id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-cxvm-3g7g-7vv7 | Sudo 1.6.9 before 1.8.5, when env_reset is disabled, does not properly check environment variables for the env_delete restriction, which allows local users with sudo permissions to bypass intended command restrictions via a crafted environment variable. | [] |
|
GHSA-5gcx-v37v-597q | Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | [] |
|
CVE-2023-32438 | This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in tvOS 16.3, macOS Ventura 13.2, watchOS 9.3, iOS 16.3 and iPadOS 16.3. An app may be able to bypass Privacy preferences. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-7q5p-4jpp-r47w | The doc/PdfPage.cpp:614:20 code in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document. | [] |
|
CVE-2020-35437 | Subrion CMS 4.2.1 is affected by: Cross Site Scripting (XSS) through the avatar[path] parameter in a POST request to the /_core/profile/ URI. | [
"cpe:2.3:a:intelliants:subrion_cms:4.2.1:*:*:*:*:*:*:*"
] |
|
GHSA-xcgx-f24f-jj4r | IBM Business Automation Workflow and Business Process Manager 18.0.0.0, 18.0.0.1, and 18.0.0.2 are vulnerable to a denial of service attack. An authenticated attacker might send a specially crafted request that exhausts server-side memory. IBM X-Force ID: 154774. | [] |
|
GHSA-847p-9xqc-5g92 | Multiple cross-site scripting (XSS) vulnerabilities in orderwiz.php in ModernBill 4.3.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) c_code or (2) aid parameters. | [] |
|
CVE-2006-3344 | Siemens Speedstream Wireless Router 2624 allows local users to bypass authentication and access protected files by using the Universal Plug and Play UPnP/1.0 component. | [
"cpe:2.3:h:siemens:speedstream_wireless_router:2624:*:*:*:*:*:*:*"
] |
|
GHSA-gpj3-55h4-rm59 | Stack-based buffer overflow in NewsBin Pro 4.32 allows remote attackers to cause a denial of service or execute arbitrary code via a yEnc (yEncode) encoded article with a long filename, as demonstrated using a .nzb file. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2020-7572 | A CWE-611 Improper Restriction of XML External Entity Reference vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause an authenticated remote user being able to inject arbitrary XML code and obtain disclosure of confidential data, denial of service, server side request forgery due to improper configuration of the XML parser. | [
"cpe:2.3:a:schneider-electric:webreports:*:*:*:*:*:*:*:*"
] |
|
GHSA-x9w7-hxvq-9xhr | Multiple cross-site scripting (XSS) vulnerabilities in Hotscripts Type PHP Clone Script allow remote attackers to inject arbitrary web script or HTML via the msg parameter to (1) feedback.php, (2) index.php, and (3) lostpassword.php. | [] |
|
GHSA-5rrj-h9g6-5mxj | Multiple cross-site request forgery (CSRF) vulnerabilities in the O2Tweet plugin 0.0.4 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) o2t_username or (2) o2t_tags parameter to wp-admin/options-general.php. | [] |
|
GHSA-889g-6x77-qwm5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilop WooCommerce HTML5 Video allows Reflected XSS. This issue affects WooCommerce HTML5 Video: from n/a through 1.7.10. | [] |
|
CVE-2023-44147 | WordPress Comment Blacklist Updater plugin <= 1.1.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in Apasionados Comment Blacklist Updater allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Comment Blacklist Updater: from n/a through 1.1.0. | [] |
GHSA-cmph-9x4x-xcj3 | cgi-bin/module//sysmanager/admin/SYSAdminUserDialog in Fortinet FortiAnalyzer before 5.0.5 does not properly validate the csrf_token parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks. | [] |
|
GHSA-476g-vv5c-32cp | Microsoft Windows 10 Gold, Windows 10 1511, Windows 10 1607, and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0215, CVE-2017-0216, and CVE-2017-0218. | [] |
|
GHSA-8xfw-5q82-3652 | Authentication Bypass by CSRF Weakness | ImpactCSRF vulnerability that allows user account takeover.All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:Executed whether as:A before_action callback (the default)A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.Thanks @waiting-for-dev for reporting and providing a patch 👏PatchesSpree 4.1 users should update to spree_auth_devise 4.1.1WorkaroundsIf possible, change your strategy to :exception:Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:Referenceshttps://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2 | [] |
CVE-2017-16284 | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_name, at 0x9d018958, the value for the `city` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | [
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-5381 | Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI. | [
"cpe:2.3:a:roundcube:roundcube_webmail:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1:rc:*:*:*:*:*:*"
] |
|
GHSA-4jg5-7gmv-w857 | The Forest River Forums (aka com.socialknowledge.forestriverforums) application 3.7.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2024-26724 | net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers
I managed to hit following use after free warning recently:
[ 2169.711665] ==================================================================
[ 2169.714009] BUG: KASAN: slab-use-after-free in __run_timers.part.0+0x179/0x4c0
[ 2169.716293] Write of size 8 at addr ffff88812b326a70 by task swapper/4/0
[ 2169.719022] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 6.8.0-rc2jiri+ #2
[ 2169.720974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 2169.722457] Call Trace:
[ 2169.722756] <IRQ>
[ 2169.723024] dump_stack_lvl+0x58/0xb0
[ 2169.723417] print_report+0xc5/0x630
[ 2169.723807] ? __virt_addr_valid+0x126/0x2b0
[ 2169.724268] kasan_report+0xbe/0xf0
[ 2169.724667] ? __run_timers.part.0+0x179/0x4c0
[ 2169.725116] ? __run_timers.part.0+0x179/0x4c0
[ 2169.725570] __run_timers.part.0+0x179/0x4c0
[ 2169.726003] ? call_timer_fn+0x320/0x320
[ 2169.726404] ? lock_downgrade+0x3a0/0x3a0
[ 2169.726820] ? kvm_clock_get_cycles+0x14/0x20
[ 2169.727257] ? ktime_get+0x92/0x150
[ 2169.727630] ? lapic_next_deadline+0x35/0x60
[ 2169.728069] run_timer_softirq+0x40/0x80
[ 2169.728475] __do_softirq+0x1a1/0x509
[ 2169.728866] irq_exit_rcu+0x95/0xc0
[ 2169.729241] sysvec_apic_timer_interrupt+0x6b/0x80
[ 2169.729718] </IRQ>
[ 2169.729993] <TASK>
[ 2169.730259] asm_sysvec_apic_timer_interrupt+0x16/0x20
[ 2169.730755] RIP: 0010:default_idle+0x13/0x20
[ 2169.731190] Code: c0 08 00 00 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 72 ff ff ff cc cc cc cc 8b 05 9a 7f 1f 02 85 c0 7e 07 0f 00 2d cf 69 43 00 fb f4 <fa> c3 66 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 04 25 c0 93 04 00
[ 2169.732759] RSP: 0018:ffff888100dbfe10 EFLAGS: 00000242
[ 2169.733264] RAX: 0000000000000001 RBX: ffff888100d9c200 RCX: ffffffff8241bd62
[ 2169.733925] RDX: ffffed109a848b15 RSI: 0000000000000004 RDI: ffffffff8127ac55
[ 2169.734566] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffed109a848b14
[ 2169.735200] R10: ffff8884d42458a3 R11: 000000000000ba7e R12: ffffffff83d7d3a0
[ 2169.735835] R13: 1ffff110201b7fc6 R14: 0000000000000000 R15: ffff888100d9c200
[ 2169.736478] ? ct_kernel_exit.constprop.0+0xa2/0xc0
[ 2169.736954] ? do_idle+0x285/0x290
[ 2169.737323] default_idle_call+0x63/0x90
[ 2169.737730] do_idle+0x285/0x290
[ 2169.738089] ? arch_cpu_idle_exit+0x30/0x30
[ 2169.738511] ? mark_held_locks+0x1a/0x80
[ 2169.738917] ? lockdep_hardirqs_on_prepare+0x12e/0x200
[ 2169.739417] cpu_startup_entry+0x30/0x40
[ 2169.739825] start_secondary+0x19a/0x1c0
[ 2169.740229] ? set_cpu_sibling_map+0xbd0/0xbd0
[ 2169.740673] secondary_startup_64_no_verify+0x15d/0x16b
[ 2169.741179] </TASK>
[ 2169.741686] Allocated by task 1098:
[ 2169.742058] kasan_save_stack+0x1c/0x40
[ 2169.742456] kasan_save_track+0x10/0x30
[ 2169.742852] __kasan_kmalloc+0x83/0x90
[ 2169.743246] mlx5_dpll_probe+0xf5/0x3c0 [mlx5_dpll]
[ 2169.743730] auxiliary_bus_probe+0x62/0xb0
[ 2169.744148] really_probe+0x127/0x590
[ 2169.744534] __driver_probe_device+0xd2/0x200
[ 2169.744973] device_driver_attach+0x6b/0xf0
[ 2169.745402] bind_store+0x90/0xe0
[ 2169.745761] kernfs_fop_write_iter+0x1df/0x2a0
[ 2169.746210] vfs_write+0x41f/0x790
[ 2169.746579] ksys_write+0xc7/0x160
[ 2169.746947] do_syscall_64+0x6f/0x140
[ 2169.747333] entry_SYSCALL_64_after_hwframe+0x46/0x4e
[ 2169.748049] Freed by task 1220:
[ 2169.748393] kasan_save_stack+0x1c/0x40
[ 2169.748789] kasan_save_track+0x10/0x30
[ 2169.749188] kasan_save_free_info+0x3b/0x50
[ 2169.749621] poison_slab_object+0x106/0x180
[ 2169.750044] __kasan_slab_free+0x14/0x50
[ 2169.750451] kfree+0x118/0x330
[ 2169.750792] mlx5_dpll_remove+0xf5/0x110 [mlx5_dpll]
[ 2169.751271] auxiliary_bus_remove+0x2e/0x40
[ 2169.751694] device_release_driver_internal+0x24b/0x2e0
[ 2169.752191] unbind_store+0xa6/0xb0
[ 2169.752563] kernfs_fo
---truncated--- | [] |
GHSA-82r6-6mqq-4v58 | In VOS and overly permissive "umask" may allow for authorized users of the server to gain unauthorized access through insecure file permissions that can result in an arbitrary read, write, or execution of newly created files and directories. Insecure umask setting was present throughout the Versa servers. | [] |
|
GHSA-5hcq-hmph-mw8w | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription. | [] |
|
GHSA-5r59-c396-qwfm | Double-free vulnerability in mysqld for MySQL before 3.23.55 allows attackers with MySQL access to cause a denial of service (crash) via mysql_change_user. | [] |
|
GHSA-p2xf-59pp-g3wc | Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parameter in a WELCOME command. | [] |
|
GHSA-xgx6-9f99-6ww5 | IBM watsonx.ai 1.1 through 2.0.3 and IBM watsonx.ai on Cloud Pak for Data 4.8 through 5.0.3 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [] |
|
CVE-2002-1625 | Macromedia Flash Player 6 does not terminate connections when the user leaves the web page, which allows remote attackers to cause a denial of service (bandwidth, resource, and CPU consumption) via the (1) loadMovie or (2) loadSound commands, which continue to execute until the browser is closed. | [
"cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-6007 | The UserPro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 5.1.1. This makes it possible for unauthenticated attackers to add, modify, or delete user meta and plugin options. | [
"cpe:2.3:a:userproplugin:userpro:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2007-2373 | SQL injection vulnerability in viewcat.php in the WF-Links (wflinks) 1.03 and earlier module for XOOPS allows remote attackers to execute arbitrary SQL commands via the cid parameter. | [
"cpe:2.3:a:wf-links:wf-links:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-8160 | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have a cross-site scripting vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-2729 | The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors. | [
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:31.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] |
|
GHSA-63hw-pp24-qp9g | A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges. | [] |
|
CVE-2023-43016 | IBM Security Access Manager Container unauthorized access | IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote user to log into the server due to a user account with an empty password. IBM X-Force ID: 266154. | [
"cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*"
] |
CVE-2023-31151 | Improper Certificate Validation | An Improper Certificate Validation vulnerability
in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface
could allow a remote unauthenticated attacker to conduct a man-in-the-middle (MitM) attack.
See SEL Service Bulletin dated 2022-11-15 for more details.
| [
"cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*"
] |
CVE-2020-35720 | Stored XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to store malicious code in multiple fields (first name, last name, and logon name) when creating or modifying a user via the submitUser.jsp file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:quest:policy_authority_for_unified_communications:8.1.2.200:*:*:*:*:*:*:*"
] |
|
CVE-2024-20029 | In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477406; Issue ID: MSV-1010. | [
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-26009 | A stack-based buffer overflow vulnerability exists in the confsrv ucloud_set_node_location functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability. | [
"cpe:2.3:o:tcl:linkhub_mesh_wifi_ac1200:ms1g_00_01.00_14:*:*:*:*:*:*:*",
"cpe:2.3:h:tcl:linkhub_mesh_wifi_ac1200:-:*:*:*:*:*:*:*"
] |
|
GHSA-g5hh-655f-w2v3 | Buffer overflow in the LDAP naming services library (libsldap) in Sun Solaris 8 allows local users to execute arbitrary code via a long LDAP_OPTIONS environment variable to a privileged program that uses libsldap. | [] |
|
CVE-2011-0748 | Multiple cross-site request forgery (CSRF) vulnerabilities in phpList before 2.10.13 allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) edit administrator accounts. | [
"cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.5b:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.11:*:*:*:*:*:*:*"
] |
|
CVE-2021-34947 | NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability | NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of the soap_block_table file. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-13055. | [
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*"
] |
GHSA-g8c7-2xjm-67gx | Directory traversal vulnerability in BRS WebWeaver HTTP server allows remote attackers to read arbitrary files via a .. (dot dot) attack in the (1) syshelp, (2) sysimages, or (3) scripts directories. | [] |
|
CVE-2020-11943 | An issue was discovered in Open-AudIT 3.2.2. There is Arbitrary file upload. | [
"cpe:2.3:a:opmantek:open-audit:3.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2007-3022 | Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, displays the password hash for a user after a failed login attempt, which makes it easier for remote attackers to conduct brute force attacks. | [
"cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:10.1.396:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:10.1.401:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:reporting_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-30487 | WordPress MP3 Audio Player for Music, Radio & Podcast by Sonaar plugin <= 5.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 5.1.
| [] |
CVE-2012-1408 | Unspecified vulnerability in the App Lock (com.cc.applock) application 1.7.5 and 1.7.6 for Android has unknown impact and attack vectors. | [
"cpe:2.3:a:creative_core:app_lock:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:creative_core:app_lock:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-20155 | A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system.
This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system. | [] |
|
GHSA-frf4-9jv5-vrc3 | IBM Planning Analytics 2.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. | [] |
|
CVE-2013-0468 | Cross-site scripting (XSS) vulnerability in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-2983. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-32552 | WordPress Tagbox – UGC Galleries, Social Media Widgets, User Reviews & Analytics plugin <= 3.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tagbox Taggbox allows Stored XSS.This issue affects Taggbox: from n/a through 3.2.
| [] |
CVE-2004-1961 | blocker.php in Protector System 1.15b1 allows remote attackers to bypass SQL injection protection and execute limited SQL commands via URL-encoded "'" characters ("%27"). | [
"cpe:2.3:a:protector_system:protector_system:1.15b1:*:*:*:*:*:*:*"
] |
|
CVE-2018-15464 | Cisco ASR 900 Series Aggregation Services Router Software Denial of Service Vulnerability | A vulnerability in Cisco 900 Series Aggregation Services Router (ASR) software could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of certain broadcast packets ingress to the device. An attacker could exploit this vulnerability by sending large streams of broadcast packets to an affected device. If successful, an exploit could allow an attacker to impact services running on the device, resulting in a partial DoS condition. | [
"cpe:2.3:a:cisco:asr_900_series_software:16.6.2:*:*:*:*:*:*:*"
] |
CVE-2020-13797 | An issue was discovered in Navigate CMS through 2.8.7. It allows XSS because of a lack of purify calls in lib/packages/websites/website.class.php. | [
"cpe:2.3:a:naviwebs:navigate_cms:*:*:*:*:*:*:*:*"
] |
|
GHSA-h4hw-rqpm-fp7j | Integer overflow in Apple Safari allows remote attackers to bypass intended port restrictions on outbound TCP connections via a port number outside the range of the unsigned short data type, as demonstrated by a value of 65561 for TCP port 25. | [] |
|
CVE-2024-40110 | Sourcecodester Poultry Farm Management System v1.0 contains an Unauthenticated Remote Code Execution (RCE) vulnerability via the productimage parameter at /farm/product.php. | [
"cpe:2.3:a:poultry_farm_management_system_project:poultry_farm_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-5812 | Directory traversal vulnerability in modules/Builder/DownloadModule.php in ModuleBuilder 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [
"cpe:2.3:a:modulebuilder:modulebuilder:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-4v65-2p65-mvwf | ftpd.c in wu-ftpd 2.6.2, when running on "operating systems that only allow one non-connected socket bound to the same local address," does not close failed connections, which allows remote attackers to cause a denial of service. | [] |
|
CVE-2024-52602 | Server-Side Request Forgery (SSRF) on redirects and federation in Matrix Media Repo | Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. Matrix Media Repo (MMR) is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. This is fixed in MMR v1.3.8. Users are advised to upgrade. Restricting which hosts MMR is allowed to contact via (local) firewall rules or a transparent proxy and may provide a workaround for users unable to upgrade. | [] |
GHSA-3rq8-wwm3-3pv9 | Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the CDP (Cisco Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.1000. | [] |
|
GHSA-gx2c-5v6w-v894 | CMS Made Simple 1.1.3.1 allows remote attackers to obtain the full path via a direct request for unspecified files. | [] |
|
GHSA-xw86-99gp-4h78 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: RAPID). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-rf4g-jrc7-7xv4 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73. | [] |
|
CVE-2024-44047 | WordPress IMPress for IDX Broker plugin <= 3.2.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in IDX Broker IMPress for IDX Broker allows Stored XSS.This issue affects IMPress for IDX Broker: from n/a through 3.2.2. | [
"cpe:2.3:a:idxbroker:impress_for_idx_broker:*:*:*:*:platinum:wordpress:*:*"
] |
GHSA-r7j8-523f-fpxp | IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 281222. | [] |
|
GHSA-36vc-cw62-fqvr | Shadowsock is malware | The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationAs this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.If you have found this installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [] |
GHSA-359p-x9w8-8g33 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate. | [] |
|
CVE-2009-4052 | Multiple cross-site scripting (XSS) vulnerabilities in the JSF Widget Library Runtime in IBM Rational Application Developer for WebSphere Software before 7.0.0.10 and Rational Software Architect before 7.0.0.10 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) the JSF Tree Control and (2) the JavaScript Resource Servlet. | [
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_application_developer_for_websphere:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect:7.0.0.9:*:*:*:*:*:*:*"
] |
|
CVE-2013-6629 | The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
GHSA-whfw-9qvh-v4jj | NULL pointer dereference vulnerability in ZNC before 0.092 caused by traffic stats when there are unauthenticated connections. | [] |
|
CVE-2018-2365 | SAP NetWeaver Portal, WebDynpro Java, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:netweaver_portal:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_portal:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_portal:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_portal:7.50:*:*:*:*:*:*:*"
] |
|
GHSA-j65w-37m7-427w | Cross-site scripting (XSS) vulnerability in the login page in Open Web Analytics (OWA) before 1.5.6 allows remote attackers to inject arbitrary web script or HTML via the owa_user_id parameter to index.php. | [] |
|
CVE-2020-5191 | PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple Persistent XSS vulnerabilities. | [
"cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-5903 | Array index error in the xrdp_bitmap_def_proc function in xrdp/funcs.c in xrdp 0.4.1 and earlier allows remote attackers to execute arbitrary code via vectors that manipulate the value of the edit_pos structure member. | [
"cpe:2.3:a:xrdp:xrdp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xrdp:xrdp:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xrdp:xrdp:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xrdp:xrdp:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xrdp:xrdp:0.4:*:*:*:*:*:*:*"
] |
|
CVE-2015-1207 | Double-free vulnerability in libavformat/mov.c in FFMPEG in Google Chrome 41.0.2251.0 allows remote attackers to cause a denial of service (memory corruption and crash) via a crafted .m4a file. | [
"cpe:2.3:a:google:chrome:41.0.2251.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-21034 | Acrobat Reader DC Out-Of-Bounds Read Information Disclosure Vulnerability | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally elevate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2020-22023 | A heap-based Buffer Overflow vulnerabililty exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and other potential consequences. | [
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-8790 | This issue was addresses by updating incorrect URLSession file descriptors management logic to match Swift 5.0. This issue is fixed in Swift 5.1.1 for Ubuntu. Incorrect management of file descriptors in URLSession could lead to inadvertent data disclosure. | [
"cpe:2.3:a:apple:swift:*:*:*:*:*:ubuntu:*:*"
] |
|
GHSA-x4c4-f98j-6557 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in One Rank Math SEO PRO plugin <= 3.0.35 versions. | [] |
|
CVE-2024-1869 | Certain HP DesignJet print products are potentially vulnerable to information disclosure related to accessing memory out-of-bounds when using the general-purpose gateway (GGW) over port 9220. | [
"cpe:2.3:h:hp:designjet_t520_24in:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:designjet_t120:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:designjet_t520_36in:*:*:*:*:*:*:*:*"
] |
|
GHSA-9c64-5jjg-w2cj | The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so websetremoteimageinfo function. | [] |
|
CVE-2016-4182 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-28433 | Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Show&userid=. | [
"cpe:2.3:a:baby_care_system_project:baby_care_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-5h45-vp7g-6r9g | Use-after-free vulnerability in Adobe Photoshop CS5 12.x before 12.0.5 and CS5.1 12.1.x before 12.1.1 allows remote attackers to execute arbitrary code via a crafted TIFF (aka .TIF) file. | [] |
|
GHSA-6j6r-v684-f792 | Cross-site scripting (XSS) vulnerability in member.php in MyBB (aka MyBulletinBoard) before 1.8.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2019-17373 | Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2. | [
"cpe:2.3:o:netgear:mbr1515_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mbr1515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mbr1516_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mbr1516:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgnd3700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr834bv2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr834bv2:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-0401 | NULL dereference during PKCS7 data verification | A NULL pointer can be dereferenced when signatures are being
verified on PKCS7 signed or signedAndEnveloped data. In case the hash
algorithm used for the signature is known to the OpenSSL library but
the implementation of the hash algorithm is not available the digest
initialization will fail. There is a missing check for the return
value from the initialization function which later leads to invalid
usage of the digest API most likely leading to a crash.
The unavailability of an algorithm can be caused by using FIPS
enabled configuration of providers or more commonly by not loading
the legacy provider.
PKCS7 data is processed by the SMIME library calls and also by the
time stamp (TS) library calls. The TLS implementation in OpenSSL does
not call these functions however third party applications would be
affected if they call these functions to verify signatures on untrusted
data. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:*"
] |
GHSA-7632-gv3v-j58r | An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). On SRX5000 Series with SPC3, SRX4000 Series, and vSRX, when PowerMode IPsec is configured and a malformed ESP packet matching an established IPsec tunnel is received the PFE crashes. This issue affects Juniper Networks Junos OS on SRX5000 Series with SPC3, SRX4000 Series, and vSRX: All versions prior to 19.4R2-S6, 19.4R3-S7; 20.1 versions prior to 20.1R3-S3; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2. | [] |
|
CVE-2020-23181 | A reflected cross site scripting (XSS) vulnerability in /administration/theme.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Manage Theme" field. | [
"cpe:2.3:a:php-fusion:php-fusion:9.03.60:*:*:*:*:*:*:*"
] |
|
GHSA-mqhg-vhp9-4f97 | SQL injection vulnerability in index.php in FicHive 1.0 allows remote attackers to execute arbitrary SQL commands via the letter parameter in a Search action, a different vector than CVE-2008-2416. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-rhjx-jwv4-jj63 | A weak credential vulnerability exists in Firewalla Box Software versions before 1.979. This vulnerability allows a physically close attacker to use the license UUID for authentication and provision SSH credentials over the Bluetooth Low-Energy (BTLE) interface. Once an attacker gains access to the LAN, they could log into the SSH interface using the provisioned credentials. The license UUID can be acquired through plain-text Bluetooth sniffing, reading the QR code on the bottom of the device, or brute-forcing the UUID (though this is less likely). | [] |
|
GHSA-24ch-r26p-7c3f | Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect availability via unknown vectors related to JavaFX. | [] |
|
GHSA-252p-r436-cv4f | There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant. | [] |
|
CVE-2021-1787 | Multiple issues were addressed with improved logic. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A local attacker may be able to elevate their privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-xh86-3phw-v5qq | Vulnerability in the Oracle Customer Interaction History component of Oracle E-Business Suite (subcomponent: Outcome-Result). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Customer Interaction History accessible data as well as unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] |
|
GHSA-4368-2cqv-7wjv | Cross-site scripting (XSS) vulnerability in Daverave Simplog 1.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via a blog post. | [] |
|
CVE-2013-6636 | The FrameLoader::notifyIfInitialDocumentAccessed function in core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 31.0.1650.63, makes an incorrect check for an empty document during presentation of a modal dialog, which allows remote attackers to spoof the address bar via vectors involving the document.write method. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.61:*:*:*:*:*:*:*"
] |
|
GHSA-f3q3-qf9q-v7v4 | Cross-Site Request Forgery (CSRF) vulnerability in what3words what3words Address Field allows Stored XSS. This issue affects what3words Address Field: from n/a through 4.0.15. | [] |
|
CVE-2020-2190 | Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability. | [
"cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2021-42987 | Eltima USB Network Gate is affected by Integer Overflow. IOCTL Handler 0x22001B in the USB Network Gate above 7.0.1370 below 9.2.2420 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | [
"cpe:2.3:a:eltima:usb_network_gate:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-125080 | frontaccounting faplanet path traversal | A vulnerability has been found in frontaccounting faplanet and classified as critical. This vulnerability affects unknown code. The manipulation leads to path traversal. The patch is identified as a5dcd87f46080a624b1a9ad4b0dd035bbd24ac50. It is recommended to apply a patch to fix this issue. VDB-218398 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:faplanet_project:faplanet:*:*:*:*:*:*:*:*"
] |
GHSA-x9wv-x8g7-f28h | Multiple cross-site scripting (XSS) vulnerabilities in ls/htmlchat.php in the VideoWhisper Live Streaming Integration plugin 4.25.3 and possibly earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) message parameter. NOTE: some of these details are obtained from third party information. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.