id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2015-9212 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, and SD 800, lack of input validation while processing TZ_PR_CMD_SAVE_KEY command could lead to a buffer overread. | [
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*"
] |
|
CVE-2005-2593 | Parlano MindAlign 5.0 and later versions uses weak encryption, with unknown impact and attack vectors. | [
"cpe:2.3:a:parlano:mindalign:5.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-16348 | marc-q libwav through 2017-04-20 has a NULL pointer dereference in gain_file() at wav_gain.c. | [
"cpe:2.3:a:libwav_project:libwav:*:*:*:*:*:*:*:*"
] |
|
GHSA-74x8-g586-9p62 | Cryptocat has an Unspecified Chat Participant User List Disclosure | [] |
|
GHSA-8464-8v52-xm79 | A vulnerability classified as critical has been found in zhenfeng13 My-Blog 1.0. Affected is the function uploadFileByEditomd of the file src/main/java/com/site/blog/my/core/controller/admin/BlogController.java. The manipulation of the argument editormd-image-file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2024-49017 | SQL Server Native Client Remote Code Execution Vulnerability | SQL Server Native Client Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*"
] |
GHSA-fhqp-78f6-gc8r | SQL injection vulnerability in silentum_guestbook.php in Silentum Guestbook 2.0.2 allows remote attackers to execute arbitrary SQL commands via the messageid parameter. | [] |
|
CVE-2008-7291 | gri before 2.12.18 generates temporary files in an insecure way. | [
"cpe:2.3:a:gri_project:gri:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-0853 | OCSP verification bypass with TLS session reuse | curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to
the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check. | [
"cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*"
] |
CVE-2025-3435 | MangBoard WP <= 1.8.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via Board Header And Footer | The Mang Board WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the board_header and board_footer parameters in all versions up to, and including, 1.8.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] |
CVE-2020-9681 | Adobe Genuine Service privilege escalation vulnerability | Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction. | [
"cpe:2.3:a:adobe:genuine_service:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-6982-pw6g-235f | The Romeo and Juliet (aka jp.co.cybird.appli.android.rjs) application 1.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-96q8-ww86-7w7p | A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /manage_medicine.php?action=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2018-1000812 | Artica Integria IMS version 5.0 MR56 Package 58, likely earlier versions contains a CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability in Password recovery process, line 45 of general/password_recovery.php that can result in IntegriaIMS web app user accounts can be taken over. This attack appear to be exploitable via Network access to IntegriaIMS web interface . This vulnerability appears to have been fixed in fixed in versions released after commit f2ff0ba821644acecb893483c86a9c4d3bb75047. | [
"cpe:2.3:a:artica:integria_ims:*:*:*:*:*:*:*:*"
] |
|
GHSA-7r4m-c228-wp37 | Adobe Photoshop versions 23.0.2 and 22.5.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious JPG file. | [] |
|
CVE-2007-10003 | The Hackers Diet Plugin HTTP POST Request ajax_blurb.php sql injection | A vulnerability, which was classified as critical, has been found in The Hackers Diet Plugin up to 0.9.6b on WordPress. This issue affects some unknown processing of the file ajax_blurb.php of the component HTTP POST Request Handler. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. Upgrading to version 0.9.7b is able to address this issue. The patch is named 7dd8acf7cd8442609840037121074425d363b694. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-243803. | [
"cpe:2.3:a:wp-plugins:the_hackers_diet:*:*:*:*:*:wordpress:*:*"
] |
GHSA-2jq3-6582-8qfm | cPanel before 68.0.27 allows attackers to read the SRS secret via exim.conf (SEC-308). | [] |
|
CVE-2005-4359 | SQL injection vulnerability in includes/core.inc.php in ODFaq 2.1.0 allows remote attackers to execute arbitrary SQL commands via the (1) cat and (2) srcText parameters to faq.php. | [
"cpe:2.3:a:oodie:odfaq:1.21b:*:*:*:*:*:*:*",
"cpe:2.3:a:oodie:odfaq:2.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-q2p3-jh4c-pjx8 | Cross-site scripting (XSS) vulnerability in Edit.asp in DB Manager 2.0 allows remote attackers to inject arbitrary web script or HTML via the id parameter. | [] |
|
CVE-2017-0480 | An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32705429. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-15099 | drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] |
|
CVE-2022-37172 | Incorrect access control in the install directory (C:\msys64) of Msys2 v20220603 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. | [
"cpe:2.3:a:msys2:msys2:*:*:*:*:*:*:*:*"
] |
|
GHSA-773p-m7cr-6h5f | Cross-site request forgery (CSRF) vulnerability in AQUOS Photo Player HN-PP150 1.02.00.04 through 1.03.01.04 allows remote attackers to hijack the authentication of arbitrary users. | [] |
|
GHSA-6q5m-66wv-m3p2 | Secure Boot Security Feature Bypass Vulnerability | [] |
|
GHSA-f4hc-7j8c-cj6p | A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in Dotclear version 2.29. The flaw exists within the Search functionality of the Admin Panel. | [] |
|
CVE-2024-22333 | IBM Maximo Application Suite information disclosure | IBM Maximo Asset Management 7.6.1.3 and IBM Maximo Application Suite 8.10 and 8.11 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 279973. | [
"cpe:2.3:a:ibm:maximo_application_suite:8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_application_suite:8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6.1.3:*:*:*:*:*:*:*"
] |
GHSA-6jp7-m35q-p736 | SQL injection vulnerability in the Trade module in Maxtrade AIO 1.3.23 allows remote attackers to execute arbitrary SQL commands via the categori parameter in a pocategorisell action to modules.php. | [] |
|
CVE-2010-0239 | The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when IPv6 is enabled, does not properly perform bounds checking on ICMPv6 Router Advertisement packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "ICMPv6 Router Advertisement Vulnerability." | [
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] |
|
CVE-2015-5302 | libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to the (1) backtrace, (2) cmdline, (3) environ, (4) open_fds, (5) maps, (6) smaps, (7) hostname, (8) remote, (9) ks.cfg, or (10) anaconda-tb file attachment included in a Red Hat Bugzilla bug report. | [
"cpe:2.3:a:redhat:libreport:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libreport:2.6.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-35992 | `CHECK` fail in `TensorListFromTensor` in TensorFlow | TensorFlow is an open source platform for machine learning. When `TensorListFromTensor` receives an `element_shape` of a rank greater than one, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 3db59a042a38f4338aa207922fa2f476e000a6ee. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
] |
GHSA-mm2j-wr48-jg44 | VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack. | [] |
|
CVE-2025-26508 | Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers – Potential Remote Code Execution and Potential Elevation of Privilege | Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job. | [] |
CVE-2025-31197 | The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination. | [] |
|
GHSA-646p-7ppf-pw4m | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [] |
|
GHSA-c6vh-7mwq-c4gc | The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp. | [] |
|
GHSA-w43g-7q27-j39g | Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files by changing the extension of the uploaded file. | [] |
|
GHSA-hv4w-qf5w-5wqc | manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php. | [] |
|
GHSA-m42v-qv3c-h6j7 | Cross-site Scripting in JFinalCMS | JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the navigation management department. | [] |
CVE-2018-10924 | It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine. | [
"cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-6633 | Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php in WordPress before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via an editable slug field. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*"
] |
|
CVE-2006-0630 | RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers. | [
"cpe:2.3:a:ritlabs:the_bat:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:3.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:3.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:3.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:3.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:3.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:3.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ritlabs:the_bat:3.0.0.14:*:*:*:*:*:*:*"
] |
|
CVE-2011-1890 | Cross-site scripting (XSS) vulnerability in EditForm.aspx in Microsoft Office SharePoint Server 2010 and SharePoint Foundation 2010 allows remote attackers to inject arbitrary web script or HTML via a post, aka "Editform Script Injection Vulnerability." | [
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*"
] |
|
GHSA-86cp-mgj2-w853 | Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote unauthenticated attacker to create a reverse shell with administrator privileges on the DBSec server via carefully constructed Java serialized object sent to the DBSec server. | [] |
|
GHSA-9jmq-rx5f-8jwq | nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths | Most of the fixes will be in this repo, though, so having it here gives us the private fork to work on patchesBelow is currently a duplicate of the original report:Received on [email protected] unedited, I'm not sure if we want to make it separate advisories.Pasted raw for now, feel free to edit or make separate advisories if you have the rights to.I think the most important is to switch back from nbviewer.jupyter.org -> nbviewer.org at the cloudflare level I guess ? There might be fastly involved as well.Impact_What kind of vulnerability is it? Who is impacted?_Patches_Has the problem been patched? What versions should users upgrade to?_Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_References_Are there any links users can visit to find out more?_For more informationIf you have any questions or comments about this advisory:Open an issue in [example link to repo](http://example.com)Email us at [example email address](mailto:[email protected])GitHub Security Lab (GHSL) Vulnerability ReportThe [GitHub Security Lab](https://securitylab.github.com) team has identified potential security vulnerabilities in [nbconvert](https://github.com/jupyter/nbconvert).We are committed to working with you to help resolve these issues. In this report you will find everything you need to effectively coordinate a resolution of these issues with the GHSL team.If at any point you have concerns or questions about this process, please do not hesitate to reach out to us at `[email protected]` (please include `GHSL-2021-1013`, `GHSL-2021-1014`, `GHSL-2021-1015`, `GHSL-2021-1016`, `GHSL-2021-1017`, `GHSL-2021-1018`, `GHSL-2021-1019`, `GHSL-2021-1020`, `GHSL-2021-1021`, `GHSL-2021-1022`, `GHSL-2021-1023`, `GHSL-2021-1024`, `GHSL-2021-1025`, `GHSL-2021-1026`, `GHSL-2021-1027` or `GHSL-2021-1028` as a reference).If you are _NOT_ the correct point of contact for this report, please let us know!SummaryWhen using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to Cross-Site Scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer)ProductnbconvertTested Version[v5.5.0](https://github.com/jupyter/nbconvert/releases/tag/5.5.0)DetailsIssue 1: XSS in notebook.metadata.language_info.pygments_lexer (`GHSL-2021-1013`)Attacker in control of a notebook can inject arbitrary unescaped HTML in the `notebook.metadata.language_info.pygments_lexer` field such as the following:This node is read in the [`from_notebook_node`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/nbconvert/exporters/html.py#L135-L140) method:It is then assigned to `language` var and passed down to [`_pygments_highlight`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/nbconvert/filters/highlight.py#L90)In this method, the `language` variable is [concatenated to `highlight hl-` string to conform the `cssclass`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/nbconvert/filters/highlight.py#L56) passed to the `HTMLFormatter` constructor:The `cssclass` variable is then [concatenated in the outer div class attribute](https://github.com/pygments/pygments/blob/30cfa26201a27dee1f8e6b0d600cad1138e64507/pygments/formatters/html.py#L791)Note that the `cssclass` variable is also used in other unsafe places such as [`'<table class="%stable">' % self.cssclass + filename_tr +`](https://github.com/pygments/pygments/blob/30cfa26201a27dee1f8e6b0d600cad1138e64507/pygments/formatters/html.py#L711))Issue 2: XSS in notebook.metadata.title (`GHSL-2021-1014`)The `notebook.metadata.title` node is rendered directly to the [`index.html.j2`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/share/jupyter/nbconvert/templates/lab/index.html.j2#L12-L13) HTML template with no escaping:The following `notebook.metadata.title` node will execute arbitrary javascript:Note: this issue also affect other templates, not just the `lab` one.Issue 3: XSS in notebook.metadata.widgets(`GHSL-2021-1015`)The `notebook.metadata.widgets` node is rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/share/jupyter/nbconvert/templates/lab/index.html.j2#L12-L13) HTML template with no escaping:The following `notebook.metadata.widgets` node will execute arbitrary javascript:Note: this issue also affect other templates, not just the `lab` one.Issue 4: XSS in notebook.cell.metadata.tags(`GHSL-2021-1016`)The `notebook.cell.metadata.tags` nodes are output directly to the [`celltags.j2`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/share/jupyter/nbconvert/templates/base/celltags.j2#L4) HTML template with no escaping:The following `notebook.cell.metadata.tags` node will execute arbitrary javascript:Note: this issue also affect other templates, not just the `lab` one.Issue 5: XSS in output data text/html cells(`GHSL-2021-1017`)Using the `text/html` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The following is an example of a cell with `text/html` output executing arbitrary javascript code:Issue 6: XSS in output data image/svg+xml cells(`GHSL-2021-1018`)Using the `image/svg+xml` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook.The `cell.output.data["image/svg+xml"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.data["image/svg+xml"]` node will execute arbitrary javascript:Issue 7: XSS in notebook.cell.output.svg_filename(`GHSL-2021-1019`)The `cell.output.svg_filename` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.svg_filename` node will escape the `img` tag context and execute arbitrary javascript:Issue 8: XSS in output data text/markdown cells(`GHSL-2021-1020`)Using the `text/markdown` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook.The `cell.output.data["text/markdown"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.data["text/markdown"]` node will execute arbitrary javascript:Issue 9: XSS in output data application/javascript cells(`GHSL-2021-1021`)Using the `application/javascript` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The `cell.output.data["application/javascript"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.data["application/javascript"]` node will execute arbitrary javascript:Issue 10: XSS is output.metadata.filenames image/png and image/jpeg(`GHSL-2021-1022`)The `cell.output.metadata.filenames["images/png"]` and `cell.metadata.filenames["images/jpeg"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `filenames` node will execute arbitrary javascript:Issue 11: XSS in output data image/png and image/jpeg cells(`GHSL-2021-1023`)Using the `image/png` or `image/jpeg` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook.The `cell.output.data["images/png"]` and `cell.output.data["images/jpeg"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `cell.output.data["image/png"]` node will execute arbitrary javascript:Issue 12: XSS is output.metadata.width/height image/png and image/jpeg(`GHSL-2021-1024`)The `cell.output.metadata.width` and `cell.output.metadata.height` nodes of both `image/png` and `image/jpeg` cells are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `output.metadata.width` node will execute arbitrary javascript:Issue 13: XSS in output data application/vnd.jupyter.widget-state+json cells(`GHSL-2021-1025`)The `cell.output.data["application/vnd.jupyter.widget-state+json"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `cell.output.data["application/vnd.jupyter.widget-state+json"]` node will execute arbitrary javascript:Issue 14: XSS in output data application/vnd.jupyter.widget-view+json cells(`GHSL-2021-1026`)The `cell.output.data["application/vnd.jupyter.widget-view+json"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `cell.output.data["application/vnd.jupyter.widget-view+json"]` node will execute arbitrary javascript:Issue 15: XSS in raw cells(`GHSL-2021-1027`)Using a `raw` cell type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The following is an example of a `raw` cell executing arbitrary javascript code:Issue 16: XSS in markdown cells(`GHSL-2021-1028`)Using a `markdown` cell type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The following is an example of a `markdown` cell executing arbitrary javascript code:Proof of ConceptThese vulnerabilities may affect any server using nbconvert to generate HTML and not using a secure content-security-policy (CSP) policy. For example [nbviewer](https://nbviewer.jupyter.org) is vulnerable to the above mentioned XSS issues:Create Gist with payload. eg:`https://gist.github.com/pwntester/ff027d91955369b85f99bb1768b7f02c`Then load gist on nbviewer. eg:`https://nbviewer.jupyter.org/gist/pwntester/ff027d91955369b85f99bb1768b7f02c`Note: response is served with `content-security-policy: connect-src 'none';`GitHub Security AdvisoriesWe recommend you create a private [GitHub Security Advisory](https://help.github.com/en/github/managing-security-vulnerabilities/creating-a-security-advisory) for these findings. This also allows you to invite the GHSL team to collaborate and further discuss these findings in private before they are [published](https://help.github.com/en/github/managing-security-vulnerabilities/publishing-a-security-advisory).CreditThese issues were discovered and reported by GHSL team member [@pwntester (Alvaro Muñoz)](https://github.com/pwntester).ContactYou can contact the GHSL team at `[email protected]`, please include a reference to `GHSL-2021-1013`, `GHSL-2021-1014`, `GHSL-2021-1015`, `GHSL-2021-1016`, `GHSL-2021-1017`, `GHSL-2021-1018`, `GHSL-2021-1019`, `GHSL-2021-1020`, `GHSL-2021-1021`, `GHSL-2021-1022`, `GHSL-2021-1023`, `GHSL-2021-1024`, `GHSL-2021-1025`, `GHSL-2021-1026`, `GHSL-2021-1027` or `GHSL-2021-1028` in any communication regarding these issues.Disclosure PolicyThis report is subject to our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy). | [] |
GHSA-mrhr-c569-5wjh | Heap buffer overflow in Exosphere in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. | [] |
|
GHSA-h46f-q7jf-wgr6 | Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Trending/Popular Post Slider and Widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Trending/Popular Post Slider and Widget: from n/a through 1.5.7. | [] |
|
CVE-2022-28579 | It is found that there is a command injection vulnerability in the setParentalRules interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload. | [
"cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*"
] |
|
GHSA-9xcf-m8h7-wccj | PHP remote file inclusion vulnerability in install3.php in WEBInsta Mailing List Manager 1.3e allows remote attackers to execute arbitrary PHP code via a URL in the cabsolute_path parameter. | [] |
|
CVE-2024-21911 | Cross-site scripting vulnerability in TinyMCE | TinyMCE versions before 5.6.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser. | [
"cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*"
] |
CVE-2022-34937 | Yuba u5cms v8.3.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component savepage.php. This vulnerability allows attackers to execute arbitrary code. | [
"cpe:2.3:a:yuba:u5cms:8.3.5:*:*:*:*:*:*:*"
] |
|
CVE-2019-25050 | netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). | [
"cpe:2.3:a:osgeo:gdal:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-7177 | XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/. | [
"cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-2692 | Multiple unspecified vulnerabilities in aMuleWeb for AMule before 2.1.2 allow remote attackers to read arbitrary image, HTML, or PHP files via unknown vectors, probably related to directory traversal. | [
"cpe:2.3:a:amule:amule:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-28648 | In JetBrains YouTrack before 2022.1.43563 HTML code from the issue description was being rendered | [
"cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*"
] |
|
GHSA-cc87-35fp-2jp7 | Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access. | [] |
|
CVE-2002-1138 | Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, writes output files for scheduled jobs under its own privileges instead of the entity that launched it, which allows attackers to overwrite system files, aka "Flaw in Output File Handling for Scheduled Jobs." | [
"cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*"
] |
|
CVE-2024-12510 | LDAP Authentication Sever Pass-back attack | If LDAP settings are accessed, authentication could be redirected to another server, potentially exposing credentials. This requires admin access and an active LDAP setup. | [] |
GHSA-9q9g-6mgq-4cf7 | ZSATray passes the previousInstallerName as a config parameter to TrayManager, and TrayManager constructs the path and appends previousInstallerName to get the full path of the exe. Fixed Version: Win ZApp 4.3.0.121 and later. | [] |
|
GHSA-hp52-5qr2-jq2v | An issue was discovered in Softing Industrial Automation uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) or login as an anonymous user (bypassing security checks) by sending crafted messages to a OPC/UA server. The server process may crash unexpectedly because of an invalid type cast, and must be restarted. | [] |
|
GHSA-g624-89xp-hmx8 | pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns. | [] |
|
GHSA-3h4v-m4g6-c2v8 | Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools. | [] |
|
GHSA-9387-39pg-qwg6 | Cross-site scripting (XSS) vulnerability in index.php in WampServer 2.0i allows remote attackers to inject arbitrary web script or HTML via the lang parameter. | [] |
|
GHSA-cmw2-fm8j-qp55 | This issue was addressed with improved checks. This issue is fixed in iOS 15.4 and iPadOS 15.4. A person with physical access to an iOS device may be able to see sensitive information via keyboard suggestions. | [] |
|
GHSA-f5w8-64gg-hq58 | Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
CVE-2013-3613 | Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port. | [
"cpe:2.3:h:dahuasecurity:dvr0404hd-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0404hd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0404hd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0404hd-u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0404hf-a-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0404hf-al-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0404hf-s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0404hf-u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804hd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804hd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804hf-a-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804hf-al-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804hf-l-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804hf-s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr0804hf-u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr1604hd-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr1604hd-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr1604hf-a-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr1604hf-al-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr1604hf-l-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr1604hf-s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr1604hf-u-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2104c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2104h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2104hc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2104he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2108c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2108h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2108hc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2108he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2116c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2116h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2116hc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2116he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2404hf-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2404lf-al:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr2404lf-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr3204hf-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr3204lf-al:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr3204lf-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr3224l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr3232l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5104c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5104h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5104he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5108c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5108h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5108he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5116c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5116h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5116he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5204a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5204l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5208a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5208l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5216a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5216l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5404:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5408:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5416:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5804:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5808:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr5816:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dvr6404lf-s:-:*:*:*:*:*:*:*"
] |
|
GHSA-48wc-9j2c-rwp5 | Dell SmartFabric OS10 Software, version(s) 10.5.5.4 through 10.5.5.10 and 10.5.6.x, contain(s) an Use of Hard-coded Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Client-side request forgery and Information disclosure. | [] |
|
CVE-2021-2177 | Vulnerability in the Oracle Secure Global Desktop product of Oracle Virtualization (component: Gateway). The supported version that is affected is 5.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Secure Global Desktop. While the vulnerability is in Oracle Secure Global Desktop, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Secure Global Desktop. | [
"cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*"
] |
|
CVE-2024-23558 | HCL DevOps Deploy / HCL Launch does not invalidate all session authentication cookies after logout | HCL DevOps Deploy / HCL Launch does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system.
| [
"cpe:2.3:a:hcltechsw:hcl_launch:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltechsw:hcl_devops_deploy:8.0.0.0:*:*:*:*:*:*:*"
] |
GHSA-342r-v98v-xjfv | A pendingIntent hijacking vulnerability in Secure Folder prior to SMR APR-2021 Release 1 allows unprivileged applications to access contact information. | [] |
|
CVE-2015-2143 | Multiple cross-site request forgery (CSRF) vulnerabilities in Issuetracker phpBugTracker before 1.7.0 allow remote attackers to hijack the authentication of users for requests that cause an unspecified impact via unknown parameters. | [
"cpe:2.3:a:phpbugtracker_project:phpbugtracker:*:*:*:*:*:*:*:*"
] |
|
GHSA-5884-8f6m-9wpp | SAP BusinessObjects Financial Consolidation, versions 10.0, 10.1, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [] |
|
GHSA-mgqh-3qm7-gx82 | IBAX go-ibax vulnerable to SQL injection | A vulnerability classified as critical has been found in IBAX go-ibax. Affected is an unknown function of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212634 is the identifier assigned to this vulnerability. | [] |
CVE-2001-1382 | The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used. | [
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-6997 | Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange (OX) AppSuite 7.4.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) an HTML email with crafted CSS code containing wildcards or (2) office documents containing "crafted hyperlinks with script URL handlers." | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2011-0385 | The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065. | [
"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*"
] |
|
GHSA-m8cv-83cf-qccx | Apport does not disable python crash handler before entering chroot | [] |
|
GHSA-3m49-jmr4-jpx2 | In createSessionInternal of PackageInstallerService.java, there is a possible permissions bypass. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-138650665 | [] |
|
CVE-2007-6117 | Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages. | [
"cpe:2.3:a:wireshark:wireshark:0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*"
] |
|
GHSA-7vj7-47pr-4hg8 | Dell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\Radius credentials stored to read sensitive information and use it in further attacks. | [] |
|
CVE-2012-1673 | SQL injection vulnerability in loginscript.php in e-ticketing allows remote attackers to execute arbitrary SQL commands via the password parameter. | [
"cpe:2.3:a:ola_lasisi:e-ticketing:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-4423 | The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table. | [
"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*"
] |
|
GHSA-2g2p-3v97-37x7 | Multiple cross-site scripting (XSS) vulnerabilities in PHP Web Statistik 1.4 allows remote attackers to inject arbitrary web script or HTML via (1) the lastnumber parameter to stat.php and (2) the HTTP referer to pixel.php. | [] |
|
GHSA-p45m-hh26-3vgh | Barracuda Message Archiver 2018 has XSS in the error_msg exception-handling value for the ldap_user parameter to the cgi-mod/ldap_load_entry.cgi module. The injection point of the issue is the Add_Update module. | [] |
|
CVE-2016-0007 | The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0006. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] |
|
CVE-2023-48491 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] |
CVE-2014-5812 | The VDM Officiel (aka vdm.activities) application 5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:viedemerde:vdm_officiel:5.0:*:*:*:*:android:*:*"
] |
|
CVE-2024-35230 | Welcome and About GeoServer pages communicate version and revision information | GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. In affected versions the welcome and about page includes version and revision information about the software in use (including library and components used). This information is sensitive from a security point of view because it allows software used by the server to be easily identified. This issue has been patched in version 2.26.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [] |
GHSA-772g-g522-9m9m | Cross-Site Request Forgery (CSRF) vulnerability in Bjoern WP Performance Pack allows Cross Site Request Forgery. This issue affects WP Performance Pack: from n/a through 2.5.4. | [] |
|
GHSA-fxjx-xx78-2944 | SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack. | [] |
|
GHSA-ww8h-6gxx-9jf8 | The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Heading widget in all versions up to, and including, 2.4.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2025-3010 | Khronos Group glslang Intermediate.cpp isConversionAllowed null pointer dereference | A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. | [] |
GHSA-rx4h-3hc3-xgx4 | Cisco ONS 15454 System Software 10.30 and 10.301 allows remote attackers to cause a denial of service (tNetTask CPU consumption or card reset) via a flood of (1) IP or (2) Ethernet traffic, aka Bug ID CSCus57263. | [] |
|
CVE-2022-23798 | [20220306] - Core - Inadequate validation of internal URLs | An issue was discovered in Joomla! 2.5.0 through 3.10.6 & 4.0.0 through 4.1.0. Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not. | [
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
GHSA-hhf8-mrfp-rjvv | A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to execute code with privileged permissions on the system by sending specially crafted network requests to port 5900/tcp. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices and port. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the VNC server. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] |
|
GHSA-27fp-c3m4-phwv | A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been classified as critical. This affects the function setTracerouteCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-7vfh-cqpc-4267 | Security Update for the OPC UA .NET Standard Stack | This security update resolves a vulnerability in the OPC UA .NET Standard Stack that allows an
unauthorized attacker to trigger a gradual degradation in performance. | [] |
CVE-2020-0657 | An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-p2r4-r5h4-fmwq | A vulnerability in the Android media framework (libhevc) related to handling ps_codec_obj memory allocation failures. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68299873. | [] |
|
GHSA-fjv2-wp8j-f9w3 | A vulnerability in the network-operator user role implementation for Cisco NX-OS System Software could allow an authenticated, local attacker to improperly delete valid user accounts. The network-operator role should not be able to delete other configured users on the device. The vulnerability is due to a lack of proper role-based access control (RBAC) checks for the actions that a user with the network-operator role is allowed to perform. An attacker could exploit this vulnerability by authenticating to the device with user credentials that give that user the network-operator role. Successful exploitation could allow the attacker to impact the integrity of the device by deleting configured user credentials. The attacker would need valid user credentials for the device. This vulnerability affects the following Cisco products running Cisco NX-OS System Software: Nexus 3000 Series Switches, Nexus 3600 Platform Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvg21120. | [] |
|
CVE-2025-3531 | YouDianCMS index.html cross site scripting | A vulnerability classified as problematic has been found in YouDianCMS 9.5.21. This affects an unknown part of the file /App/Tpl/Admin/Default/Log/index.html. The manipulation of the argument UserName/LogType leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.