id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-33149 | A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the CloneSite plugin, allowing an attacker to inject SQL by manipulating the url parameter. | [
"cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:*"
] |
|
GHSA-8x6h-2g3w-6mg5 | A PHP Local File Inclusion (LFI) vulnerability in the J-Web component of Juniper Networks Junos OS may allow a low-privileged authenticated attacker to execute an untrusted PHP file. By chaining this vulnerability with other unspecified vulnerabilities, and by circumventing existing attack requirements, successful exploitation could lead to a complete system compromise. This issue affects Juniper Networks Junos OS: all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2. | [] |
|
GHSA-58gx-pmmm-w878 | Directory traversal vulnerability in modules/download/get_file.php in Admidio 1.4.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [] |
|
CVE-2024-9452 | Branding <= 1.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | The Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | [
"cpe:2.3:a:gurieveugen\\&vitaliyshebela:branding:*:*:*:*:*:wordpress:*:*"
] |
GHSA-jhv7-p7w6-pw88 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DuoGeek Custom Dashboard Widget allows Stored XSS.This issue affects Custom Dashboard Widget: from n/a through 1.0.0. | [] |
|
GHSA-4h4h-mcvx-ffv6 | On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow. | [] |
|
GHSA-4pjg-3rwx-hmxx | An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file. | [] |
|
CVE-2010-2739 | Buffer overflow in the CreateDIBPalette function in win32k.sys in Microsoft Windows XP SP3, Server 2003 R2 Enterprise SP2, Vista Business SP1, Windows 7, and Server 2008 SP2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code by performing a clipboard operation (GetClipboardData API function) with a crafted bitmap with a palette that contains a large number of colors. | [
"cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] |
|
CVE-2021-37041 | There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. | [
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-8m58-pwg7-52c3 | ** DISPUTED ** Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter. NOTE: a third party reports that this is "not exploitable." | [] |
|
GHSA-9fj7-9qg7-9fgc | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges. | [] |
|
CVE-2018-15405 | Cisco Integrated Management Controller Supervisor and Cisco UCS Director Authenticated Web Interface Information Disclosure Vulnerability | A vulnerability in the web interface for specific feature sets of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to access sensitive information. The vulnerability is due to an authorization check that does not properly include the access level of the web interface user. An attacker who has valid application credentials could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to view sensitive information that belongs to other users. The attacker could then use this information to conduct additional reconnaissance attacks. | [
"cpe:2.3:a:cisco:ucs_director:2.1\\(0.0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.6\\(1.0\\):*:*:*:*:*:*:*"
] |
GHSA-mfmq-xx6g-hmw8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Contact allows Reflected XSS. This issue affects Easy Contact: from n/a through 0.1.2. | [] |
|
CVE-2021-26812 | Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can inject javascript code to be run by the application. | [
"cpe:2.3:a:jitsi:meet:*:*:*:*:*:moodle:*:*"
] |
|
CVE-2025-47589 | WordPress Ebook Store <= 5.8007 - Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in motov.net Ebook Store allows DOM-Based XSS. This issue affects Ebook Store: from n/a through 5.8007. | [] |
CVE-2019-18827 | On Barco ClickShare Button R9861500D01 devices (before firmware version 1.9.0) JTAG access is disabled after ROM code execution. This means that JTAG access is possible when the system is running code from ROM before handing control over to embedded firmware. | [
"cpe:2.3:o:barco:clickshare_cs-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_cs-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:clickshare_cse-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_cse-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:clickshare_cse-200\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_cse-200\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:clickshare_cse-800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_cse-800:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-0572 | Multiple race conditions in drivers/char/adsprpc.c and drivers/char/adsprpc_compat.c in the ADSPRPC driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (zero-value write) or possibly have unspecified other impact via a COMPAT_FASTRPC_IOCTL_INVOKE_FD ioctl call. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-96qc-ghj4-rq27 | Directory Traversal in yttivy | Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] |
CVE-2020-9686 | Adobe Photoshop versions Photoshop CC 2019, and Photoshop 2020 have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-j55c-jm95-hcr6 | Unknown vulnerability in the NFS daemon (nfsd) in SGI IRIX 6.5.19f and earlier allows remote attackers to cause a denial of service (kernel panic) via certain packets that cause XDR decoding errors, a different vulnerability than CVE-2003-0619. | [] |
|
GHSA-9wx9-3pc8-mf53 | Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | [] |
|
GHSA-9mvq-97pq-fpww | In bnep_process_control_packet of bnep_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69177292. | [] |
|
GHSA-7xwh-c8q3-g9mp | Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] |
|
CVE-2023-49595 | A stack-based buffer overflow vulnerability exists in the boa rollback_control_code functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability. | [
"cpe:2.3:a:realtek:rtl819x_software_development_kit:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:level_one:wbr6013:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*",
"cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*",
"cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:*"
] |
|
GHSA-rm56-645j-pf84 | There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution. | [] |
|
CVE-2008-1645 | Directory traversal vulnerability in body.php in phpSpamManager (phpSM) 0.53 beta allows remote attackers to read arbitrary local files via a .. (dot dot) in the filename parameter. | [
"cpe:2.3:a:guillaume_meister:php_spammanager:0.53:beta:*:*:*:*:*:*"
] |
|
CVE-2022-23167 | Amodat - Mobile Application Gateway Local File Inclusion (LFI) | Attacker crafts a GET request to: /mobile/downloadfile.aspx? Filename =../.. /windows/boot.ini the LFI is UNAUTHENTICATED. | [
"cpe:2.3:a:amodat:amodat:*:*:*:*:*:*:*:*"
] |
GHSA-jhmw-xx49-7mmh | In wifi driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187149601 | [] |
|
GHSA-rf6p-cgc2-j8vp | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound WP Google Calendar Manager allows Blind SQL Injection. This issue affects WP Google Calendar Manager: from n/a through 2.1. | [] |
|
GHSA-3v88-mwpf-89qm | Vulnerability in the Oracle Commerce Platform component of Oracle Commerce (subcomponent: Dynamo Application Framework). Supported versions that are affected are 11.2.0.3 and 11.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Commerce Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Commerce Platform accessible data as well as unauthorized read access to a subset of Oracle Commerce Platform accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] |
|
GHSA-2939-pqmr-4866 | GreenCMS 2.3.0603 allows remote attackers to obtain sensitive information via a direct request for Data/Log/year_month_day.log. | [] |
|
GHSA-gpqj-283q-qp2q | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. | [] |
|
CVE-2022-48354 | The Bluetooth module has a heap out-of-bounds write vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-43697 | Liteos_a has an Improper Input Validation vulnerability | in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input. | [
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*"
] |
GHSA-gqc5-w5w8-8fg7 | Panda Endpoint Administration Agent before 7.50.00, as used in Panda Security for Business products for Windows, uses a weak ACL for the Panda Security/WaAgent directory and sub-directories, which allows local users to gain SYSTEM privileges by modifying an executable module. | [] |
|
CVE-2017-12489 | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*"
] |
|
GHSA-m6hx-j8vx-vmhg | The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wp_id' parameter in all versions up to, and including, 4.4.2 due to missing authorization checks on processAction function, as well as insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever a user accesses a wp-admin dashboard. | [] |
|
GHSA-xccw-935f-5h48 | Pro Features Lock Bypass vulnerability in Countdown & Clock plugin <= 2.3.2 at WordPress. | [] |
|
GHSA-2r9m-635c-rmwj | A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.This vulnerability is due to insufficient resource management while establishing SSL VPN sessions. An attacker could exploit this vulnerability by sending a series of crafted HTTPS requests to the VPN server of an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to stop accepting new connections, preventing new SSL VPN connections from being established. Existing SSL VPN sessions are not impacted.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers gracefully without requiring manual intervention. | [] |
|
CVE-2006-1397 | Multiple cross-site scripting (XSS) vulnerabilities in (a) phpAdsNew and (b) phpPgAds before 2.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) certain parameters to the banner delivery module, which is not properly handled in the administrator interface, or (2) certain parameters to the login form. | [
"cpe:2.3:a:phpadsnew:phpadsnew:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2_dev_2001-10-09:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.4_pr2:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.7:*:*:*:*:*:*:*"
] |
|
GHSA-wwgx-5rpw-xwxw | Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys. | [] |
|
CVE-2017-0741 | A elevation of privilege vulnerability in the MediaTek gpu driver. Product: Android. Versions: Android kernel. Android ID: A-32458601. References: M-ALPS03007523. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-1249 | Keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkloginiframe leads to ddos | A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages. | [
"cpe:/a:redhat:amq_broker:7.12",
"cpe:/a:redhat:build_keycloak:22::el9",
"cpe:/a:redhat:build_keycloak:22",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9",
"cpe:/a:redhat:rhosemc:1.0::el8",
"cpe:/a:redhat:openshift_serverless:1.33::el8",
"cpe:/a:redhat:red_hat_single_sign_on:7.6",
"cpe:/a:redhat:migration_toolkit_applications:6",
"cpe:/a:redhat:migration_toolkit_applications:7",
"cpe:/a:redhat:service_registry:2",
"cpe:/a:redhat:jboss_data_grid:8",
"cpe:/a:redhat:jboss_enterprise_brms_platform:7",
"cpe:/a:redhat:rhdh:1",
"cpe:/a:redhat:jboss_fuse:7",
"cpe:/a:redhat:jboss_data_grid:7",
"cpe:/a:redhat:jboss_enterprise_application_platform:6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7",
"cpe:/a:redhat:jboss_enterprise_application_platform:8",
"cpe:/a:redhat:jbosseapxp",
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7",
"cpe:/a:redhat:amq_streams:1"
] |
CVE-2025-4297 | PHPGurukul Men Salon Management System change-password.php sql injection | A vulnerability was found in PHPGurukul Men Salon Management System 2.0. It has been classified as critical. This affects an unknown part of the file /admin/change-password.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. | [] |
GHSA-5rp3-cgm7-4447 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Greg Priday Simple Proxy allows Reflected XSS.This issue affects Simple Proxy: from n/a through 1.0. | [] |
|
CVE-2019-2016 | In NFA_SendRawFrame of nfa_dm_api.cc, there is a possible out-of-bound write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120664978 | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-1439 | IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128058. | [
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.9:a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.3:a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:11.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-x7c3-cx68-25p6 | In btm_read_link_quality_complete of btm_acl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over Bluetooth with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260569414 | [] |
|
CVE-2024-43476 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | [
"cpe:2.3:a:microsoft:dynamics_365:9.1:*:*:*:on-premises:*:*:*",
"cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*"
] |
GHSA-j857-gcqp-8fmp | In NetworkManager 0.9.2.0, when a new wireless network was created with WPA/WPA2 security in AdHoc mode, it created an open/insecure network. | [] |
|
CVE-2016-6722 | An information disclosure vulnerability in libstagefright in Mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-11-01, and 7.0 before 2016-11-01 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Android ID: A-31091777. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-9191 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 617, SD 650/52, SD 808, SD 810, and SDX20, in a QTEE syscall handler, an untrusted pointer dereference can occur. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] |
|
GHSA-7rgc-wgxw-rjj6 | The kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | [] |
|
GHSA-mpmm-hvxp-c3m8 | A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/config_Anticrack.php. The manipulation of the argument GroupId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259712. | [] |
|
GHSA-v9wj-35hg-7vg8 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pressference Pressference Exporter allows SQL Injection.This issue affects Pressference Exporter: from n/a through 1.0.3. | [] |
|
GHSA-368c-6qh8-76fj | A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability. | [] |
|
GHSA-9q66-mr67-3695 | doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error levels are set, allows remote attackers to obtain sensitive information via the prefix parameter, which reveals the installation path in an error message. | [] |
|
GHSA-2g74-jg6p-c4x3 | Application Virtualization Remote Code Execution Vulnerability | [] |
|
CVE-2022-4368 | WP CSV <= 1.8.0.0 - Reflected XSS via CSV Import | The WP CSV WordPress plugin through 1.8.0.0 does not sanitize and escape a parameter before outputting it back in the page when importing a CSV, and doe snot have CSRF checks in place as well, leading to a Reflected Cross-Site Scripting. | [
"cpe:2.3:a:cpkwebsolutions:wp_csv:*:*:*:*:*:wordpress:*:*"
] |
GHSA-7x3v-348q-cc5h | In the Linux kernel, the following vulnerability has been resolved:blk-mq: setup queue ->tag_set before initializing hctxCommit 7b815817aa58 ("blk-mq: add helper for checking if one CPU is mapped to specified hctx")
needs to check queue mapping via tag set in hctx's cpuhp handler.However, q->tag_set may not be setup yet when the cpuhp handler is
enabled, then kernel oops is triggered.Fix the issue by setup queue tag_set before initializing hctx. | [] |
|
CVE-2024-11535 | IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24618. | [
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*"
] |
CVE-2009-3604 | The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow. | [
"cpe:2.3:a:gnome:gpdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kpdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:3.02pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:3.02pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:3.02pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*"
] |
|
GHSA-7mvx-hrp2-fjvx | Cross-site scripting (XSS) vulnerability in account.php in Celerondude Uploader 6.1 allows remote attackers to inject arbitrary web script or HTML via the username parameter. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2019-2723 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] |
|
GHSA-xw86-q236-p57v | A vulnerability has been identified in Polarion V2310 (All versions), Polarion V2404 (All versions < V2404.2). The login implementation of the affected application contains an observable response discrepancy vulnerability when validating usernames. This could allow an unauthenticated remote attacker to distinguish between valid and invalid usernames. | [] |
|
CVE-2016-7013 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-22118 | Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*"
] |
|
GHSA-5f3h-v23m-w8qf | Vulnerability in the Oracle User Management component of Oracle E-Business Suite (subcomponent: Reports). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle User Management accessible data as well as unauthorized access to critical data or complete access to all Oracle User Management accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). | [] |
|
CVE-2020-21600 | libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pred_avg_16_fallback function, which can be exploited via a crafted a file. | [
"cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*"
] |
|
CVE-2006-4990 | Multiple PHP remote file inclusion vulnerabilities in PhotoPost allow remote attackers to execute arbitrary PHP code via a URL in the PP_PATH parameter in (1) addfav.php, (2) adm-admlog.php, (3) adm-approve.php, (4) adm-backup.php, (5) adm-cats.php, (6) adm-cinc.php, (7) adm-db.php, (8) adm-editcfg.php, (9) adm-inc.php, (10) adm-index.php, (11) adm-modcom.php, (12) adm-move.php, (13) adm-options.php, (14) adm-order.php, (15) adm-pa.php, (16) adm-photo.php, (17) adm-purge.php, (18) adm-style.php, (19) adm-templ.php, (20) adm-userg.php, (21) adm-users.php, (22) bulkupload.php, (23) cookies.php, (24) comments.php, (25) ecard.php, (26) editphoto.php, (27) register.php, (28) showgallery.php, (29) showmembers.php, (30) useralbums.php, (31) uploadphoto.php, (32) search.php, or (33) adm-menu.php, different vectors than CVE-2006-4828. | [
"cpe:2.3:a:photopost:photopost_php_pro:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:photopost:photopost_php_pro:4.6:*:*:*:*:*:*:*"
] |
|
CVE-2025-33074 | Azure Functions Remote Code Execution Vulnerability | Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network. | [] |
GHSA-fg9r-qfc2-vxq5 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [] |
|
CVE-2019-15416 | The Sony keyaki_kddi Android device with a build fingerprint of Sony/keyaki_kddi/keyaki_kddi:7.1.1/TONE3-3.0.0-KDDI-170517-0326/1:user/dev-keys contains a pre-installed app with a package name of com.kddi.android.packageinstaller app (versionCode=70008, versionName=08.10.03) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [
"cpe:2.3:o:sony:xperia_xzs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xperia_xzs:-:*:*:*:*:*:*:*"
] |
|
GHSA-648c-w732-vv33 | ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c. | [] |
|
GHSA-crg2-7qxv-74jh | pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814. | [] |
|
GHSA-mgw7-6f2m-wg36 | The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file. | [] |
|
CVE-2013-3276 | EMC RSA Archer GRC 5.x before 5.4 allows remote authenticated users to bypass intended access restrictions and complete a login by leveraging a deactivated account. | [
"cpe:2.3:a:emc:rsa_archer_egrc:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.3:*:*:*:*:*:*:*"
] |
|
GHSA-rfc8-wrrf-wp3w | Jenkins Azure PublisherSettings Credentials Plugin stored credentials in plain text | Jenkins Azure PublisherSettings Credentials Plugin stored the service management certificate unencrypted in credentials.xml on the Jenkins controller. These credentials could be viewed by users with access to the Jenkins controller file system.Azure PublisherSettings Credentials Plugin has been deprecated. Azure PublisherSettings Credentials Plugin 1.5 no longer provides any user features and we recommend the plugin be uninstalled. | [] |
GHSA-wx89-5xv5-fmq9 | IBM Infosphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 245423. | [] |
|
GHSA-9wjx-vxh5-8xrx | Buffer overflow in playmidi before 2.4 allows local users to execute arbitrary code. | [] |
|
CVE-2018-20231 | Cross Site Request Forgery (CSRF) in the two-factor-authentication plugin before 1.3.13 for WordPress allows remote attackers to disable 2FA via the tfa_enable_tfa parameter due to missing nonce validation. | [
"cpe:2.3:a:simbahosting:two-factor-authentication:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-4cmh-3844-84q2 | Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Work Provider Administration). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Universal Work Queue, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Universal Work Queue accessible data as well as unauthorized update, insert or delete access to some of Oracle Universal Work Queue accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] |
|
CVE-2019-7290 | An access issue was addressed with additional sandbox restrictions. This issue is fixed in Shortcuts 2.1.3 for iOS. A sandboxed process may be able to circumvent sandbox restrictions. | [
"cpe:2.3:a:apple:shortcuts:*:*:*:*:*:iphone_os:*:*"
] |
|
GHSA-vwvw-vfgx-mxpp | IBM Security Secret Server 10.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 170045. | [] |
|
GHSA-f247-ph8x-mj56 | An exploitable buffer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with native file systems. An attacker can craft an input that can cause a buffer overflow in the nm variable leading to an out of bounds memory access and could result in potential privilege escalation. This vulnerability is distinct from CVE-2016-9034. | [] |
|
CVE-2006-5912 | Unspecified vulnerability in Campware Campsite before 2.6.2 has unknown impact and attack vectors, related to a "Security fix for you-know-what," possibly related to encrypted passwords. | [
"cpe:2.3:a:campware.org:campsite:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:campware.org:campsite:2.6.1:*:*:*:*:*:*:*"
] |
|
CVE-2014-3986 | include/tests_webservers in Lynis before 1.5.5 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/lynis.*.unsorted file with an easily determined name. | [
"cpe:2.3:a:cisofy:lynis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisofy:lynis:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisofy:lynis:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisofy:lynis:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisofy:lynis:1.5.3:*:*:*:*:*:*:*"
] |
|
CVE-2009-1297 | iscsi_discovery in open-iscsi in SUSE openSUSE 10.3 through 11.1 and SUSE Linux Enterprise (SLE) 10 SP2 and 11, and other operating systems, allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file that has a predictable name. | [
"cpe:2.3:o:novell:suse_linux:10:sp2:enterprise:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux:11:-:enterprise:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"
] |
|
GHSA-qr35-8957-2685 | WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. | [] |
|
GHSA-vpfm-675m-rfm8 | A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device.If a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed.
This issue affects Junos OS:All versions before 20.4R3-S7,21.1 versions before 21.1R3,21.2 versions before 21.2R2-S1, 21.2R3,21.3 versions before 21.3R1-S2, 21.3R2. | [] |
|
GHSA-m526-rj4j-v6f6 | The Announce from the Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] |
|
GHSA-x3c6-fv27-mxfc | Missing Authorization vulnerability in ERA404 StaffList allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects StaffList: from n/a through 3.2.6. | [] |
|
GHSA-cxvf-qrfm-r86m | The Apache NuttX (Incubating) project provides an optional separate "apps" repository which contains various optional components and example programs. One of these, ftpd, had a NULL pointer dereference bug. The NuttX RTOS itself is not affected. Users of the optional apps repository are affected only if they have enabled ftpd. Versions 6.15 to 8.2 are affected. | [] |
|
CVE-2021-40406 | A denial of service vulnerability exists in the cgiserver.cgi session creation functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to prevent users from logging in. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-22967 | An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth. | [
"cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-21216 | Internet Connection Sharing (ICS) Denial of Service Vulnerability | Internet Connection Sharing (ICS) Denial of Service Vulnerability | [] |
CVE-2007-3216 | Multiple buffer overflows in the LGServer component of CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.1 allow remote attackers to execute arbitrary code via crafted arguments to the (1) rxsAddNewUser, (2) rxsSetUserInfo, (3) rxsRenameUser, (4) rxsSetMessageLogSettings, (5) rxsExportData, (6) rxsSetServerOptions, (7) rxsRenameFile, (8) rxsACIManageSend, (9) rxsExportUser, (10) rxsImportUser, (11) rxsMoveUserData, (12) rxsUseLicenseIni, (13) rxsLicGetSiteId, (14) rxsGetLogFileNames, (15) rxsGetBackupLog, (16) rxsBackupComplete, (17) rxsSetDataProtectionSecurityData, (18) rxsSetDefaultConfigName, (19) rxsGetMessageLogSettings, (20) rxsHWDiskGetTotal, (21) rxsHWDiskGetFree, (22) rxsGetSubDirs, (23) rxsGetServerDBPathName, (24) rxsSetServerOptions, (25) rxsDeleteFile, (26) rxsACIManageSend, (27) rxcReadBackupSetList, (28) rxcWriteConfigInfo, (29) rxcSetAssetManagement, (30) rxcWriteFileListForRestore, (31) rxcReadSaveSetProfile, (32) rxcInitSaveSetProfile, (33) rxcAddSaveSetNextAppList, (34) rxcAddSaveSetNextFilesPathList, (35) rxcAddNextBackupSetIncWildCard, (36) rxcGetRevisions, (37) rxrAddMovedUser, (38) rxrSetClientVersion, or (39) rxsSetDataGrowthScheduleAndFilter commands. | [
"cpe:2.3:a:broadcom:brightstor_arcserve_backup_laptops_desktops:11.1:*:*:*:*:*:*:*"
] |
|
CVE-2007-3187 | Multiple unspecified vulnerabilities in Apple Safari for Windows allow remote attackers to cause a denial of service or execute arbitrary code, possibly involving memory corruption, and a different issue from CVE-2007-3185 and CVE-2007-3186. NOTE: as of 20070612, the original disclosure has no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | [
"cpe:2.3:a:apple:safari:3.0:*:windows:*:*:*:*:*"
] |
|
CVE-2022-29445 | WordPress Popup Box plugin <= 2.1.2 - Authenticated Local File Inclusion (LFI) vulnerability | Authenticated (administrator or higher role) Local File Inclusion (LFI) vulnerability in Wow-Company's Popup Box plugin <= 2.1.2 at WordPress. | [
"cpe:2.3:a:wow-estore:popup_box:*:*:*:*:*:wordpress:*:*"
] |
CVE-2012-4226 | Multiple cross-site scripting (XSS) vulnerabilities in Quick Post Widget plugin 1.9.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) Title, (2) Content, or (3) New category field to wordpress/ or (4) query string to wordpress/. | [
"cpe:2.3:a:qpw.famvanakkeren:quick_post_widget:1.9.1:*:*:*:*:wordpress:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.