id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-pfc3-2w85-9453 | In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c. | [] |
|
GHSA-crp2-qrr5-8pq7 | containerd CRI plugin: Insecure handling of image volumes | ImpactA bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.PatchesThis bug has been fixed in containerd 1.6.1, 1.5.10 and 1.4.13. Users should update to these versions to resolve the issue.WorkaroundsEnsure that only trusted images are used.CreditsThe containerd project would like to thank Felix Wilhelm of Google Project Zero for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md).For more informationIf you have any questions or comments about this advisory:Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)Email us at [[email protected]](mailto:[email protected]) | [] |
CVE-2014-7713 | The Skin&Ink Magazine (aka com.triactivemedia.skinandink) application @7F08017A for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:pocketmags:skin\\&ink_magazine:\\@7f08017a:*:*:*:*:android:*:*"
] |
|
GHSA-q438-9265-rccj | The WordPress Gallery Plugin WordPress plugin before 3.39 does not validate some block attributes before using them to generate paths passed to include function/s, allowing Admin users to perform LFI attacks | [] |
|
GHSA-4v67-wg88-37p9 | Apache OpenMeetings displays Tomcat version and detailed error stack trace | Apache OpenMeetings 1.0.0 displays Tomcat version and detailed error stack trace, which is not secure. The issue is fixed in version 3.3.0. | [] |
GHSA-h2fw-j3h2-4fh6 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fazilatunnesa News Ticker allows Stored XSS.This issue affects News Ticker: from n/a through 1.0. | [] |
|
CVE-2012-5005 | Cross-site request forgery (CSRF) vulnerability in admin/admin_options.php in VR GPub 4.0 allows remote attackers to hijack the authentication of admins for requests that add admin accounts via an add action. | [
"cpe:2.3:a:frankdeveloper:vr_gpub:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-p292-884c-4jjm | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Turna Advertising Administration Panel allows SQL Injection.This issue affects Advertising Administration Panel: before 1.1. | [] |
|
CVE-2023-5786 | GeoServer GeoWebCache rest.html direct request | A vulnerability was found in GeoServer GeoWebCache up to 1.15.1. It has been declared as problematic. This vulnerability affects unknown code of the file /geoserver/gwc/rest.html. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243592. | [
"cpe:2.3:a:geoserver:geowebcache:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:geoserver:geowebcache:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:geoserver:geowebcache:*:*:*:*:*:*:*:*"
] |
GHSA-qg9f-x569-p4r7 | A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to reset the Autonomic Control Plane (ACP) of an affected system and view ACP packets that are transferred in clear text within an affected system, an Information Disclosure Vulnerability. More Information: CSCvd51214. Known Affected Releases: Denali-16.2.1 Denali-16.3.1. | [] |
|
CVE-2022-24595 | Automotive Grade Linux Kooky Koi 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, and 11.0.5 is affected by Incorrect Access Control in usr/bin/afb-daemon. To exploit the vulnerability, an attacker should send a well-crafted HTTP (or WebSocket) request to the socket listened by the afb-daemon process. No credentials nor user interactions are required. | [
"cpe:2.3:a:automotivelinux:kooky_koi:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-0730 | Multiple cross-site scripting (XSS) vulnerabilities in Newscoop 4.x through 4.1.0 allow remote attackers to inject arbitrary web script or HTML via vectors involving the (1) language parameter to application/modules/admin/controllers/LanguagesController.php or (2) user parameter to application/modules/admin/controllers/UserController.php. | [
"cpe:2.3:a:sourcefabric:newscoop:4.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:sourcefabric:newscoop:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefabric:newscoop:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefabric:newscoop:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefabric:newscoop:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sourcefabric:newscoop:4.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2013-3720 | Cross-site scripting (XSS) vulnerability in widget_remove.php in the Feedweb plugin before 1.9 for WordPress allows remote authenticated administrators to inject arbitrary web script or HTML via the wp_post_id parameter. | [
"cpe:2.3:a:feedweb:feedweb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:feedweb:feedweb:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] |
|
GHSA-2fg3-h938-jr6f | The xfs_swapext function in fs/xfs/xfs_dfrag.c in the Linux kernel before 2.6.35 does not properly check the file descriptors passed to the SWAPEXT ioctl, which allows local users to leverage write access and obtain read access by swapping one file into another file. | [] |
|
CVE-1999-1074 | Webmin before 0.5 does not restrict the number of invalid passwords that are entered for a valid username, which could allow remote attackers to gain privileges via brute force password cracking. | [
"cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*"
] |
|
GHSA-xgj7-v3ff-h29v | TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command insertion vulnerability in downloadFile.cgi main function. This vulnerability allows an attacker to execute arbitrary commands by sending HTTP request. | [] |
|
CVE-2021-29262 | Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settings | When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs. | [
"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*"
] |
GHSA-qm3q-m933-m78g | Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow. | [] |
|
CVE-2017-9683 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing a meta image, an integer overflow can occur, if user-defined image offset and size values are too large. | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-4548 | Stack-based buffer overflow in the PTZCamPanelCtrl ActiveX control (CamPanel.dll) in RTS Sentry 2.1.0.2 allows remote attackers to execute arbitrary code via a long second argument to the ConnectServer method. | [
"cpe:2.3:a:rtssentry:rtssentry:2.1.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-8fvj-g5x4-6pcr | The Premium Packages – Sell Digital Products Securely plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.9.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
CVE-2015-3178 | Cross-site scripting (XSS) vulnerability in the external_format_text function in lib/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML into an external application via a crafted string that is visible to web services. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.5:*:*:*:*:*:*:*"
] |
|
GHSA-pq8j-6p2f-w2r3 | Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default. | [] |
|
GHSA-5xj8-9pp7-w546 | Webid v1.2.1 suffers from an Insecure Direct Object Reference (IDOR) - Broken Access Control vulnerability, allowing attackers to buy now an auction that is suspended (horizontal privilege escalation). | [] |
|
CVE-2008-6685 | Unspecified vulnerability in Frontend Filemanager (air_filemanager) 0.6.1 and earlier extension for TYPO3 allows remote attackers to execute arbitrary commands via unknown vectors. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.6.0:*:*:*:*:*:*:*"
] |
|
GHSA-hcgx-vxrq-6c93 | EmTec ZOC before 8.02.2 allows \e[201~ pastes. | [] |
|
CVE-2014-3202 | Unity before 7.2.1 does not properly handle entry activation, which allows physically proximate attackers to bypass the lock screen by holding the ENTER key, which triggers the process to crash. | [
"cpe:2.3:a:ayatana_project:unity:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ayatana_project:unity:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ayatana_project:unity:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ayatana_project:unity:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ayatana_project:unity:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ayatana_project:unity:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ayatana_project:unity:7.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-fv4x-hrpq-wqgp | Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. | [] |
|
GHSA-3vf7-gh27-gx55 | A vulnerability was found in Dart http_server up to 0.9.5 and classified as problematic. Affected by this issue is the function VirtualDirectory of the file lib/src/virtual_directory.dart of the component Directory Listing Handler. The manipulation of the argument request.uri.path leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.9.6 is able to address this issue. The name of the patch is 27c1cbd8125bb0369e675eb72e48218496e48ffb. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225356. | [] |
|
CVE-2024-44450 | Multiple functions are vulnerable to Authorization Bypass in AIMS eCrew. The issue was fixed in version JUN23 #190. | [] |
|
CVE-2009-4917 | Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (device reload) via a high volume of SIP traffic, aka Bug ID CSCsr65901. | [
"cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-47900 | GPU DDK - Multiple integer overflow in DmaTransfer PMR_DevPhysAddr functions leading to OOB writes | Software installed and run as a non-privileged user may conduct improper GPU system calls to access OOB kernel memory. | [] |
CVE-2014-4667 | The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-38037 | BUG-000167983 - Unvalidated redirect in Portal for ArcGIS | There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks. | [
"cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:*"
] |
GHSA-95f6-pfqp-8374 | The NVIDIA media driver in Android before 2016-08-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 28919417. | [] |
|
CVE-2018-12492 | PHPOK 4.9.032 has an arbitrary file deletion vulnerability in the delfile_f function in framework/admin/tpl_control.php. | [
"cpe:2.3:a:phpok:phpok:4.9.032:*:*:*:*:*:*:*"
] |
|
GHSA-46w6-2r33-982j | Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, and CVE-2015-4790. | [] |
|
CVE-2022-32126 | 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company. | [
"cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-74jf-8355-xvr5 | IBM Security Guardium 11.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 240905. | [] |
|
GHSA-rqpf-p3qj-hp4w | Microsoft Word 2007 Service Pack 3, Microsoft Word 2010 Service Pack 2, Microsoft Office 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Word Memory Corruption Vulnerability". | [] |
|
CVE-2020-2824 | Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:one-to-one_fulfillment:*:*:*:*:*:*:*:*"
] |
|
GHSA-52fx-69c2-5gh6 | The join_pthread function in stream.c in liblrzip.so in lrzip 0.631 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive. | [] |
|
CVE-2024-28977 | Dell Repository Manager, versions 3.4.2 through 3.4.4,contains a Path Traversal vulnerability in logger module. A local attacker with low privileges could potentially exploit this vulnerability to gain unauthorized read access to the files stored on the server filesystem with the privileges of the running web application. | [
"cpe:2.3:a:dell:repository_manager:3.4.4:*:*:*:*:*:*:*"
] |
|
GHSA-w3p6-8cgj-c9xc | A cross-site scripting (XSS) flaw was found in the foreman component of satellite. An attacker with privilege to create entries using the Hosts, Monitor, Infrastructure, or Administer Menus is able to execute a XSS attacks against other users, possibly leading to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Foreman before 1.18.3, 1.19.1, and 1.20.0 are vulnerable. | [] |
|
GHSA-7hvj-fm99-26hr | Certain NETGEAR devices are affected by a a hardcoded password. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.30, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.24, JR6150 before 1.0.1.24, R6120 before 1.0.0.48, R6220 before 1.1.0.86, R6230 before 1.1.0.86, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, and WNR2020 before 1.1.0.62. | [] |
|
CVE-2022-31481 | Remote Code Execution via buffer overflow in firmware update process | An unauthenticated attacker can send a specially crafted update file to the device that can overflow a buffer. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. The overflowed data can allow the attacker to manipulate the “normal” code execution to that of their choosing. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable. | [
"cpe:2.3:o:hidglobal:lp1501_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hidglobal:lp1501:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hidglobal:lp1502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hidglobal:lp1502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hidglobal:lp2500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hidglobal:lp2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hidglobal:lp4502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hidglobal:lp4502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hidglobal:ep4502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hidglobal:ep4502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_lnl-4420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_lnl-4420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_lnl-x2210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_lnl-x2210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_lnl-x2220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_lnl-x2220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_lnl-x3300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_lnl-x3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_lnl-x4420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_lnl-x4420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_s2-lp-1501_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_s2-lp-1501:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_s2-lp-1502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_s2-lp-1502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_s2-lp-2500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_s2-lp-2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:carrier:lenels2_s2-lp-4502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:carrier:lenels2_s2-lp-4502:-:*:*:*:*:*:*:*"
] |
CVE-2008-5437 | Unspecified vulnerability in the Job Queue component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_IJOB. | [
"cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_10g:10.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_11i:11.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_9i:9.2.0.8:dv:*:*:*:*:*:*"
] |
|
CVE-2015-0312 | Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and OS X and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:extended_support:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*"
] |
|
GHSA-9h99-mc2q-rgfw | A vulnerability classified as problematic has been found in DedeCMS 5.7.116. This affects an unknown part of the file /dede/uploads/dede/friendlink_add.php. The manipulation of the argument logoimg leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-3mwq-h3g6-ffhm | Vapor's incorrect request error handling triggers server crash | Vapor incorrectly handles errors encountered during parsing of HTTP 1.x requests, triggering a precondition failure in swift-nio due to API misuse and causing immediate termination of the server process.ImpactThis is a denial of service vulnerability, impacting all users of affected versions of Vapor. Because the crash is an explicit assertion failure, there is no corruption of process state and no risk of data leakage or unauthorized code execution. Total impact is limited to an immediately recoverable service interruption.PatchesThe issue is fixed as of Vapor release 4.84.2.WorkaroundsNone known at this time.For more informationIf you have any questions or comments about this advisory:Open an issue in [the Vapor repo](https://github.com/vapor/vapor)Ask in [Vapor Discord](http://vapor.team)AcknowledgementsFull credit for reporting this issue goes to @t0rchwo0d, with additional thanks for responsibly disclosing. | [] |
GHSA-wrr7-33fx-rcvj | Deserialization of Untrusted Data in jackson-databind | **Withdrawn:** Duplicate of GHSA-cjjf-94ff-43w7 | [] |
CVE-2018-9468 | In query of DownloadManager.java, there is a possible read/write of arbitrary files due to a permissions bypass. This could lead to local information disclosure and file rewriting with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2006-3110 | Cross-site scripting (XSS) vulnerability in main.php in Chipmailer 1.09 allows remote attackers to inject arbitrary web script or HTML via the (1) name, (2) betreff, (3) mail, and (4) text parameters. | [
"cpe:2.3:a:chipmailer:chipmailer:1.09:*:*:*:*:*:*:*"
] |
|
CVE-2007-1922 | The Impulse Tracker (IT) and ScreamTracker 3 (S3M) modules in IN_MOD.DLL in AOL Nullsoft Winamp 5.33 allows remote attackers to execute arbitrary code via a crafted (1) .IT or (2) .S3M file containing integer values that are used as memory offsets, which triggers memory corruption. | [
"cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*"
] |
|
CVE-2020-6462 | Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-11899 | An unauthenticated attacker can achieve unauthorized access to sensitive data by exploiting Windows SMB protocol on a client installation. With Bosch Access Professional Edition (APE) 3.8, client installations need to be authorized by the APE administrator. | [
"cpe:2.3:a:bosch:access:*:*:*:*:professional:*:*:*"
] |
|
CVE-2018-9072 | LXCI for VMware | In versions prior to 5.5, LXCI for VMware allows an authenticated user to download any system file due to insufficient input sanitization during file downloads. | [
"cpe:2.3:a:lenovo:xclarity_integrator:*:*:*:*:*:vcenter:*:*"
] |
CVE-2023-28976 | Junos OS: MX Series: If a specific traffic rate goes above the DDoS threshold it will lead to an FPC crash | An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If specific traffic is received on MX Series and its rate exceeds the respective DDoS protection limit the ingress PFE will crash and restart. Continued receipt of this traffic will create a sustained DoS condition. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S5; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. | [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*"
] |
GHSA-2322-wmrw-5cf3 | Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3145. | [] |
|
CVE-2006-2414 | Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command. | [
"cpe:2.3:a:timo_sirainen:dovecot:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:timo_sirainen:dovecot:1.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:timo_sirainen:dovecot:1.0_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:timo_sirainen:dovecot:1.0_beta7:*:*:*:*:*:*:*"
] |
|
GHSA-mfc8-35qf-6x9f | Pegasus Mail 3.12 allows remote attackers to read arbitrary files via an embedded URL that calls the mailto: protocol with a -F switch. | [] |
|
CVE-2019-9182 | There is a CSRF in ZZZCMS zzzphp V1.6.1 via a /admin015/save.php?act=editfile request. It allows PHP code injection by providing a filename in the file parameter, and providing file content in the filetext parameter. | [
"cpe:2.3:a:zzzcms:zzzphp:1.6.1:*:*:*:*:*:*:*"
] |
|
CVE-2011-1655 | The management.asmx module in the Management Web Service in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 sends a cleartext response to unspecified getDBConfigSettings requests, which makes it easier for remote attackers to obtain database credentials, and subsequently execute arbitrary code, by sniffing the network, related to the UNCWS Web Service. | [
"cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:*"
] |
|
GHSA-qvr5-55ph-wr66 | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetAutoFocus param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [] |
|
CVE-2021-1220 | Cisco IOS XE Software Web UI Denial of Service Vulnerabilities | Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality. Note: These vulnerabilities do not affect the console connection. | [
"cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*"
] |
GHSA-r726-vmfq-j9j3 | Open Redirect Vulnerability in jupyter-server | ImpactOpen Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter Server-served URLs.PatchesUpgrade to Jupyter Server 2.7.2WorkaroundsNone.ReferencesVulnerability reported by user davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).https://blog.xss.am/2023/08/cve-2023-39968-jupyter-token-leak/ | [] |
CVE-2007-5446 | Absolute path traversal vulnerability in a certain ActiveX control in PBEmail7Ax.dll in PBEmail 7 ActiveX Edition allows remote attackers to create or overwrite arbitrary files via a full pathname in the XmlFilePath argument to the SaveSenderToXml method. | [
"cpe:2.3:a:perfection_bytes:pbemail:7.0:*:activex_edition:*:*:*:*:*"
] |
|
CVE-2023-37145 | TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a command injection vulnerability via the hostname parameter in the setOpModeCfg function. | [
"cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*"
] |
|
CVE-2022-48755 | powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06 | In the Linux kernel, the following vulnerability has been resolved:
powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06
Johan reported the below crash with test_bpf on ppc64 e5500:
test_bpf: #296 ALU_END_FROM_LE 64: 0x0123456789abcdef -> 0x67452301 jited:1
Oops: Exception in kernel mode, sig: 4 [#1]
BE PAGE_SIZE=4K SMP NR_CPUS=24 QEMU e500
Modules linked in: test_bpf(+)
CPU: 0 PID: 76 Comm: insmod Not tainted 5.14.0-03771-g98c2059e008a-dirty #1
NIP: 8000000000061c3c LR: 80000000006dea64 CTR: 8000000000061c18
REGS: c0000000032d3420 TRAP: 0700 Not tainted (5.14.0-03771-g98c2059e008a-dirty)
MSR: 0000000080089000 <EE,ME> CR: 88002822 XER: 20000000 IRQMASK: 0
<...>
NIP [8000000000061c3c] 0x8000000000061c3c
LR [80000000006dea64] .__run_one+0x104/0x17c [test_bpf]
Call Trace:
.__run_one+0x60/0x17c [test_bpf] (unreliable)
.test_bpf_init+0x6a8/0xdc8 [test_bpf]
.do_one_initcall+0x6c/0x28c
.do_init_module+0x68/0x28c
.load_module+0x2460/0x2abc
.__do_sys_init_module+0x120/0x18c
.system_call_exception+0x110/0x1b8
system_call_common+0xf0/0x210
--- interrupt: c00 at 0x101d0acc
<...>
---[ end trace 47b2bf19090bb3d0 ]---
Illegal instruction
The illegal instruction turned out to be 'ldbrx' emitted for
BPF_FROM_[L|B]E, which was only introduced in ISA v2.06. Guard use of
the same and implement an alternative approach for older processors. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*"
] |
CVE-2008-6733 | Cross-site scripting (XSS) vulnerability in the error handling page in DotNetNuke 4.6.2 through 4.8.3 allows remote attackers to inject arbitrary web script or HTML via the querystring parameter. | [
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.3:*:*:*:*:*:*:*"
] |
|
GHSA-xpmj-rhfm-xxmq | A vulnerability was found in SourceCodester Class Scheduling System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_subject.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229597 was assigned to this vulnerability. | [] |
|
GHSA-jx28-c3hv-9f4g | IBM Websphere MQ JMS 7.0.1, 7.1, 7.5, 8.0, and 9.0 client provides classes that deserialize objects from untrusted sources which could allow a malicious user to execute arbitrary Java code by adding vulnerable classes to the classpath. IBM Reference #: 1983457. | [] |
|
CVE-2022-42237 | A SQL Injection issue in Merchandise Online Store v.1.0 allows an attacker to log in to the admin account. | [
"cpe:2.3:a:merchandise_online_store_project:merchandise_online_store:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-7vm2-3fp4-cwq9 | The Pure CSS Circle Progress bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'circle_progress' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2021-41609 | SQL injection in the ID parameter of the UploadedImageDisplay.aspx endpoint of SelectSurvey.NET before 5.052.000 allows a remote, unauthenticated attacker to retrieve data from the application's backend database via boolean-based blind and UNION injection. | [
"cpe:2.3:a:classapps:selectsurvey.net:*:*:*:*:*:*:*:*"
] |
|
GHSA-23c5-vp3g-x496 | gfax 0.4.2 and probably other versions creates temporary files insecurely, which allows local users to execute arbitrary commands via unknown vectors. | [] |
|
CVE-2019-19977 | libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read. | [
"cpe:2.3:a:libesmtp_project:libesmtp:*:*:*:*:*:*:*:*"
] |
|
GHSA-5mfm-p22h-8c37 | Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive. | [] |
|
CVE-2020-24423 | Uncontrolled Search Path in Adobe Media Encoder for Windows | Adobe Media Encoder version 14.4 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2025-22685 | WordPress Tags to Keywords plugin <= 1.0.1 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in CheGevara Tags to Keywords allows Stored XSS. This issue affects Tags to Keywords: from n/a through 1.0.1. | [] |
GHSA-vwxj-gpp4-vgcx | IBM Connections 5.0, 5.5, and 6.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 135521. | [] |
|
GHSA-vwc9-qw9m-64xj | An arbitrary file upload vulnerability in rconfig v3.9.6 allows attackers to execute arbitrary code via a crafted PHP file. | [] |
|
GHSA-jv45-xgw6-mfrv | Unspecified vulnerability in Walter Zorn wz_tooltip.js (aka wz_tooltips) before 4.01, as used by eGroupWare before 1.2.107-2 and other packages, has unknown impact and remote attack vectors. | [] |
|
CVE-2015-9408 | The xpinner-lite plugin through 2.2 for WordPress has wp-admin/options-general.php CSRF with resultant XSS. | [
"cpe:2.3:a:cyberseo:xpinner_lite:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2002-1490 | NetBSD 1.4 through 1.6 beta allows local users to cause a denial of service (kernel panic) via a series of calls to the TIOCSCTTY ioctl, which causes an integer overflow in a structure counter and sets the counter to zero, which frees memory that is still in use by other processes. | [
"cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:alpha:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:arm32:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:sparc:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:sh3:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*"
] |
|
CVE-2022-27366 | Cscms Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the component dance_Dance.php_hy. | [
"cpe:2.3:a:chshcms:cscms:4.2:*:*:*:*:*:*:*"
] |
|
GHSA-vf7x-6ghf-p328 | Citrix Worx Home for iOS before 10.3.6 and XenMobile MDX Toolkit for iOS before 10.3.6 might allow physically proximate attackers to bypass in-application Apple Touch ID authentication via unspecified vectors, related to an application requiring re-authentication. | [] |
|
GHSA-cwqc-w7f5-59qr | Multiple unspecified vulnerabilities in the Subdomain Manager module for Drupal have unknown impact and attack vectors. | [] |
|
GHSA-27p6-p8xf-5cxf | Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N). | [] |
|
CVE-2014-3971 | The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate. | [
"cpe:2.3:a:mongodb:mongodb:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:2.6.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-25930 | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no validation of an existing user name while renaming a user. As a result, privileges of the renamed user are being overwritten by the old user and the old user is being deleted from the user list. | [
"cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*"
] |
|
GHSA-7jc3-jgh2-x9w6 | Memory leak in the ccnl_app_RX function in ccnl-uapi.c in CCN-lite before 2.00 allows context-dependent attackers to cause a denial of service (memory consumption) via vectors involving an envelope_s structure pointer when the packet format is unknown. | [] |
|
CVE-2025-1744 | Out-of-bounds Write in radare2 | Out-of-bounds Write vulnerability in radareorg radare2 allows
heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9. | [] |
CVE-2023-6306 | SourceCodester Free and Open Source Inventory Management System member_data.php sql injection | A vulnerability classified as critical has been found in SourceCodester Free and Open Source Inventory Management System 1.0. Affected is an unknown function of the file /ample/app/ajax/member_data.php. The manipulation of the argument columns leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246132. | [
"cpe:2.3:a:mayurik:free_and_open_source_inventory_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-j2gq-rj95-4hhj | The FRONT (aka com.magazinecloner.front) application @7F08017A for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-m9wc-x2mg-pqx4 | Omikron MultiCash Desktop 4.00.008.SP5 relies on a client-side authentication mechanism. When a user logs into the application, the validity of the password is checked locally. All communication to the database backend is made via the same technical account. Consequently, an attacker can attach a debugger to the process or create a patch that manipulates the behavior of the login function. When the function always returns the success value (corresponding to a correct password), an attacker can login with any desired account, such as the administrative account of the application. | [] |
|
CVE-2023-3830 | Bug Finder SASS BILLER store cross site scripting | A vulnerability was found in Bug Finder SASS BILLER 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /company/store. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235151. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:bugfinder:sass_biller:1.0:*:*:*:*:*:*:*"
] |
CVE-2008-3979 | Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5 and 10.2.0.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a SQL injection vulnerability that allows remote authenticated users to gain MDSYS privileges via the MDSYS.SDO_TOPO_DROP_FTBL trigger. | [
"cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_10g:10.2.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-69f5-jhfq-62qg | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] |
|
GHSA-hccp-6fqj-76m5 | HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.