id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-31501 | The ChaoticOnyx/OnyxForum repository before 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [
"cpe:2.3:a:onyxforum_project:onyxforum:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-6741 | The ftp_PORT function in FTPServer.py in pyftpdlib before 0.2.0 does not prevent TCP connections to privileged ports if the destination IP address matches the source IP address of the connection from the FTP client, which might allow remote authenticated users to conduct FTP bounce attacks via crafted FTP data, as demonstrated by an FTP bounce attack against a NAT server, a related issue to CVE-1999-0017. | [
"cpe:2.3:a:g.rodola:pyftpdlib:*:*:*:*:*:*:*:*",
"cpe:2.3:a:g.rodola:pyftpdlib:0.1:*:*:*:*:*:*:*"
] |
|
GHSA-8x62-8vx2-9rgf | A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.3. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. | [] |
|
CVE-2013-7096 | Multiple SQL injection vulnerabilities in SAP EMR Unwired allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:sap:emr_unwired:-:-:--:*:-:iphone_os:*:*"
] |
|
GHSA-p559-89wh-h48w | In getCustomPrinterIcon of PrintManagerService.java, there is a possible way to view other user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2019-11050 | Use-after-free in exif parsing under memory sanitizer | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
GHSA-g2gf-m5x4-f968 | Cross-Site Request Forgery (CSRF) vulnerability in Taboola plugin <= 2.0.1 versions. | [] |
|
GHSA-9p6f-pmgg-x94p | A vulnerability, which was classified as critical, has been found in SourceCodester Simple and Beautiful Shopping Cart System 1.0. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225317 was assigned to this vulnerability. | [] |
|
GHSA-7c2v-cqrg-3pf6 | An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a CORS misconfiguration, which reflected the Origin provided by incoming requests. This allowed JavaScript running on any domain to interact with the server APIs and perform administrative actions, without the victim's knowledge. | [] |
|
CVE-2009-5099 | Cross-site scripting (XSS) vulnerability in ViewAction in Pentaho BI Server 1.7.0.1062 and earlier allows remote attackers to inject arbitrary web script or HTML via the outputType parameter. | [
"cpe:2.3:a:pentaho:bi_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pentaho:bi_server:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pentaho:bi_server:1.6.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-38652 | A remote insecure deserialization vulnerability exixsts in VMWare Hyperic Agent 5.8.6. Exploitation of this vulnerability enables a malicious authenticated user to run arbitrary code or malware within a Hyperic Agent instance and its host operating system with the privileges of the Hyperic Agent process (often SYSTEM on Windows platforms). NOTE: prior exploitation of CVE-2022-38650 results in the disclosure of the authentication material required to exploit this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
"cpe:2.3:a:vmware:hyperic_agent:5.8.6:*:*:*:*:*:*:*"
] |
|
GHSA-726g-xghf-35vc | In the Linux kernel, the following vulnerability has been resolved:scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()Port is allocated by sas_port_alloc_num() and rphy is allocated by either
sas_end_device_alloc() or sas_expander_alloc(), all of which may return
NULL. So we need to check the rphy to avoid possible NULL pointer access.If sas_rphy_add() returned with failure, rphy is set to NULL. We would
access the rphy in the following lines which would also result NULL pointer
access. | [] |
|
GHSA-hw69-gv5r-v84f | A vulnerability classified as critical was found in cym1102 nginxWebUI up to 3.9.9. This vulnerability affects unknown code of the file /adminPage/main/upload. The manipulation of the argument file leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260578 is the identifier assigned to this vulnerability. | [] |
|
GHSA-jxx4-58j9-4g57 | Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819. | [] |
|
GHSA-j672-wh3w-pxrr | IBM iNotes 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126062. | [] |
|
CVE-2010-2866 | Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*"
] |
|
GHSA-8v3h-64w8-c2mx | Algorithmic complexity vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x through 3.1.2 allows remote attackers to cause a denial of service (CPU consumption) via vectors that trigger colliding hash-table keys. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1983. | [] |
|
CVE-2024-51588 | WordPress Super Addons for Elementor plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themehat Super Addons for Elementor allows DOM-Based XSS.This issue affects Super Addons for Elementor: from n/a through 1.0. | [
"cpe:2.3:a:themehat:super_addons_for_elementor:1.0:*:*:*:*:wordpress:*:*"
] |
GHSA-xjg4-fwj3-xr89 | An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service. | [] |
|
CVE-2024-4689 | WordPress ShortPixel Adaptive Images plugin <= 3.8.3 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in ShortPixel ShortPixel Adaptive Images.This issue affects ShortPixel Adaptive Images: from n/a through 3.8.3.
| [
"cpe:2.3:a:shortpixel:shortpixel_adaptive_images:-:*:*:*:*:wordpress:*:*"
] |
CVE-2021-22933 | A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform an arbitrary file delete via a maliciously crafted web request. | [
"cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r3.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*"
] |
|
GHSA-9v6x-xq68-7w74 | A vulnerability was found in Tongda OA 2017 up to 11.9. It has been declared as critical. This vulnerability affects unknown code of the file pda/pad/email/delete.php. The manipulation of the argument EMAIL_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-247246 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-vwhp-3xvr-4jc2 | idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/keyWord_deal.php?mudi=del&dataType=word&dataTypeCN. | [] |
|
CVE-2021-26472 | Unauthenticated remote command execution with SYSTEM privileges in Vembu products | In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges. | [
"cpe:2.3:a:vembu:bdr_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vembu:offsite_dr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2013-5690 | Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite before 7.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) content with the text/xml MIME type or (2) the Status comment field of an appointment. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-29143 | WordPress Passwordless Login plugin <= 1.1.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs, sareiodata Passwordless Login passwordless-login allows Stored XSS.This issue affects Passwordless Login: from n/a through 1.1.2.
| [] |
CVE-2005-4755 | BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier (1) stores the private key passphrase (CustomTrustKeyStorePassPhrase) in cleartext in nodemanager.config; or, during domain creation with the Configuration Wizard, renders an SSL private key passphrase in cleartext (2) on a terminal or (3) in a log file, which might allow local users to obtain cryptographic keys. | [
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*"
] |
|
CVE-2024-1954 | The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.1.8. This is due to missing or incorrect nonce validation in the includes/class-pos-bridge-install.php file. This makes it possible for unauthenticated attackers to perform several unauthorized actions like deactivating the plugin, disconnecting the subscription, syncing the status and more via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-vpv6-p582-58cq | The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. | [] |
|
GHSA-wc6x-q3v9-6hjf | LocalWEB HTTP server 1.2.0 allows remote attackers to cause a denial of service via a long GET request. | [] |
|
GHSA-4px2-x6rx-gvx2 | In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120274615 | [] |
|
CVE-2018-11505 | The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output. | [
"cpe:2.3:a:werewolf_online_project:werewolf_online:0.8.8:*:*:*:*:android:*:*"
] |
|
CVE-2019-2983 | Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] |
|
CVE-2018-15871 | An invalid memory address dereference was discovered in decompileSingleArgBuiltInFunctionCall in libming 0.4.8 before 2018-03-12. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. | [
"cpe:2.3:a:libming:libming:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-2243 | OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483. | [
"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*"
] |
|
GHSA-vvhw-w8wg-x5wc | Windows Graphics Component Remote Code Execution Vulnerability | [] |
|
CVE-2015-7401 | IBM Curam Social Program Management 6.1.x before 6.1.1.1 allows remote authenticated users to bypass intended access restrictions and obtain sensitive document information by guessing the document id. IBM X-Force ID: 107106. | [
"cpe:2.3:a:ibm:curam_social_program_management:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-23609 | Improper Error Handling Issue in LabVIEW | An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions. | [
"cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*"
] |
GHSA-3mrx-4wfm-g48p | An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page. | [] |
|
CVE-2022-21453 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-53263 | Git LFS permits exfiltration of credentials via crafted HTTP URLs | Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time. | [] |
CVE-2023-32230 | An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation. | [
"cpe:2.3:a:bosch:monitor_wall:*:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:videojet_decoder_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:videojet_decoder_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:videojet_decoder_7523_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:videojet_decoder_7523:-:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*"
] |
|
GHSA-x5h5-m6w2-8cgv | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability. | [] |
|
CVE-2000-0938 | Samba Web Administration Tool (SWAT) in Samba 2.0.7 supplies a different error message when a valid username is provided versus an invalid name, which allows remote attackers to identify valid users on the server. | [
"cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*"
] |
|
CVE-2022-42164 | Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetClientState. | [
"cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*"
] |
|
GHSA-vgc7-vqc6-2858 | When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11. | [] |
|
GHSA-w65h-wp56-qp4p | IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local attacker to perform unauthorized actions on the system, caused by improper usage of shared memory. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information or cause a denial of service. IBM X-Force ID: 179989. | [] |
|
CVE-2012-2993 | Microsoft Windows Phone 7 does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL server for the (1) POP3, (2) IMAP, or (3) SMTP protocol via an arbitrary valid certificate. | [
"cpe:2.3:o:microsoft:windows_phone_7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microsoft:windows_phone_7:-:*:*:*:*:*:*:*"
] |
|
GHSA-3x7r-cvw4-596j | File upload restriction evasion vulnerability in AMSS++ version 4.31. This vulnerability could allow an authenticated user to potentially obtain RCE through webshell, compromising the entire infrastructure. | [] |
|
CVE-2023-32316 | Users can add themselves to any organization in CloudExplorer Lite | CloudExplorer Lite is an open source cloud management tool. In affected versions users can add themselves to any organization in CloudExplorer Lite. This is due to a missing permission check on the user profile. It is recommended to upgrade the version to v1.1.0. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:fit2cloud:cloudexplorer:*:*:*:*:lite:*:*:*"
] |
CVE-2021-45229 | Apache Airflow: Reflected XSS via Origin Query Argument in URL | It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below. | [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
] |
CVE-2025-29928 | authentik's deletion of sessions did not revoke sessions when using database session storage | authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder would continue to have access to authentik. authentik 2025.2.3 and 2024.12.4 fix this issue. Switching to the cache-based session storage until the authentik instance can be upgraded is recommended. This will however also delete all existing sessions and users will have to re-authenticate. | [] |
GHSA-2chf-w4v5-vmmg | Given a malicious document provided by an attacker, the ONLYOFFICE Workspace DMS is vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition. | [] |
|
GHSA-9rfv-6m36-5qf3 | Insufficient data validation in V8 in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
CVE-2007-1128 | shopkitplus allows remote attackers to obtain sensitive information via a request to (1) events.php with a curmonth[]=01 query string or (2) enc/stylecss.php with a changetheme[]= query string, which reveals the path in various error messages. | [
"cpe:2.3:a:watersweb_shops:shop_kit_plus:initial:*:*:*:*:*:*:*"
] |
|
GHSA-rfwx-vjhh-52mp | An issue has been discovered in Bento4 1.5.1-624. A SEGV can occur in AP4_Processor::ProcessFragments in Core/Ap4Processor.cpp. | [] |
|
GHSA-g42v-287p-65qx | A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-ports/{id}/edit/. | [] |
|
GHSA-4732-gxvm-37j5 | There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152647626 | [] |
|
GHSA-cx5q-c9hw-ch65 | Unspecified vulnerability in the Oracle Web Applications Desktop Integrator component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect integrity via unknown vectors. | [] |
|
CVE-2023-48559 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*"
] |
GHSA-7542-c7w8-qr6j | In the Linux kernel, the following vulnerability has been resolved:cachefiles: defer exposing anon_fd until after copy_to_user() succeedsAfter installing the anonymous fd, we can now see it in userland and close
it. However, at this point we may not have gotten the reference count of
the cache, but we will put it during colse fd, so this may cause a cache
UAF.So grab the cache reference count before fd_install(). In addition, by
kernel convention, fd is taken over by the user land after fd_install(),
and the kernel should not call close_fd() after that, i.e., it should call
fd_install() after everything is ready, thus fd_install() is called after
copy_to_user() succeeds. | [] |
|
CVE-2025-1490 | Smart Maintenance Mode <= 1.5.2 - Reflected Cross-Site Scripting via setstatus Parameter | The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘setstatus’ parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
CVE-1999-1151 | Compaq/Microcom 6000 Access Integrator does not cause a session timeout after prompting for a username or password, which allows remote attackers to cause a denial of service by connecting to the integrator without providing a username or password. | [
"cpe:2.3:h:compaq_microcom:microcom_6000_access_integrator:initial:*:*:*:*:*:*:*"
] |
|
GHSA-wqj6-wrmm-v5j3 | The AppFirewall functionality in Citrix NetScaler Application Delivery Controller and NetScaler Gateway 10.5 before Build 68.7, 11.0 before Build 71.24, 11.1 before Build 58.13, and 12.0 before Build 57.24 allows remote attackers to execute arbitrary code via unspecified vectors. | [] |
|
CVE-2020-26211 | Cross-Site Scripting in BookStack | In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Additionally, a user with permissions to edit a page could insert a particular meta tag which could be used to silently redirect users to a alternative location upon visit of a page. Dangerous content may remain in the database but will be removed before being displayed on a page. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround without upgrading, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in BookStack version 0.30.4. | [
"cpe:2.3:a:bookstackapp:bookstack:*:*:*:*:*:*:*:*"
] |
GHSA-h223-9f6r-286q | A vulnerability was found in PHPGurukul Time Table Generator System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit-class.php. The manipulation of the argument editid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2020-35910 | An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness. | [
"cpe:2.3:a:lock_api_project:lock_api:*:*:*:*:*:rust:*:*"
] |
|
CVE-2024-30929 | Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the 'back' Parameter in playlist.php | [
"cpe:2.3:a:derbynet:derbynet:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-53pg-hp8w-g7j6 | Session tokens in RWS WorldServer 11.7.3 and earlier have a low entropy and can be enumerated, leading to unauthorized access to user sessions. | [] |
|
GHSA-wwrx-q37g-9vhg | AppleRAID in Apple Mac OS X 10.3.9 and 10.4 through 10.4.10 allows attackers to cause a denial of service (crash) via a crafted striped disk image, which triggers a NULL pointer dereference when it is mounted. | [] |
|
GHSA-q2m9-j68q-x65j | In the Linux kernel, the following vulnerability has been resolved:media: edia: dvbdev: fix a use-after-freeIn dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed
in several error-handling paths. However, *pdvbdev is not set to NULL
after dvbdev's deallocation, causing use-after-frees in many places,
for example, in the following call chain:budget_register
|-> dvb_dmxdev_init
|-> dvb_register_device
|-> dvb_dmxdev_release
|-> dvb_unregister_device
|-> dvb_remove_device
|-> dvb_device_put
|-> kref_putWhen calling dvb_unregister_device, dmxdev->dvbdev (i.e. *pdvbdev in
dvb_register_device) could point to memory that had been freed in
dvb_register_device. Thereafter, this pointer is transferred to
kref_put and triggering a use-after-free. | [] |
|
CVE-2024-49948 | net: add more sanity checks to qdisc_pkt_len_init() | In the Linux kernel, the following vulnerability has been resolved:
net: add more sanity checks to qdisc_pkt_len_init()
One path takes care of SKB_GSO_DODGY, assuming
skb->len is bigger than hdr_len.
virtio_net_hdr_to_skb() does not fully dissect TCP headers,
it only make sure it is at least 20 bytes.
It is possible for an user to provide a malicious 'GSO' packet,
total length of 80 bytes.
- 20 bytes of IPv4 header
- 60 bytes TCP header
- a small gso_size like 8
virtio_net_hdr_to_skb() would declare this packet as a normal
GSO packet, because it would see 40 bytes of payload,
bigger than gso_size.
We need to make detect this case to not underflow
qdisc_skb_cb(skb)->pkt_len. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*"
] |
GHSA-gvxh-v3hv-2g35 | Selena Sol WebBanner 4.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack. | [] |
|
GHSA-66g2-w3xc-xqx7 | Cleartext Transmission of Sensitive Information vulnerability in the ePO Extension of McAfee Content Security Reporter (CSR) prior to 2.8.0 allows an ePO administrator to view the unencrypted password of the McAfee Web Gateway (MWG) or the password of the McAfee Web Gateway Cloud Server (MWGCS) read only user used to retrieve log files for analysis in CSR. | [] |
|
CVE-2014-1319 | Buffer overflow in ImageIO in Apple OS X 10.9.x through 10.9.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image. | [
"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*"
] |
|
CVE-2010-3416 | Google Chrome before 6.0.472.59 on Linux does not properly implement the Khmer locale, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-946p-hgpx-v8pg | X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields. | [] |
|
CVE-2010-4177 | mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes. | [
"cpe:2.3:a:oracle:mysql-gui-tools:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"
] |
|
CVE-2006-0972 | SQL injection vulnerability in news.php in Tony Baird Fantastic News 2.1.1 allows remote attackers to execute arbitrary SQL commands via the page parameter. NOTE: the category vector is already covered by CVE-2005-3846. | [
"cpe:2.3:a:fscripts:fantastic_news:2.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-95fj-4hcc-xv2c | In NFC, there is a possible out of bounds write due to uninitialized data. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-146453119 | [] |
|
GHSA-3c73-87fp-87pp | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Xylus Themes WP Event Aggregator allows Stored XSS.This issue affects WP Event Aggregator: from n/a through 1.7.9. | [] |
|
GHSA-5v9v-hvfp-8rmv | A vulnerability has been identified in SIMATIC S7-200 SMART CPU CR40 (6ES7288-1CR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU CR60 (6ES7288-1CR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA1) (All versions). Affected devices are using a predictable IP ID sequence number. This leaves the system susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack and eventually could allow an attacker to create a denial of service condition. | [] |
|
CVE-2018-11932 | Improper input validation can lead RW access to secure subsystem from HLOS in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in versions MDM9650, MDM9655, MSM8996AU, QCS605, SD 410/12, SD 615/16/SD 415, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SXR1130. | [
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_16_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] |
|
GHSA-9hc7-6w9r-wj94 | Unable to generate the correct character set | Reduced entropy due to inadequate character set usageDescriptionAffected versions of the nano-id crate incorrectly generated IDs using a reduced character set in the `nano_id::base62` and `nano_id::base58` functions. Specifically, the `base62` function used a character set of 32 symbols instead of the intended 62 symbols, and the `base58` function used a character set of 16 symbols instead of the intended 58 symbols. Additionally, the `nano_id::gen` macro is also affected when a custom character set that is not a power of 2 in size is specified.It should be noted that `nano_id::base64` is not affected by this vulnerability.ImpactThis can result in a significant reduction in entropy, making the generated IDs predictable and vulnerable to brute-force attacks when the IDs are used in security-sensitive contexts such as session tokens or unique identifiers.PatchesThe flaws were corrected in commit [a9022772b2f1ce38929b5b81eccc670ac9d3ab23](https://github.com/viz-rs/nano-id/commit/a9022772b2f1ce38929b5b81eccc670ac9d3ab23) by updating the the `nano_id::gen` macro to use all specified characters correctly.PoC | [] |
GHSA-r8jx-h262-h733 | The All in One SEO – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-6746-wpr7-g7jp | Visual truncation vulnerability in Galeon 2.0.1 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication. | [] |
|
CVE-2007-3594 | Multiple cross-site scripting (XSS) vulnerabilities in AdventNet ManageEngine OpManager 6 and 7 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter in (a) ping.do and (b) traceRoute.do in map/; the (2) reportName, (3) displayName, and (4) selectedNode parameters to (c) reports/ReportViewAction.do; the (5) operation parameter to (d) admin/ServiceConfiguration.do; and the (6) selectedNode and (7) selectedTab parameters to (e) admin/DeviceAssociation.do. NOTE: the searchTerm parameter in Search.do is already covered by CVE-2006-2343. | [
"cpe:2.3:a:adventnet:manageengine_netflow_analyzer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:adventnet:manageengine_netflow_analyzer:7:*:*:*:*:*:*:*"
] |
|
GHSA-h967-6jx6-2r3h | Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability. | [] |
|
GHSA-2768-c9pp-fhfg | SQL injection vulnerability in index.php in BloofoxCMS 0.3.5 allows remote attackers to execute arbitrary SQL commands via the gender parameter. | [] |
|
CVE-2022-25045 | Home Owners Collection Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel. | [
"cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-57gv-rf6j-586p | The kernel in Sun Solaris 8 through 10 and OpenSolaris before snv_90 allows local users to bypass chroot, zones, and the Solaris Trusted Extensions multi-level security policy, and establish a covert communication channel, via unspecified vectors involving system calls. | [] |
|
GHSA-cgm2-63mv-58w4 | Missing Authorization vulnerability in Gagan Deep Singh PostmarkApp Email Integrator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PostmarkApp Email Integrator: from n/a through 2.4. | [] |
|
CVE-2020-1881 | NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices. | [
"cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:oceanstor_5310_firmware:v500r007c60spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:oceanstor_5310:5.0:*:*:*:*:*:*:*"
] |
|
GHSA-x5v7-pg82-r947 | There is elevation of privilege. | [] |
|
GHSA-gwpc-v2jm-gv2g | Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation (CWE-1304) in the Controller 6000 and 7000 can lead to secured door locks connected via Aperio Communication Hubs to momentarily allow free access.This issue affects: Gallagher Controller 6000 and 7000 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior. | [] |
|
CVE-2018-16133 | Cybrotech CyBroHttpServer 1.0.3 allows Directory Traversal via a ../ in the URI. | [
"cpe:2.3:a:cybrotech:cybrohttpserver:1.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-j54w-v35m-r2j7 | Buffer overflow in Mercury Mail Transport System 4.01b allows remote attackers to execute arbitrary code via a long request to TCP port 105. | [] |
|
GHSA-hrcq-6qf6-8fr9 | The My Contador lesr plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the exportar_registros() function in all versions up to, and including, 2.0. This makes it possible for unauthenticated attackers to export user data. | [] |
|
CVE-2024-3496 | Authentication Bypass Vulnerability | Attackers can bypass the web login authentication process to gain access to the printer's system information and upload malicious drivers to the printer. As for the affected products/models/versions, see the reference URL. | [
"cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4515_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4615_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5015_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5115_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2518_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2618_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_ag:-:*:*:*:*:*:*:*"
] |
CVE-2020-1107 | A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1104, CVE-2020-1105. | [
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.