id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2014-0243 | Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job. | [
"cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2p1:*:*:*:*:*:*"
] |
|
CVE-2023-48481 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] |
CVE-2024-7001 | Inappropriate implementation in HTML in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-28199 | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3. An app may be able to disclose kernel memory. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-9xgw-72w6-j5wc | Cross-site scripting (XSS) vulnerability in ProjectForum 4.7.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) fwd parameter in admin/adminsignin.html and (2) originalpageid parameter in admin/newpage.html associated with a group. | [] |
|
GHSA-q5cv-3jwf-5p4q | Simple Expense Tracker v1.0 was discovered to contain a SQL injection vulnerability via the expense parameter at /endpoint/delete_expense.php. | [] |
|
GHSA-gv2x-7259-82cc | Multiple cross-site scripting (XSS) vulnerabilities in pm.php in DeluxeBB 1.07 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) subject or (2) to parameters. | [] |
|
GHSA-7w82-64xx-5xv2 | libarchive in Apple OS X before 10.12 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted file. | [] |
|
GHSA-m6q9-p373-g5q8 | Keycloak's unvalidated cross-origin messages in checkLoginIframe leads to DDoS | A potential security flaw in the "checkLoginIframe" which allows unvalidated cross-origin messages, enabling potential DDoS attacks. By exploiting this vulnerability, attackers could coordinate to send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.AcknowledgementsSpecial thanks to Adriano Márcio Monteiro from BRZTEC for reporting this issue and helping us improve our project. | [] |
CVE-2020-15247 | Twig Sandbox Escape by authenticated users with access to editing CMS templates when safemode is enabled. | October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.469, an authenticated backend user with the cms.manage_pages, cms.manage_layouts, or cms.manage_partials permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to cms.enableSafeMode being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having cms.enableSafeMode enabled, but would be a problem for anyone relying on cms.enableSafeMode to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. Issue has been patched in Build 469 (v1.0.469) and v1.1.0. | [
"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*"
] |
CVE-2024-3769 | PHPGurukul Student Record System login.php sql injection | A vulnerability, which was classified as critical, was found in PHPGurukul Student Record System 3.20. Affected is an unknown function of the file /login.php. The manipulation of the argument id/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260616. | [
"cpe:2.3:a:phpgurukul:student_record_system:3.20:*:*:*:*:*:*:*"
] |
GHSA-jm98-95j6-29vj | Improper buffer restrictions in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via physical access. | [] |
|
CVE-2018-15598 | Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable. | [
"cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-7110 | Directory traversal vulnerability in the Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to upload files to arbitrary locations via a .. (dot dot) in a request. | [
"cpe:2.3:a:kyoceramita:scanner_file_utility:3.3.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-35067 | Meross MSG100 devices before 3.2.3 allow an attacker to replay the same data or similar data (e.g., an attacker who sniffs a Close message can transmit an acceptable Open message). | [
"cpe:2.3:o:meross:msg100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:meross:msg100:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-26561 | WordPress Elfsight Yottie Lite Plugin <= 1.3.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in elfsight Elfsight Yottie Lite allows Stored XSS. This issue affects Elfsight Yottie Lite: from n/a through 1.3.3. | [] |
GHSA-55rf-8q29-4g43 | Sylius has a security vulnerability via adjustments API endpoint | ImpactA security vulnerability was discovered in the `/api/v2/shop/adjustments/{id}` endpoint, which retrieves order adjustments based on incremental integer IDs. The vulnerability allows an attacker to enumerate valid adjustment IDs and retrieve order tokens. Using these tokens, an attacker can access guest customer order details - sensitive guest customer information.PatchesThe issue is fixed in versions: 1.12.19, 1.13.4 and above. The `/api/v2/shop/adjustments/{id}` will always return `404` status.WorkaroundsUsing YAML configuration:Create `config/api_platform/Adjustment.yaml` file:Or using XML configuration:Copy the original configuration from vendor:And change the `shop_get` operation in copied `config/api_platform/Adjustment.xml` file:For more informationIf you have any questions or comments about this advisory:Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)Email us at [[email protected]](mailto:[email protected]) | [] |
CVE-2005-2604 | index.php for My Image Gallery (Mig ) 1.4.1 allows remote attackers to obtain the web server path via certain currDir and image arguments, which leaks the path in an error message. | [
"cpe:2.3:a:my_image_gallery:my_image_gallery:1.4.1:*:*:*:*:*:*:*"
] |
|
GHSA-jcf6-pm7w-jrq7 | Multiple SQL injection vulnerabilities in TestLink through 1.9.19 allows remote authenticated users to execute arbitrary SQL commands via the (1) tproject_id parameter to keywordsView.php; the (2) req_spec_id parameter to reqSpecCompareRevisions.php; the (3) requirement_id parameter to reqCompareVersions.php; the (4) build_id parameter to planUpdateTC.php; the (5) tplan_id parameter to newest_tcversions.php; the (6) tplan_id parameter to tcCreatedPerUserGUI.php; the (7) tcase_id parameter to tcAssign2Tplan.php; or the (8) testcase_id parameter to tcCompareVersions.php. Authentication is often easy to achieve: a guest account, that can execute this attack, can be created by anyone in the default configuration. | [] |
|
GHSA-jf6h-g8vv-jx4q | The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in firmware, aka CHIMERA-FW. | [] |
|
GHSA-xc8j-8q2q-h32f | In the Linux kernel, the following vulnerability has been resolved:ext4: use memtostr_pad() for s_volume_nameAs with the other strings in struct ext4_super_block, s_volume_name is
not NUL terminated. The other strings were marked in commit 072ebb3bffe6
("ext4: add nonstring annotations to ext4.h"). Using strscpy() isn't
the right replacement for strncpy(); it should use memtostr_pad()
instead. | [] |
|
GHSA-5xff-m446-cjf6 | Missing Authorization vulnerability in Dmitry V. (CEO of "UKR Solution") UPC/EAN/GTIN Code Generator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects UPC/EAN/GTIN Code Generator: from n/a through 2.0.2. | [] |
|
CVE-2015-7367 | Revive Adserver before 3.2.2 allows remote attackers to perform unspecified actions by leveraging an unexpired session after the user has been (1) deleted or (2) unlinked. | [
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*"
] |
|
GHSA-58mm-w7mf-4q6h | Directory traversal vulnerability in download.php in the DB Backup plugin 4.5 and earlier for Wordpress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [] |
|
CVE-2021-20117 | Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20118. | [
"cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-0712 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MIDI file. | [
"cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*"
] |
|
CVE-2024-27083 | Flask-AppBuilder's OAuth login page subject to Cross Site Scripting (XSS) | Flask-AppBuilder is an application development framework, built on top of Flask. A Cross-Site Scripting (XSS) vulnerability has been discovered on the OAuth login page. An attacker could trick a user to follow a specially crafted URL to the OAuth login page. This URL could inject and execute malicious javascript code that would get executed on the user's browser. This issue was introduced on 4.1.4 and patched on 4.2.1.
| [
"cpe:2.3:a:dpgaspar:flask-appbuilder:4.1.4:*:*:*:*:*:*:*"
] |
CVE-2021-29250 | BTCPay Server through 1.0.7.0 suffers from a Stored Cross Site Scripting (XSS) vulnerability within the POS Add Products functionality. This enables cookie stealing. | [
"cpe:2.3:a:btcpayserver:btcpay_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-8fcq-rj79-2g5w | Chiyu BF-630 and BF-630W fingerprint access-control devices allow remote attackers to bypass authentication and (1) read or (2) modify (a) Voice Time Set configuration settings via a request to voice.htm or (b) UniFinger configuration settings via a request to bf.htm, a different vulnerability than CVE-2015-2871. | [] |
|
CVE-2020-10040 | A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). An attacker with local access to the device might be able to retrieve some passwords in clear text. | [
"cpe:2.3:o:siemens:sicam_mmu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_mmu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sicam_sgu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_sgu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sicam_t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_t:-:*:*:*:*:*:*:*"
] |
|
GHSA-f626-w254-w424 | Improper Preservation of Permissions vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/editpage/IntroMessageBuilder.Php, includes/Permissions/PermissionManager.Php, includes/Permissions/RestrictionStore.Php.This issue affects MediaWiki: before 1.42.6, 1.43.1. | [] |
|
GHSA-3rfm-4g97-5f9p | A certain Red Hat patch to the KVM subsystem in the kernel package before 2.6.32-358.11.1.el6 on Red Hat Enterprise Linux (RHEL) 6 does not properly implement the PV EOI feature, which allows guest OS users to cause a denial of service (host OS crash) by leveraging a time window during which interrupts are disabled but copy_to_user function calls are possible. | [] |
|
GHSA-q8jc-hpcv-jmxw | One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response. | [] |
|
GHSA-fwhh-r6jr-f959 | Notes System Diagnostic (NSD) in IBM Domino 8.5.x before 8.5.3 FP6 IF6 and 9.x before 9.0.1 FP3 IF1 allows local users to obtain the System privilege via unspecified vectors, aka SPR TCHL9SST8V. | [] |
|
CVE-2017-17579 | FS Freelancer Clone 1.0 has SQL Injection via the profile.php u parameter. | [
"cpe:2.3:a:freelancer_clone_project:freelancer_clone:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-pq95-hwwm-f9gw | Directory traversal vulnerability in index.php in PHP Doc System 1.5.1 and earlier allows remote attackers to access or include arbitrary files via a .. (dot dot) in the show parameter. | [] |
|
GHSA-28mj-w386-78gm | Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, and 5.0 SP1a-b allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web. | [] |
|
CVE-2014-8711 | Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet. | [
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*"
] |
|
CVE-2014-9127 | Open-School Community Edition 2.2 does not properly restrict access to the export functionality, which allows remote authenticated users to obtain sensitive information via the r parameter with the value export to index.php. | [
"cpe:2.3:a:open-school:open-school:2.2:*:*:*:community:*:*:*"
] |
|
GHSA-555p-m4v6-cqxv | ASA-2024-004: Default configuration param for Evidence may limit window of validity | ASA-2024-004: Default configuration param for Evidence may limit window of validity**Component**: CometBFT
**Criticality**: Low
**Affected versions**: All
**Affected users**: Validators, Chain Builders + MaintainersSummaryA default configuration in CometBFT has been found to be small for common use cases, and may prevent the slashing mechanism from working in specific cases. The default values for `EvidenceParams.MaxAgeNumBlocks` and `EvidenceParams.MaxAgeDuration` consensus parameters may not be sufficient for common use cases to provide coverage for the entire unbonding period for a chain (`Staking.UnbondingTime`). If the conditions of both of these parameters are exceeded, evidence may be prematurely expired and considered no longer valid, potentially allowing for unpunished Byzantine behavior if evidence is discovered outside of that window.Next Steps for Chains and ValidatorsIt is recommended that chain ecosystems and their maintainers set the consensus parameters `EvidenceParams.MaxAgeNumBlocks` and `EvidenceParams.MaxAgeDuration` to values appropriate for their use case:`EvidenceParams.MaxAgeDuration` (set in nanoseconds) should exceed the duration of the chain’s unbonding period`EvidenceParams.MaxAgeNumBlocks` should exceed the number of estimated blocks that will be produced by your chain throughout the unbonding periodFor more information about evidence in CometBFT, please see: https://docs.cometbft.com/v0.37/spec/consensus/evidence.For more information about the cosmos-sdk `x/staking` and `x/slashing` modules, and `UnbondingTime` parameter, please see: https://docs.cosmos.network/v0.50/build/modules/staking and https://docs.cosmos.network/v0.50/build/modules/slashing.CometBFT is designed to be configurable by chains, and implements many different configuration variables and parameters to allow chain developers, validators, node operators, and chain participants to customize it best to their use case.As more chains adopt the Interchain Stack for new and cutting-edge use cases, the CometBFT team recommends that all chains regularly evaluate their consensus parameters and configurations to ensure they meet the needs of their ecosystem as their networks mature.A Github Security Advisory for this issue is available in the [CometBFT repository](https://github.com/cometbft/cometbft/security/advisories/GHSA-555p-m4v6-cqxv). For more information about CometBFT, see https://docs.cometbft.com/.This issue was reported to the Cosmos Bug Bounty Program on HackerOne on February 15, 2024. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos. | [] |
CVE-2024-43800 | serve-static affected by template injection that can lead to XSS | serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0. | [
"cpe:2.3:a:openjsf:serve-static:*:*:*:*:*:node.js:*:*"
] |
GHSA-79f2-47cj-wfgw | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in iControlWP Article Directory Redux plugin <= 1.0.2 versions. | [] |
|
CVE-2022-23817 | Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space, potentially leading to privilege escalation. | [
"cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_4900hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4980u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4680u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6900hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6900hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6980hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6980hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7735hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7735u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7736u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7535hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7535u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_7335u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7945hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7845hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7745hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500gt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600gt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:cezannepi-fp6_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_3000g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*"
] |
|
GHSA-mwjr-qx46-m77j | Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (stack overflow exception) via a DXImageTransform.Microsoft.Gradient ActiveX object with a long (1) StartColorStr or (2) EndColorStr property. | [] |
|
CVE-2023-42325 | Cross Site Scripting (XSS) vulnerability in Netgate pfSense v.2.7.0 allows a remote attacker to gain privileges via a crafted url to the status_logs_filter_dynamic.php page. | [
"cpe:2.3:a:netgate:pfsense:2.7.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-32078 | WordPress FV Player plugin <= 7.5.44.7212 - Unvalidated Redirects and Forwards vulnerability | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Foliovision FV Flowplayer Video Player.This issue affects FV Flowplayer Video Player: from n/a through 7.5.44.7212.
| [] |
GHSA-q283-h7m5-gh5p | An issue in wasm2c 1.0.32, wasm2wat 1.0.32, wasm-decompile 1.0.32, and wasm-validate 1.0.32 allows attackers to cause a Denial of Service (DoS) via running a crafted binary. | [] |
|
GHSA-53xg-38vg-33gj | SQUARE ENIX Co., Ltd. Kaku-San-Sei Million Arthur before 2.25 for Android stores "product credentials" on the SD card, which allows attackers to gain privileges via a crafted application. | [] |
|
GHSA-q3h8-vxrg-hgjp | The Mizuho Direct App for Android version 3.13.0 and earlier does not verify server certificates, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-458q-p5fc-j68h | The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module. | [] |
|
CVE-2013-2628 | Multiple cross-site request forgery (CSRF) vulnerabilities in action.php in Leed (Light Feed), possibly before 1.5 Stable, allow remote attackers to hijack the authentication of administrators for unspecified requests, related to the lack of an anti-CSRF token. | [
"cpe:2.3:a:idleman:leed:*:*:*:*:*:*:*:*"
] |
|
GHSA-969m-2vwf-hmrr | plugins/crypto/openssl/crypto_openssl.c in Simple Linux Utility for Resource Management (aka SLURM or slurm-llnl) does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. | [] |
|
CVE-2023-0721 | The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to CSV injection in versions up to, and including, 3.3.0. This allows unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration. | [
"cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-p3xf-gp9j-6r3v | In filterMask of SkEmbossMaskFilter.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
GHSA-7p2q-7f39-m8x7 | The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress is vulnerable to SQL Injection via the 'data-id' parameter in all versions up to, and including, 4.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] |
|
CVE-2000-1201 | Check Point FireWall-1 allows remote attackers to cause a denial of service (high CPU) via a flood of packets to port 264. | [
"cpe:2.3:a:checkpoint:firewall-1:*:*:*:*:*:*:*:*"
] |
|
GHSA-hjmg-8jw6-qj7r | Cross-site scripting (XSS) vulnerability in the Calendar module 6.x before 6.x-2.2 for Drupal allows remote authenticated users, with "create new content types" privileges, to inject arbitrary web script or HTML via the title of a content type. | [] |
|
CVE-2018-2431 | SAP BusinessObjects Business Intelligence Suite, versions 4.10 and 4.20, does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:businessobjects_business_intelligence:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:businessobjects_business_intelligence:4.20:*:*:*:*:*:*:*"
] |
|
CVE-2019-12813 | An issue was discovered in Digital Persona U.are.U 4500 Fingerprint Reader v24. The key and salt used for obfuscating the fingerprint image exhibit cleartext when the fingerprint scanner device transfers a fingerprint image to the driver. An attacker who sniffs an encrypted fingerprint image can easily decrypt that image using the key and salt. | [
"cpe:2.3:o:crossmatch:digital_persona_u.are.u_4500_firmware:24:*:*:*:*:*:*:*",
"cpe:2.3:h:crossmatch:digital_persona_u.are.u_4500:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-11838 | Possible double free issue in WLAN due to lack of checking memory free condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8053, MDM9640, SDA660, SDM636, SDM660, SDX20 | [
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] |
|
CVE-2002-0601 | ISS RealSecure Network Sensor 5.x through 6.5 allows remote attackers to cause a denial of service (crash) via malformed DHCP packets that cause RealSecure to dereference a null pointer. | [
"cpe:2.3:a:information_security_systems:realsecure_network_sensor:5.0_xpu_3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:information_security_systems:realsecure_network_sensor:5.5.1_xpu_3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:information_security_systems:realsecure_network_sensor:5.5.2_xpu_3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:information_security_systems:realsecure_network_sensor:5.5_xpu_3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:information_security_systems:realsecure_network_sensor:6.0_xpu_3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:information_security_systems:realsecure_network_sensor:6.5:*:*:*:*:*:*:*"
] |
|
CVE-2022-3901 | Visioweb.js - Prototype Pollution can results in XSS | Prototype Pollution in Visioweb.js 1.10.6 allows attackers to execute XSS on the client system. | [
"cpe:2.3:a:visioglobe:visioweb:1.10.6:*:*:*:*:*:*:*"
] |
CVE-2022-4101 | Images Optimize and Upload CF7 <= 2.1.4 - Unauthenticated Arbitrary File Deletion | The Images Optimize and Upload CF7 WordPress plugin through 2.1.4 does not validate the file to be deleted via an AJAX action available to unauthenticated users, which could allow them to delete arbitrary files on the server via path traversal attack. | [
"cpe:2.3:a:images_optimize_and_upload_cf7_project:images_optimize_and_upload_cf7:*:*:*:*:*:wordpress:*:*"
] |
GHSA-5xrv-whpx-cr83 | In Android before the 2018-05-05 security patch level, NVIDIA Widevine Trustlet contains a vulnerability in Widevine TA where the software reads data past the end, or before the beginning, of the intended buffer, which may lead to Information Disclosure. This issue is rated as moderate. Android: A-69383916. Reference: N-CVE-2018-6246. | [] |
|
GHSA-g78g-hqcm-q9gm | Unspecified vulnerability in the Mobile Application Server component in Oracle E-Business Suite 12.0.3 has unknown impact and remote authenticated attack vectors. | [] |
|
GHSA-p6w5-mv25-26mv | A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node. | [] |
|
GHSA-j3qx-9prj-gh2p | Windows Kernel Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-27093. | [] |
|
CVE-2005-0608 | Heap-based buffer overflow in server.cpp for WebMod 0.47 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a POST request with a Content-Length that is less than the amount of data that is actually sent. | [
"cpe:2.3:a:webmod:webmod:0.47:*:*:*:*:*:*:*"
] |
|
CVE-2005-1461 | Multiple buffer overflows in the (1) SIP, (2) CMIP, (3) CMP, (4) CMS, (5) CRMF, (6) ESS, (7) OCSP, (8) X.509, (9) ISIS, (10) DISTCC, (11) FCELS, (12) Q.931, (13) NCP, (14) TCAP, (15) ISUP, (16) MEGACO, (17) PKIX1Explitit, (18) PKIX_Qualified, (19) Presentation dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code. | [
"cpe:2.3:a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*"
] |
|
GHSA-73x4-xw4q-8wp7 | SQL injection vulnerability in search.php in PHP/MySQL Classifieds (PHP Classifieds) allows remote attackers to execute arbitrary SQL commands via the rate parameter. | [] |
|
GHSA-27mr-8vvw-x4gr | The The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to arbitrary shortcode execution via woot_get_smth AJAX action in all versions up to, and including, 1.0.6.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | [] |
|
CVE-2023-50251 | php-svg-lib possible DoS caused by infinite recursion when parsing SVG document | php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when parsing the attributes passed to a `use` tag inside an svg document, an attacker can cause the system to go to an infinite recursion. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself. An attacker sending multiple request to a system to render the above payload can potentially cause resource exhaustion to the point that the system is unable to handle incoming request. Version 0.5.1 contains a patch for this issue. | [
"cpe:2.3:a:dompdf:php-svg-lib:*:*:*:*:*:*:*:*"
] |
GHSA-p83v-cgfv-mfhv | A vulnerability, which was classified as critical, has been found in Chanjet Smooth T+system 3.5. This issue affects some unknown processing of the file /tplus/UFAQD/keyEdit.aspx. The manipulation of the argument KeyID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-267185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2014-0103 | WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files. | [
"cpe:2.3:a:zarafa:webapp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"
] |
|
CVE-2013-6695 | The RBAC implementation in Cisco Secure Access Control System (ACS) does not properly verify privileges for support-bundle downloads, which allows remote authenticated users to obtain sensitive information via a download action, as demonstrated by obtaining read access to the user database, aka Bug ID CSCuj39274. | [
"cpe:2.3:a:cisco:secure_access_control_system:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-15325 | In GalliumOS 3.0, CONFIG_SECURITY_YAMA is disabled but /etc/sysctl.d/10-ptrace.conf tries to set /proc/sys/kernel/yama/ptrace_scope to 1, which might increase risk because of the appearance that a protection mechanism is present when actually it is not. | [
"cpe:2.3:o:galliumos:galliumos:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-gvg2-4v3w-rfm6 | An elevation of privilege vulnerability exists when the Windows Update Orchestrator Service improperly handles file operations, aka 'Windows Update Orchestrator Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0868. | [] |
|
GHSA-v3j6-xf77-8r9c | Use-after-free in actix-http | An issue was discovered in the actix-http crate before 2.0.0-alpha.1 for Rust. There is a use-after-free in BodyStream. | [] |
CVE-2023-23473 | IBM InfoSphere Information Server cross-site request forgery | IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 245400. | [
"cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:on_cloud:*:*:*"
] |
CVE-2015-4105 | Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations. | [
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:x86:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"
] |
|
GHSA-37fx-2m8v-2x4j | NVIDIA Omniverse Workstation Launcher for Windows and Linux contains a vulnerability in the authentication flow, where a user’s access token is displayed in the browser user's address bar. An attacker could use this token to impersonate the user to access launcher resources. A successful exploit of this vulnerability may lead to information disclosure. | [] |
|
CVE-2020-0328 | In the camera, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150156131 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-7534 | Heap buffer overflow in Layout in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-qj68-9gpw-8pq2 | In the Linux kernel, the following vulnerability has been resolved:bcache: avoid oversized read request in cache missing code pathIn the cache missing code path of cached device, if a proper location
from the internal B+ tree is matched for a cache miss range, function
cached_dev_cache_miss() will be called in cache_lookup_fn() in the
following code block,
[code block 1]
526 unsigned int sectors = KEY_INODE(k) == s->iop.inode
527 ? min_t(uint64_t, INT_MAX,
528 KEY_START(k) - bio->bi_iter.bi_sector)
529 : INT_MAX;
530 int ret = s->d->cache_miss(b, s, bio, sectors);Here s->d->cache_miss() is the call backfunction pointer initialized as
cached_dev_cache_miss(), the last parameter 'sectors' is an important
hint to calculate the size of read request to backing device of the
missing cache data.Current calculation in above code block may generate oversized value of
'sectors', which consequently may trigger 2 different potential kernel
panics by BUG() or BUG_ON() as listed below,BUG_ON() inside bch_btree_insert_key(),
[code block 2]
886 BUG_ON(b->ops->is_extents && !KEY_SIZE(k));BUG() inside biovec_slab(),
[code block 3]
51 default:
52 BUG();
53 return NULL;All the above panics are original from cached_dev_cache_miss() by the
oversized parameter 'sectors'.Inside cached_dev_cache_miss(), parameter 'sectors' is used to calculate
the size of data read from backing device for the cache missing. This
size is stored in s->insert_bio_sectors by the following lines of code,
[code block 4]
909 s->insert_bio_sectors = min(sectors, bio_sectors(bio) + reada);Then the actual key inserting to the internal B+ tree is generated and
stored in s->iop.replace_key by the following lines of code,
[code block 5]
911 s->iop.replace_key = KEY(s->iop.inode,
912 bio->bi_iter.bi_sector + s->insert_bio_sectors,
913 s->insert_bio_sectors);
The oversized parameter 'sectors' may trigger panic 1) by BUG_ON() from
the above code block.And the bio sending to backing device for the missing data is allocated
with hint from s->insert_bio_sectors by the following lines of code,
[code block 6]
926 cache_bio = bio_alloc_bioset(GFP_NOWAIT,
927 DIV_ROUND_UP(s->insert_bio_sectors, PAGE_SECTORS),
928 &dc->disk.bio_split);
The oversized parameter 'sectors' may trigger panic 2) by BUG() from the
agove code block.Now let me explain how the panics happen with the oversized 'sectors'.
In code block 5, replace_key is generated by macro KEY(). From the
definition of macro KEY(),
[code block 7]
71 #define KEY(inode, offset, size) \
72 ((struct bkey) { \
73 .high = (1ULL << 63) | ((__u64) (size) << 20) | (inode), \
74 .low = (offset) \
75 })Here 'size' is 16bits width embedded in 64bits member 'high' of struct
bkey. But in code block 1, if "KEY_START(k) - bio->bi_iter.bi_sector" is
very probably to be larger than (1<<16) - 1, which makes the bkey size
calculation in code block 5 is overflowed. In one bug report the value
of parameter 'sectors' is 131072 (= 1 << 17), the overflowed 'sectors'
results the overflowed s->insert_bio_sectors in code block 4, then makes
size field of s->iop.replace_key to be 0 in code block 5. Then the 0-
sized s->iop.replace_key is inserted into the internal B+ tree as cache
missing check key (a special key to detect and avoid a racing between
normal write request and cache missing read request) as,
[code block 8]
915 ret = bch_btree_insert_check_key(b, &s->op, &s->iop.replace_key);Then the 0-sized s->iop.replace_key as 3rd parameter triggers the bkey
size check BUG_ON() in code block 2, and causes the kernel panic 1).Another ke
---truncated--- | [] |
|
CVE-2008-3608 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a crafted JPEG image with an embedded ICC profile. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*"
] |
|
GHSA-qhjx-8fqw-x3cm | WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized. | [] |
|
GHSA-42fp-75cg-7jf8 | Unrestricted file upload vulnerability in the Files plugin in ProjectPier 0.88 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the file in the tmp directory under the document root. | [] |
|
CVE-2022-0159 | Cross-site Scripting (XSS) - Stored in orchardcms/orchardcore | orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
"cpe:2.3:a:orchardcore:orchardcore:*:*:*:*:*:*:*:*"
] |
GHSA-3225-53wc-82w5 | Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2017-12066 | Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1.1.16 allows remote authenticated users to inject arbitrary web script or HTML via specially crafted HTTP Referer headers, related to the $cancel_url variable. NOTE: this vulnerability exists because of an incomplete fix (lack of the htmlspecialchars ENT_QUOTES flag) for CVE-2017-11163. | [
"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"
] |
|
GHSA-825v-cg5c-3mc8 | An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Description: This ability is leveraged in a larger exploit to flash custom firmware. | [] |
|
CVE-2023-50339 | Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | [
"cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*"
] |
|
GHSA-x577-rg5p-733q | In nci_snd_set_routing_cmd of nci_hmsgs.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-264879662 | [] |
|
CVE-2021-22654 | Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information. | [
"cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*"
] |
|
GHSA-p2x8-69gw-8gpj | The Chest Workout (aka net.p4p.chest) application 2.0.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2017-15990 | Php Inventory & Invoice Management System allows Arbitrary File Upload via dashboard/edit_myaccountdetail/. | [
"cpe:2.3:a:savsofteproducts:phpinventory:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-8967 | IBM BigFix Inventory v9 9.2 stores user credentials in plain in clear text which can be read by a local user. | [
"cpe:2.3:a:ibm:license_metric_tool:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:bigfix_inventory:9.2:*:*:*:*:*:*:*"
] |
|
GHSA-qwfp-573x-j3mg | Cross-site scripting (XSS) vulnerability in IBM Social Media Analytics 1.2 before FP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-vv54-2hxr-6q8g | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ElementInvader ElementInvader Addons for Elementor allows DOM-Based XSS. This issue affects ElementInvader Addons for Elementor: from n/a through 1.3.0. | [] |
|
CVE-2015-7795 | Cross-site scripting (XSS) vulnerability in Cybozu Office 9.0.0 through 10.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7796, CVE-2015-7797, CVE-2015-7798, CVE-2016-1149, and CVE-2016-1150. | [
"cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.