-11226 | FireCask Like & Share Button <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via width Parameter | The FireCask Like & Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
GHSA-36xr-4x2f-cfj9 | Deserialization of Untrusted Data in Apache Camel SQL | Deserialization of Untrusted Data vulnerability in Apache Camel SQL Component. This issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1 | [] |
GHSA-2868-ff44-43qv | Liferay portal unauthorized access to objects via OAuth 2 scope | The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page. | [] |
GHSA-5pmj-72xm-9qmf | Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337. | [] |
|
CVE-2025-24031 | PAM-PKCS#11 vulnerable to segmentation fault on ctrl-c/ctrl-d when asked for PIN | PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. In versions 0.6.12 and prior, the pam_pkcs11 module segfaults when a user presses ctrl-c/ctrl-d when they are asked for a PIN. When a user enters no PIN at all, `pam_get_pwd` will never initialize the password buffer pointer and as such `cleanse` will try to dereference an uninitialized pointer. On my system this pointer happens to have the value 3 most of the time when running sudo and as such it will segfault. The most likely impact to a system affected by this issue is an availability impact due to a daemon that uses PAM crashing. As of time of publication, a patch for the issue is unavailable. | [] |
GHSA-9rfq-ff3x-cwxp | The iMember360 plugin 3.8.012 through 3.9.001 for WordPress does not properly restrict access, which allows remote attackers to delete arbitrary users via a request containing a user name in the Email parameter and the API key in the i4w_clearuser parameter. | [] |
|
GHSA-phj6-w4wf-6mrr | Incorrect Authorization vulnerability identified in OpenText ArcSight Intelligence. | [] |
|
GHSA-xxxv-8qg4-6qv9 | Array index error in the apply_rcs_change function in rcs.c in CVS 1.11.23 allows local users to gain privileges via an RCS file containing crafted delta fragment changes that trigger a heap-based buffer overflow. | [] |
|
GHSA-3vp4-9c6g-mcq2 | Heateor Social Login WordPress prior to 1.1.32 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. | [] |
|
GHSA-x7p2-x82x-6693 | Multiple cross-site scripting (XSS) vulnerabilities in Maian Uploader 4.0 allow remote attackers to inject arbitrary web script or HTML via the width parameter to (1) uploader/admin/js/load_flv.js.php or (2) uploader/js/load_flv.js.php. | [] |
|
GHSA-6gx2-v462-gr3m | Missing Authorization vulnerability in wooproductimporter Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy: from n/a through 2.1.1. | [] |
|
GHSA-4257-qx96-mgcq | Guangzhou Hongfan Technology Co., LTD. iOffice20 has any user login vulnerability. An attacker can log in to any system account including the system administrator through a logical flaw. | [] |
|
GHSA-2p27-3gqf-86g7 | Haraj v3.7 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Post Ads component. | [] |
|
GHSA-f7j8-6p45-qvgf | Alcatel-Lucent Home Device Manager before 4.1.10, 4.2.x before 4.2.2 allows remote attackers to spoof and make calls as target devices. | [] |
|
GHSA-h88r-39vx-9655 | In the Linux kernel, the following vulnerability has been resolved:wifi: ath10k: avoid NULL pointer error during sdio removeWhen running 'rmmod ath10k', ath10k_sdio_remove() will free sdio
workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON
is set to yes, kernel panic will happen:
Call trace:
destroy_workqueue+0x1c/0x258
ath10k_sdio_remove+0x84/0x94
sdio_bus_remove+0x50/0x16c
device_release_driver_internal+0x188/0x25c
device_driver_detach+0x20/0x2cThis is because during 'rmmod ath10k', ath10k_sdio_remove() will call
ath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()
will finally be called in ath10k_core_destroy(). This function will free
struct cfg80211_registered_device *rdev and all its members, including
wiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio
workqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.After device release, destroy_workqueue() will use NULL pointer then the
kernel panic happen.Call trace:
ath10k_sdio_remove
->ath10k_core_unregister
……
->ath10k_core_stop
->ath10k_hif_stop
->ath10k_sdio_irq_disable
->ath10k_hif_power_down
->del_timer_sync(&ar_sdio->sleep_timer)
->ath10k_core_destroy
->ath10k_mac_destroy
->ieee80211_free_hw
->wiphy_free
……
->wiphy_dev_release
->destroy_workqueueNeed to call destroy_workqueue() before ath10k_core_destroy(), free
the work queue buffer first and then free pointer of work queue by
ath10k_core_destroy(). This order matches the error path order in
ath10k_sdio_probe().No work will be queued on sdio workqueue between it is destroyed and
ath10k_core_destroy() is called. Based on the call_stack above, the
reason is:
Only ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and
ath10k_sdio_irq_disable() will queue work on sdio workqueue.
Sleep timer will be deleted before ath10k_core_destroy() in
ath10k_hif_power_down().
ath10k_sdio_irq_disable() only be called in ath10k_hif_stop().
ath10k_core_unregister() will call ath10k_hif_power_down() to stop hif
bus, so ath10k_sdio_hif_tx_sg() won't be called anymore.Tested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189 | [] |
|
CVE-2021-3962 | A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | [
"cpe:2.3:a:imagemagick:imagemagick:7.1.0-14:*:*:*:*:*:*:*"
] |
|
GHSA-99r9-v28w-9qr9 | DomainMOD through 4.11.01 has XSS via the assets/add/registrar.php notes field for the Registrar. | [] |
|
GHSA-9c56-f32w-7xw8 | A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff. | [] |
|
CVE-2017-14100 | In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection. | [
"cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.15.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.15.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.16.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.16.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:13.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*"
] |
|
GHSA-vccg-f4gp-45x9 | Eval Injection in fastbots | ImpactAn attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function def __locator__(self, locator_name: str) in page.py. The vulnerable code that load and execute directly from the file without validation it's:PatchesIn order to mitigate this issue it's important to upgrade to fastbots version 0.1.5 or above.References[Merge that fix also this issue](https://github.com/ubertidavide/fastbots/pull/3#issue-2003080806) | [] |
GHSA-cg58-vw2q-jv22 | An improper authentication vulnerability in FortiMail 5.4.10, 6.0.7, 6.2.2 and earlier and FortiVoiceEntreprise 6.0.0 and 6.0.1 may allow a remote unauthenticated attacker to access the system as a legitimate user by requesting a password change via the user interface. | [] |
|
GHSA-78gc-x3r7-4g3p | Versions of INEA ME RTU firmware prior to 3.36 are vulnerable to OS command injection, which could allow an attacker to remotely execute arbitrary code. | [] |
|
GHSA-4vx7-4j56-j894 | Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] |
|
GHSA-m74c-c3qx-pxjq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joni Halabi Block Controller allows Reflected XSS.This issue affects Block Controller: from n/a through 1.4.2. | [] |
|
CVE-2025-32067 | i18n XSS vulnerability in message growthexperiments | Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Growth Experiments Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Growth Experiments Extension: from 1.39 through 1.43. | [] |
CVE-2023-28706 | Apache Airflow Hive Provider Beeline Remote Command Execution | Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider: before 6.0.0.
| [
"cpe:2.3:a:apache:airflow_hive_provider:*:*:*:*:*:*:*:*"
] |
CVE-2015-3211 | php-fpm allows local users to write to or create arbitrary files via a symlink attack. | [
"cpe:2.3:a:php-fpm:php-fpm:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-0570 | Stack-based buffer overflow in the SET_WPS_IE IOCTL implementation in wlan_hdd_hostapd.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that uses a long WPS IE element. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-chwf-pr57-9wm2 | The affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate user as long as the device keeps the session active, since the attack takes advantage of the cookie header to generate "legitimate" requests. | [] |
|
GHSA-jc4g-6cg2-g9pc | AlphaMail before 1.0.16 allows local users to obtain sensitive information via the logging functionality, which displays unencrypted passwords in an error message. NOTE: some details are obtained from third party information. | [] |
|
GHSA-242c-pm42-hqwq | Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at bsw_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | [] |
|
CVE-2025-20214 | A vulnerability in the Network Configuration Access Control Module (NACM) of Cisco IOS XE Software could allow an authenticated, remote attacker to obtain unauthorized read access to configuration or operational data.
This vulnerability exists because a subtle change in inner API call behavior causes results to be filtered incorrectly. An attacker could exploit this vulnerability by using either NETCONF, RESTCONF, or gRPC Network Management Interface (gNMI) protocols and query data on paths that may have been denied by the NACM configuration. A successful exploit could allow the attacker to access data that should have been restricted according to the NACM configuration.
Note: This vulnerability requires that the attacker obtain the credentials from a valid user with privileges lower than 15, and that NACM was configured to provide restricted read access for that user. | [] |
|
CVE-2019-2422 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
] |
|
CVE-2013-0742 | Stack-based buffer overflow in Corel PDF Fusion 1.11 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long ZIP directory entry name in an XPS file. | [
"cpe:2.3:a:corel:pdf_fusion:1.11:*:*:*:*:*:*:*"
] |
|
GHSA-g8x3-qg8h-3qqr | SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file. | [] |
|
GHSA-p287-g687-m4hf | The binlayerpress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] |
|
CVE-2009-0528 | SQL injection vulnerability in frame.php in Rhadrix If-CMS 2.07 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:rhadrix:if-cms:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-37368 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17728. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*"
] |
|
GHSA-vxr8-957h-vvx8 | The writeFile function in core/smb4kfileio.cpp in Smb4K before 0.8.0 does not preserve /etc/sudoers permissions across modifications, which allows local users to obtain sensitive information (/etc/sudoers contents) by reading this file. | [] |
|
CVE-2023-36877 | Azure Apache Oozie Spoofing Vulnerability | Azure Apache Oozie Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:azure_hdinsights:-:*:*:*:*:*:*:*"
] |
GHSA-3mq7-j5f9-79xq | A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper input validation in the device. If exploited, the web server will crash and need a manual restart to recover it. | [] |
|
GHSA-6669-q2h5-85q9 | An issue was discovered in Pascom Cloud Phone System before 7.20.x. A configuration error between NGINX and a backend Tomcat server leads to a path traversal in the Tomcat server, exposing unintended endpoints. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.